krb5-devel |
CVE-2024-3596 |
高危 |
1.18.2-29.0.1.el8_10 |
1.18.2-30.0.1.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-09 12:15 修改: 2024-07-23 09:15
|
krb5-libs |
CVE-2024-3596 |
高危 |
1.18.2-29.0.1.el8_10 |
1.18.2-30.0.1.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-09 12:15 修改: 2024-07-23 09:15
|
libgcrypt |
CVE-2021-40528 |
高危 |
1.8.5-7.el8_6 |
10:1.8.5-7.el8_6_fips |
libgcrypt: ElGamal implementation allows plaintext recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40528
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2021-09-06 19:15 修改: 2023-11-07 03:38
|
libkadm5 |
CVE-2024-3596 |
高危 |
1.18.2-29.0.1.el8_10 |
1.18.2-30.0.1.el8_10 |
freeradius: forgery attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3596
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-09 12:15 修改: 2024-07-23 09:15
|
kernel-headers |
CVE-2022-48773 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48773
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:45
|
kernel-headers |
CVE-2022-48936 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: gso: do not skip outer ip header in case of ipip and net_failover
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48936
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-22 04:15 修改: 2024-08-31 06:15
|
kernel-headers |
CVE-2023-52492 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: dmaengine: fix NULL pointer in channel unregistration function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52492
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-03-11 18:15 修改: 2024-11-04 13:16
|
kernel-headers |
CVE-2024-24857 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24857
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-02-05 08:15 修改: 2024-06-27 12:15
|
kernel-headers |
CVE-2024-26851 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26851
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-04-17 11:15 修改: 2024-11-05 10:15
|
kernel-headers |
CVE-2024-26924 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nft_set_pipapo: do not free live element
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26924
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-04-25 06:15 修改: 2024-11-05 10:16
|
kernel-headers |
CVE-2024-26976 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26976
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-05-01 06:15 修改: 2024-11-05 10:16
|
kernel-headers |
CVE-2024-27017 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27017
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-05-01 06:15 修改: 2024-10-17 14:15
|
kernel-headers |
CVE-2024-27062 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: nouveau: lock the client object tree.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27062
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-05-01 13:15 修改: 2024-11-05 17:35
|
kernel-headers |
CVE-2024-35839 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: bridge: replace physindev with physinif in nf_bridge_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35839
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-05-17 15:15 修改: 2024-05-17 18:35
|
kernel-headers |
CVE-2024-35898 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35898
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-05-19 09:15 修改: 2024-11-05 10:16
|
kernel-headers |
CVE-2024-35939 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: dma-direct: Leak pages on dma_set_decrypted() failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35939
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00
|
kernel-headers |
CVE-2024-38540 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38540
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-06-19 14:15 修改: 2024-11-01 15:35
|
kernel-headers |
CVE-2024-38541 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: of: module: add buffer overflow check in of_modalias()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38541
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-06-19 14:15 修改: 2024-07-03 02:05
|
kernel-headers |
CVE-2024-38586 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38586
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-06-19 14:15 修改: 2024-07-05 08:15
|
kernel-headers |
CVE-2024-38608 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: net/mlx5e: Fix netif state handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38608
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-06-19 14:15 修改: 2024-08-27 15:58
|
kernel-headers |
CVE-2024-39503 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39503
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-40924 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: drm/i915/dpt: Make DPT object unshrinkable
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40924
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-40961 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ipv6: prevent possible NULL deref in fib6_nh_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40961
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-12 13:15 修改: 2024-08-21 16:54
|
kernel-headers |
CVE-2024-40983 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: tipc: force a dst refcount before doing decryption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40983
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-40984 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40984
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-41009 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bpf: Fix overrunning reservations in ringbuf
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41009
