glibc |
CVE-2024-2961 |
高危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33599 |
高危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-2961 |
高危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33599 |
高危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-2961 |
高危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: Out of bounds write in iconv may lead to remote code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33599 |
高危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: stack-based buffer overflow in netgroup cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33600 |
中危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33600 |
中危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33600 |
中危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: null pointer dereferences after failed netgroup cache insertion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33602 |
低危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33602 |
低危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc |
CVE-2024-33601 |
低危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-common |
CVE-2024-33601 |
低危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33601 |
低危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: netgroup cache may terminate daemon on memory allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
glibc-minimal-langpack |
CVE-2024-33602 |
低危 |
2.34-83.el9_3.12 |
2.34-100.el9_4.2 |
glibc: netgroup cache assumes NSS callback uses in-buffer strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15
|
libgcc |
CVE-2022-27943 |
低危 |
11.4.1-2.1.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2022-03-26 13:15 修改: 2023-11-07 03:45
|
ncurses-base |
CVE-2022-29458 |
低危 |
6.2-10.20210508.el9 |
|
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
ncurses-base |
CVE-2023-45918 |
低危 |
6.2-10.20210508.el9 |
|
ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15
|
ncurses-base |
CVE-2023-50495 |
低危 |
6.2-10.20210508.el9 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15
|
ncurses-libs |
CVE-2022-29458 |
低危 |
6.2-10.20210508.el9 |
|
ncurses: segfaulting OOB read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29458
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2022-04-18 21:15 修改: 2023-11-07 03:46
|
ncurses-libs |
CVE-2023-45918 |
低危 |
6.2-10.20210508.el9 |
|
ncurses: NULL pointer dereference in tgetstr in tinfo/lib_termcap.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45918
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2024-02-16 22:15 修改: 2024-11-21 21:15
|
ncurses-libs |
CVE-2023-50495 |
低危 |
6.2-10.20210508.el9 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2023-12-12 15:15 修改: 2024-01-31 03:15
|
pcre2 |
CVE-2022-41409 |
低危 |
10.40-2.el9 |
|
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46
|
pcre2-syntax |
CVE-2022-41409 |
低危 |
10.40-2.el9 |
|
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409
镜像层: sha256:f6e375c0d5ad6710500dc4fe0f0e6c5c43c65465c50ac3ce5c152cc9627f5134
发布日期: 2023-07-18 14:15 修改: 2023-07-27 03:46
|