| java-17-openjdk-headless |
CVE-2025-64720 |
高危 |
1:17.0.17.0.10-1.el9 |
|
libpng: LIBPNG buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64720
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:35
|
| java-17-openjdk-headless |
CVE-2025-65018 |
高危 |
1:17.0.17.0.10-1.el9 |
|
libpng: LIBPNG heap buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-65018
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:34
|
| java-17-openjdk-headless |
CVE-2025-66293 |
高危 |
1:17.0.17.0.10-1.el9 |
|
libpng: LIBPNG out-of-bounds read in png_image_read_composite
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66293
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-03 21:15 修改: 2025-12-16 19:12
|
| java-17-openjdk-headless |
CVE-2026-22184 |
高危 |
1:17.0.17.0.10-1.el9 |
|
zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22184
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-07 21:16 修改: 2026-01-15 14:16
|
| kernel-headers |
CVE-2022-50553 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx'
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50553
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50717 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet-tcp: add bounds check on Transfer Tag
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50717
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-52922 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: bcm: Fix UAF in bcm_proc_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52922
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-28 15:15 修改: 2025-06-13 20:15
|
| kernel-headers |
CVE-2023-53186 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: skbuff: Fix a race between coalescing and releasing SKBs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53186
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 02:56
|
| kernel-headers |
CVE-2023-53450 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: remove a BUG_ON in ext4_mb_release_group_pa()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53450
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:12
|
| kernel-headers |
CVE-2023-53582 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53582
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53987 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via NULL dereference in ping socket handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53987
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54072 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: pcm: Fix potential data race at PCM memory allocation helpers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54072
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54102 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54102
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54110 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: rndis_host: Secure rndis_query check against int overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54110
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2024-53141 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53141
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-06 10:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2025-38000 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38000
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-06 13:15 修改: 2025-12-16 20:21
|
| kernel-headers |
CVE-2025-38001 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38001
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-06 14:15 修改: 2025-12-17 19:17
|
| kernel-headers |
CVE-2025-38509 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: reject VHT opmode for unsupported channel widths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38509
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 11:15 修改: 2025-11-19 17:22
|
| kernel-headers |
CVE-2025-40186 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Privilege escalation or Denial of Service via TCP Fast Open vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40186
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40204 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: Fix MAC comparison to be constant-time
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40204
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40248 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: vsock vulnerability may lead to memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40248
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40348 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40348
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68182 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68182
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68188 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68188
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68191 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udp_tunnel: use netdev_warn() instead of netdev_WARN()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68191
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68192 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68192
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68208 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: account for current allocated stack depth in widen_imprecise_scalars()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68208
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68215 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix PTP cleanup on driver removal in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68244 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68244
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68283 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: libceph: replace BUG_ON with bounds check for map->max_osd
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68283
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68284 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: libceph: prevent potential out-of-bounds writes in handle_auth_session_key()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68284
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68287 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68287
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68291 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68291
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68297 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix crash in process_v2_sparse_read() for encrypted directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68297
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68304 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_core: lookup hci_conn on RX path on protocol side
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68304
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68307 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68307
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68312 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usbnet: Prevents free active kevent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68312
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68342 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68342
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| kernel-headers |
CVE-2025-68343 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68343
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| kernel-headers |
CVE-2025-68770 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix XDP_TX path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68770