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-17 07:15 修改: 2024-07-29 07:15
|
kernel-headers |
CVE-2024-41042 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_tables: prefer nft_chain_validate
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41042
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-29 15:15 修改: 2024-08-19 05:15
|
kernel-headers |
CVE-2024-41066 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ibmvnic: Add tx check to prevent skb leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41066
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:06
|
kernel-headers |
CVE-2024-41092 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41092
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:51
|
kernel-headers |
CVE-2024-41093 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: drm/amdgpu: avoid using null object of framebuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41093
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-29 16:15 修改: 2024-08-08 17:40
|
kernel-headers |
CVE-2024-42070 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42070
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:01
|
kernel-headers |
CVE-2024-42079 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42079
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-07-29 16:15 修改: 2024-07-30 18:58
|
kernel-headers |
CVE-2024-42244 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: USB: serial: mos7840: fix crash on resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42244
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53
|
kernel-headers |
CVE-2024-42284 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: tipc: Return non-zero value from tipc_udp_addr2str() on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42284
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:47
|
kernel-headers |
CVE-2024-42292 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: kobject_uevent: Fix OOB access within zap_modalias_env()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42292
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-17 09:15 修改: 2024-08-19 12:59
|
kernel-headers |
CVE-2024-42301 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: dev/parport: fix the array out-of-bounds risk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42301
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-17 09:15 修改: 2024-08-22 16:31
|
kernel-headers |
CVE-2024-43854 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: block: initialize integrity buffer to zero before writing it to media
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43854
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-17 10:15 修改: 2024-09-12 12:15
|
kernel-headers |
CVE-2024-43880 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43880
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-21 01:15 修改: 2024-08-21 12:30
|
kernel-headers |
CVE-2024-43889 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43889
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-26 11:15 修改: 2024-08-27 14:38
|
kernel-headers |
CVE-2024-43892 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: memcg: protect concurrent access to mem_cgroup_idr
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43892
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-26 11:15 修改: 2024-09-12 12:15
|
kernel-headers |
CVE-2024-44935 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: sctp: Fix null-ptr-deref in reuseport_add_sock().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44935
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:09
|
kernel-headers |
CVE-2024-44989 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bonding: fix xfrm real_dev null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44989
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31
|
kernel-headers |
CVE-2024-44990 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44990
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-09-04 20:15 修改: 2024-09-06 16:31
|
kernel-headers |
CVE-2024-45018 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: netfilter: flowtable: initialise extack before use
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45018
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36
|
kernel-headers |
CVE-2024-46826 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: ELF: fix kernel.randomize_va_space double read
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46826
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-09-27 13:15 修改: 2024-09-30 12:45
|
kernel-headers |
CVE-2024-47668 |
中危 |
4.18.0-553.22.1.el8_10 |
4.18.0-553.27.1.el8_10 |
kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47668
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-10-09 15:15 修改: 2024-10-23 15:30
|
gnutls |
CVE-2021-20231 |
中危 |
3.6.16-8.el8_9.3 |
10:3.6.16-4.0.1.el8_fips |
gnutls: Use after free in client key_share extension
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20231
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2021-03-12 19:15 修改: 2023-11-07 03:29
|
gnutls |
CVE-2021-20232 |
中危 |
3.6.16-8.el8_9.3 |
10:3.6.16-4.0.1.el8_fips |
gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20232
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2021-03-12 19:15 修改: 2023-11-07 03:29
|
gnutls |
CVE-2021-3580 |
中危 |
3.6.16-8.el8_9.3 |
10:3.6.16-4.0.1.el8_fips |
nettle: Remote crash in RSA decryption via manipulated ciphertext
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3580
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2021-08-05 21:15 修改: 2024-01-16 15:15
|
libgcrypt |
CVE-2021-33560 |
中危 |
1.8.5-7.el8_6 |
10:1.8.5-6.el8_fips |
libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33560
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2021-06-08 11:15 修改: 2023-11-07 03:35
|
gnutls |
CVE-2024-0553 |
中危 |
3.6.16-8.el8_9.3 |
10:3.6.16-8.el8_9.1_fips |
gnutls: incomplete fix for CVE-2023-5981
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0553
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-01-16 12:15 修改: 2024-09-16 13:15
|
libtiff |
CVE-2024-7006 |
中危 |
4.0.9-32.el8_10 |
4.0.9-33.el8_10 |
libtiff: NULL pointer dereference in tif_dirinfo.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7006
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-08-12 13:38 修改: 2024-11-06 10:15
|
perl-Carp |
CVE-2023-47038 |
中危 |
1.42-396.el8 |
1.50-439.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Data-Dumper |
CVE-2023-47038 |
中危 |
2.167-399.el8 |
2.174-440.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Digest |
CVE-2023-47038 |
中危 |
1.17-395.el8 |
1.20-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Digest-MD5 |
CVE-2023-47038 |
中危 |
2.55-396.el8 |
2.58-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Encode |
CVE-2023-47038 |
中危 |
4:2.97-3.el8 |
4:3.08-461.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Errno |
CVE-2023-47038 |
中危 |
1.28-422.el8 |
1.30-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Exporter |
CVE-2023-47038 |
中危 |
5.72-396.el8 |
5.74-458.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-File-Path |
CVE-2023-47038 |
中危 |
2.15-2.el8 |
2.16-439.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-File-Temp |
CVE-2023-47038 |
中危 |
0.230.600-1.el8 |
1:0.231.100-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Getopt-Long |
CVE-2023-47038 |
中危 |
1:2.50-4.el8 |
1:2.52-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-HTTP-Tiny |
CVE-2023-47038 |
中危 |
0.074-3.el8 |
0.078-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-IO |
CVE-2023-47038 |
中危 |
1.38-422.el8 |
1.43-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-IO-Socket-IP |
CVE-2023-47038 |
中危 |
0.39-5.el8 |
0.41-2.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-MIME-Base64 |
CVE-2023-47038 |
中危 |
3.15-396.el8 |
3.15-1001.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-PathTools |
CVE-2023-47038 |
中危 |
3.74-1.el8 |
3.78-439.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Pod-Escapes |
CVE-2023-47038 |
中危 |
1:1.07-395.el8 |
1:1.07-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Pod-Perldoc |
CVE-2023-47038 |
中危 |
3.28-396.el8 |
3.28.01-443.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Pod-Simple |
CVE-2023-47038 |
中危 |
1:3.35-395.el8 |
1:3.42-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Pod-Usage |
CVE-2023-47038 |
中危 |
4:1.69-395.el8 |
4:2.01-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Scalar-List-Utils |
CVE-2023-47038 |
中危 |
3:1.49-2.el8 |
4:1.55-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Socket |
CVE-2023-47038 |
中危 |
4:2.027-3.el8 |
4:2.031-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Storable |
CVE-2023-47038 |
中危 |
1:3.11-3.el8 |
1:3.21-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Term-ANSIColor |
CVE-2023-47038 |
中危 |
4.06-396.el8 |
5.01-458.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Term-Cap |
CVE-2023-47038 |
中危 |
1.17-395.el8 |
1.17-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Text-ParseWords |
CVE-2023-47038 |
中危 |
3.30-395.el8 |
3.30-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Text-Tabs+Wrap |
CVE-2023-47038 |
中危 |
2013.0523-395.el8 |
2013.0523-396.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Time-Local |
CVE-2023-47038 |
中危 |
1:1.280-1.el8 |
2:1.300-4.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-URI |
CVE-2023-47038 |
中危 |
1.73-3.el8 |
1.76-5.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-Unicode-Normalize |
CVE-2023-47038 |
中危 |
1.25-396.el8 |
1.27-458.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-constant |
CVE-2023-47038 |
中危 |
1.33-396.el8 |
1.33-1001.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-interpreter |
CVE-2023-47038 |
中危 |
4:5.26.3-422.el8 |
4:5.32.1-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-libnet |
CVE-2023-47038 |
中危 |
3.11-3.el8 |
3.13-1.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-libs |
CVE-2023-47038 |
中危 |
4:5.26.3-422.el8 |
4:5.32.1-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-macros |
CVE-2023-47038 |
中危 |
4:5.26.3-422.el8 |
4:5.32.1-473.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-parent |
CVE-2023-47038 |
中危 |
1:0.237-1.el8 |
1:0.238-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-podlators |
CVE-2023-47038 |
中危 |
4.11-1.el8 |
1:4.14-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-threads |
CVE-2023-47038 |
中危 |
1:2.21-2.el8 |
1:2.25-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
perl-threads-shared |
CVE-2023-47038 |
中危 |
1.58-2.el8 |
1.61-457.module+el8.10.0+90267+7012ad3b |
perl: Write past buffer end via illegal user-defined Unicode property
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47038
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2023-12-18 14:15 修改: 2024-09-16 16:15
|
openssl-libs |
CVE-2024-5535 |
低危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_6 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
openssl |
CVE-2024-5535 |
低危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_6 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|
openssl-devel |
CVE-2024-5535 |
低危 |
1:1.1.1k-12.el8_9 |
1:1.1.1k-14.el8_6 |
openssl: SSL_select_next_proto buffer overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-5535
镜像层: sha256:240b751ea1ff1f1781a37e9df63480e5dc836cbe5a4b6beb3480551cef4f08c3
发布日期: 2024-06-27 11:15 修改: 2024-07-12 14:15
|