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68800 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68800
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71064 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns3: using the num_tqps in the vf driver to apply for resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71068 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: svcrdma: bound check rq_pages index in inline path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71068
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71077 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: Cap the number of PCR banks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71100 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71100
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-71128 |
高危 |
5.14.0-611.24.1.el9_7 |
|
kernel: erspan: Initialize options_len before referencing options
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71128
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| binutils |
CVE-2025-11082 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils |
CVE-2025-11083 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils |
CVE-2025-5245 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| binutils |
CVE-2025-7545 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils |
CVE-2025-7546 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils-gold |
CVE-2021-20197 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Race window allows users to own arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-03-26 17:15 修改: 2025-12-03 15:15
|
| binutils-gold |
CVE-2021-45078 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-12-15 20:15 修改: 2024-11-21 06:31
|
| binutils-gold |
CVE-2023-1579 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-03 23:15 修改: 2025-02-13 15:15
|
| binutils-gold |
CVE-2025-11081 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11081
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-27 22:15 修改: 2025-10-03 16:51
|
| binutils-gold |
CVE-2025-11082 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils-gold |
CVE-2025-11083 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils-gold |
CVE-2025-5245 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| binutils-gold |
CVE-2025-7545 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils-gold |
CVE-2025-7546 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| coreutils-single |
CVE-2025-5278 |
中危 |
8.32-39.el9 |
|
coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5278
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-05-27 21:15 修改: 2025-10-22 20:15
|
| cups-libs |
CVE-2023-4504 |
中危 |
1:2.3.3op2-34.el9_7.2 |
|
libppd: Postscript Parsing Heap Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4504
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-09-21 23:15 修改: 2025-11-04 17:15
|
| curl-minimal |
CVE-2025-14017 |
中危 |
7.76.1-34.el9 |
|
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14017
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-08 10:15 修改: 2026-01-16 16:15
|
| curl-minimal |
CVE-2025-9086 |
中危 |
7.76.1-34.el9 |
|
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| glib2 |
CVE-2025-13601 |
中危 |
2.68.4-18.el9_7 |
|
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39
|
| glib2 |
CVE-2025-14087 |
中危 |
2.68.4-18.el9_7 |
|
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18
|
| glib2 |
CVE-2025-14512 |
中危 |
2.68.4-18.el9_7 |
|
glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14512
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-12-11 07:16 修改: 2025-12-12 15:18
|
| glibc |
CVE-2026-0915 |
中危 |
2.34-231.el9_7.2 |
|
glibc: glibc: Information disclosure via zero-valued network query
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0915
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-15 22:16 修改: 2026-01-20 16:16
|
| glibc-common |
CVE-2026-0915 |
中危 |
2.34-231.el9_7.2 |
|
glibc: glibc: Information disclosure via zero-valued network query
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0915
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-15 22:16 修改: 2026-01-20 16:16
|
| glibc-minimal-langpack |
CVE-2026-0915 |
中危 |
2.34-231.el9_7.2 |
|
glibc: glibc: Information disclosure via zero-valued network query
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0915
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-15 22:16 修改: 2026-01-20 16:16
|
| gnupg2 |
CVE-2025-68972 |
中危 |
2.3.3-5.el9_7 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| avahi-libs |
CVE-2025-59529 |
中危 |
0.8-23.el9 |
|
avahi: simple clients denial-of-service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-59529
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-18 21:15 修改: 2026-01-16 16:50
|
| avahi-libs |
CVE-2025-68276 |
中危 |
0.8-23.el9 |
|
avahi: Avahi: Denial of Service via D-Bus record browsers with AVAHI_LOOKUP_USE_WIDE_AREA flag
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68276
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-12 18:15 修改: 2026-01-16 16:51
|
| avahi-libs |
CVE-2025-68468 |
中危 |
0.8-23.el9 |
|
avahi: Avahi: Denial of Service via crafted mDNS/DNS-SD announcements
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68468
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-12 18:15 修改: 2026-01-16 16:52
|
| avahi-libs |
CVE-2025-68471 |
中危 |
0.8-23.el9 |
|
avahi: Avahi: Denial of Service via unsolicited CNAME announcements
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68471
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-12 18:15 修改: 2026-01-16 16:53
|
| java-17-openjdk-headless |
CVE-2025-64505 |
中危 |
1:17.0.17.0.10-1.el9 |
|
libpng: LIBPNG heap buffer overflow via malformed palette index
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64505
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:28
|
| java-17-openjdk-headless |
CVE-2025-64506 |
中危 |
1:17.0.17.0.10-1.el9 |
|
libpng: LIBPNG heap buffer over-read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-64506
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-25 00:15 修改: 2025-11-26 18:34
|
| java-17-openjdk-headless |
CVE-2026-22693 |
中危 |
1:17.0.17.0.10-1.el9 |
|
harfbuzz: Null Pointer Dereference in harfbuzz
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22693
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-10 06:15 修改: 2026-01-13 14:03
|
| java-17-openjdk-headless |
CVE-2026-22695 |
中危 |
1:17.0.17.0.10-1.el9 |
|
libpng: libpng: Denial of service and information disclosure via heap buffer over-read in png_image_finish_read
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22695
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-12 23:15 修改: 2026-01-13 14:03
|
| java-17-openjdk-headless |
CVE-2026-22801 |
中危 |
1:17.0.17.0.10-1.el9 |
|
libpng: libpng: Information disclosure and denial of service via integer truncation in simplified write API
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22801
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-12 23:15 修改: 2026-01-13 14:03
|
| binutils |
CVE-2021-20197 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Race window allows users to own arbitrary files
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-03-26 17:15 修改: 2025-12-03 15:15
|
| binutils |
CVE-2021-45078 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: out-of-bounds write in stab_xcoff_builtin_type() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-12-15 20:15 修改: 2024-11-21 06:31
|
| binutils |
CVE-2023-1579 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: Heap-buffer-overflow binutils-gdb/bfd/libbfd.c in bfd_getl64
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1579
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-03 23:15 修改: 2025-02-13 15:15
|
| binutils |
CVE-2025-11081 |
中危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11081
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-27 22:15 修改: 2025-10-03 16:51
|
| kernel-headers |
CVE-2020-10135 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bluetooth: BR/EDR Bluetooth Impersonation Attacks (BIAS)
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-10135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2020-05-19 16:15 修改: 2024-11-21 04:54
|
| kernel-headers |
CVE-2020-13844 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM straight-line speculation vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-13844
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2020-06-08 23:15 修改: 2024-11-21 05:01
|
| kernel-headers |
CVE-2020-26140 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: accepting plaintext data frames in protected networks
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26140
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-05-11 20:15 修改: 2024-11-21 05:19
|
| kernel-headers |
CVE-2020-26144 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26144
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-05-11 20:15 修改: 2024-11-21 05:19
|
| kernel-headers |
CVE-2020-36558 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36558
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-07-21 04:15 修改: 2024-11-21 05:29
|
| kernel-headers |
CVE-2021-28711 |
中危 |
5.14.0-611.24.1.el9_7 |
|
xen: rogue backends can cause DoS of guests via high frequency events
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28711
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-01-05 17:15 修改: 2024-11-21 06:00
|
| kernel-headers |
CVE-2021-28712 |
中危 |
5.14.0-611.24.1.el9_7 |
|
xen: rogue backends can cause DoS of guests via high frequency events
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28712
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-01-05 17:15 修改: 2024-11-21 06:00
|
| kernel-headers |
CVE-2021-28713 |
中危 |
5.14.0-611.24.1.el9_7 |
|
xen: rogue backends can cause DoS of guests via high frequency events
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-28713
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-01-05 17:15 修改: 2024-11-21 06:00
|
| kernel-headers |
CVE-2021-33656 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33656
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-07-18 15:15 修改: 2025-04-02 18:33
|
| kernel-headers |
CVE-2021-34693 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: allows local users to obtain sensitive information from stack memory because of uninitialized data structure in net/can/bcm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34693
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-06-14 22:15 修改: 2024-11-21 06:10
|
| kernel-headers |
CVE-2021-34866 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eBPF verification flaw
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-34866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-01-25 16:15 修改: 2024-11-21 06:11
|
| kernel-headers |
CVE-2021-3714 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Remote Page Deduplication Attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3714
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-08-23 16:15 修改: 2024-11-21 06:22
|
| kernel-headers |
CVE-2021-37159 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-37159
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-07-21 15:16 修改: 2024-11-21 06:14
|
| kernel-headers |
CVE-2021-4135 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Heap information leak in map_lookup_elem function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-07-14 20:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-4202 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Race condition in nci_request() leads to use after free while the device is getting removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4202
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:37
|
| kernel-headers |
CVE-2021-4204 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: improper input validation may lead to privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4204
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-08-24 16:15 修改: 2024-11-21 06:37
|
| kernel-headers |
CVE-2021-42739 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Heap buffer overflow in firedtv driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-42739
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-10-20 07:15 修改: 2024-11-21 06:28
|
| kernel-headers |
CVE-2021-43975 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: out-of-bounds write in hw_atl_utils_fw_rpc_wait() in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-43975
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-11-17 17:15 修改: 2024-11-21 06:30
|
| kernel-headers |
CVE-2021-46931 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Wrap the tx reporter dump callback to extract the sq
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46931
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46999 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: do asoc update earlier in sctp_sf_do_dupcook_a
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46999
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-28 09:15 修改: 2025-01-08 17:36
|
| kernel-headers |
CVE-2021-47017 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: use after free in ath10k_htc_send_bundle
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47017
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-28 09:15 修改: 2024-12-09 17:59
|
| kernel-headers |
CVE-2021-47041 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet-tcp: fix incorrect locking in state_change sk callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47041
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-28 09:15 修改: 2024-12-06 18:41
|
| kernel-headers |
CVE-2021-47092 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: VMX: Always clear vmx->fail on emulation_required
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47092
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-04 18:15 修改: 2025-02-14 14:49
|
| kernel-headers |
CVE-2021-47097 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-04 18:15 修改: 2025-02-14 14:52
|
| kernel-headers |
CVE-2021-47103 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: inet: fully convert sk->sk_rx_dst to RCU rules
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47103
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-04 18:15 修改: 2025-02-14 15:03
|
| kernel-headers |
CVE-2021-47214 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hugetlb, userfaultfd: fix reservation restore on userfaultfd error
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47214
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-03-27 21:05
|
| kernel-headers |
CVE-2021-47223 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bridge: fix vlan tunnel dst null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47223
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-02-03 16:11
|
| kernel-headers |
CVE-2021-47227 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/fpu: Prevent state corruption in __fpu__restore_sig()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47227
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-29 19:41
|
| kernel-headers |
CVE-2021-47230 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Immediately reset the MMU context when the SMM flag is cleared
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47230
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:31
|
| kernel-headers |
CVE-2021-47238 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ipv4: fix memory leak in ip_mc_add1_src
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47238
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:31
|
| kernel-headers |
CVE-2021-47275 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bcache: avoid oversized read request in cache missing code path
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47275
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-30 14:49
|
| kernel-headers |
CVE-2021-47308 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: libfc: Fix array index out of bound exception
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47308
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:42
|
| kernel-headers |
CVE-2021-47316 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: fix NULL dereference in nfs3svc_encode_getaclres
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47316
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:28
|
| kernel-headers |
CVE-2021-47343 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm btree remove: assign new_root only when removal succeeds
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47343
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-05-12 19:58
|
| kernel-headers |
CVE-2021-47365 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: afs: Fix page leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47365
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-05-12 19:54
|
| kernel-headers |
CVE-2021-47378 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-rdma: destroy cm id before destroy qp to avoid use after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47378
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:52
|
| kernel-headers |
CVE-2021-47384 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47384
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:52
|
| kernel-headers |
CVE-2021-47386 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47386
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:52
|
| kernel-headers |
CVE-2021-47444 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47444
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 07:15 修改: 2025-09-25 16:01
|
| kernel-headers |
CVE-2021-47449 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix locking for Tx timestamp tracking flush
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47449
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 07:15 修改: 2025-04-02 15:12
|
| kernel-headers |
CVE-2021-47465 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47465
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 07:15 修改: 2025-09-24 18:39
|
| kernel-headers |
CVE-2021-47559 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47559
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47561 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: virtio: disable timeout handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47561
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:39
|
| kernel-headers |
CVE-2021-47572 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: nexthop: fix null pointer dereference when IPv6 is not enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47572
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47620 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: refactor malicious adv data check
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47620
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47632 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47632
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2021-47634 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47634
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-03-24 17:48
|
| kernel-headers |
CVE-2021-47646 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Revert "Revert "block, bfq: honor already-setup queue merges""
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47646
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-03-24 17:46
|
| kernel-headers |
CVE-2021-47648 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpu: host1x: Fix a memory leak in 'host1x_remove()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47648
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2021-47650 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: soc-compress: prevent the potentially use of null pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47650
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-09-23 18:47
|
| kernel-headers |
CVE-2021-47659 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/plane: Move range check for format_count earlier
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47659
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-10-14 19:07
|
| kernel-headers |
CVE-2022-0171 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: cache incoherence issue in SEV API may lead to kernel crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0171
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-08-26 18:15 修改: 2024-11-21 06:38
|
| kernel-headers |
CVE-2022-0500 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0500
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-03-25 19:15 修改: 2024-11-21 06:38
|
| kernel-headers |
CVE-2022-1247 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: A race condition bug in rose_connect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1247
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-08-31 16:15 修改: 2024-11-21 06:40
|
| kernel-headers |
CVE-2022-1974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: use-after-free in /net/nfc/core.c causes kernel crash by simulating nfc device from user-space
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-08-31 16:15 修改: 2024-11-21 06:41
|
| kernel-headers |
CVE-2022-20153 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: possible use-after-free due to improper locking in rcu_cblist_dequeue of rcu_segcblist.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20153
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-06-15 14:15 修改: 2024-11-21 06:42
|
| kernel-headers |
CVE-2022-20154 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: possible use after free in lock_sock_nested of sock.c for the SCTP protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-20154
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-06-15 14:15 修改: 2024-11-21 06:42
|
| kernel-headers |
CVE-2022-23222 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: local privileges escalation in kernel/bpf/verifier.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23222
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-01-14 08:15 修改: 2024-11-21 06:48
|
| kernel-headers |
CVE-2022-25265 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Executable Space Protection Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25265
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-02-16 21:15 修改: 2024-11-21 06:51
|
| kernel-headers |
CVE-2022-26878 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Memory leak in Linux VirtIO Bluetooth driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26878
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-03-11 07:15 修改: 2025-05-05 14:12
|
| kernel-headers |
CVE-2022-26966 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: heap memory leak in drivers/net/usb/sr9700.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-26966
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-03-12 22:15 修改: 2024-11-21 06:54
|
| kernel-headers |
CVE-2022-27672 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: AMD: Cross-Thread Return Address Predictions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27672
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-03-01 08:15 修改: 2024-11-21 06:56
|
| kernel-headers |
CVE-2022-2785 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: out-of-bounds read due to improper check of bpf_sys_bpf() arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2785
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-09-23 11:15 修改: 2024-11-21 07:01
|
| kernel-headers |
CVE-2022-3424 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Use after Free in gru_set_context_option leading to kernel panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3424
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-03-06 23:15 修改: 2025-03-06 21:15
|
| kernel-headers |
CVE-2022-4543 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KASLR Prefetch Bypass Breaks KPTI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4543
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-01-11 15:15 修改: 2025-04-08 20:15
|
| kernel-headers |
CVE-2022-48638 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48638
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-03-21 18:13
|
| kernel-headers |
CVE-2022-48644 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: taprio: avoid disabling offload when it was never enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48644
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-09-19 14:57
|
| kernel-headers |
CVE-2022-48652 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix crash by keep old cfg when update TCs more than queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48652
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-09-19 15:01
|
| kernel-headers |
CVE-2022-48653 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: double unplug aux on peer initiated reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48653
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-09-19 15:02
|
| kernel-headers |
CVE-2022-48696 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regmap: spi: Reserve space for register address/padding
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48696
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 16:15 修改: 2025-04-08 15:50
|
| kernel-headers |
CVE-2022-48719 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48719
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48744 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Avoid field-overflowing memcpy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48744
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2026-01-21 16:08
|
| kernel-headers |
CVE-2022-48751 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Transitional solution for clcsock race issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48751
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-01-06 21:47
|
| kernel-headers |
CVE-2022-48773 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48773
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48778 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mtd: rawnand: gpmi: don't leak PM reference in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48778
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48780 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Avoid overwriting the copies of clcsock callback functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48780
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:32
|
| kernel-headers |
CVE-2022-48781 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: af_alg - get rid of alg_memory_allocated
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48781
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48783 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: lantiq_gswip: fix use after free in gswip_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48783
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48784 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cfg80211: fix race in netlink owner interface destruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48784
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-02-03 15:43
|
| kernel-headers |
CVE-2022-48785 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48785
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:33
|
| kernel-headers |
CVE-2022-48787 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iwlwifi: fix use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48787
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48793 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: nSVM: fix potential NULL derefernce on nested migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48793
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48797 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: don't try to NUMA-migrate COW pages that have other uses
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48797
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:06
|
| kernel-headers |
CVE-2022-48799 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf: Fix list corruption in perf_cgroup_switch()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48799
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:11
|
| kernel-headers |
CVE-2022-48802 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/proc: task_mmu.c: don't read mapcount for migration entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48802
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:13
|
| kernel-headers |
CVE-2022-48804 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vt_ioctl: fix array_index_nospec in vt_setactivate
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48804
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48810 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48810
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:19
|
| kernel-headers |
CVE-2022-48811 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ibmvnic: don't release napi in __ibmvnic_open()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48811
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-09-25 19:37
|
| kernel-headers |
CVE-2022-48816 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: lock against ->sock changing during sysfs read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48816
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-06 17:07
|
| kernel-headers |
CVE-2022-48819 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48819
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-07 19:53
|
| kernel-headers |
CVE-2022-48830 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: isotp: fix potential CAN frame reception race in isotp_rcv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48830
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-09-25 19:22
|
| kernel-headers |
CVE-2022-48831 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ima: fix reference leak in asymmetric_verify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48831
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-09-25 20:08
|
| kernel-headers |
CVE-2022-48832 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: audit: don't deref the syscall args when checking the openat2 open_how::flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48832
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-07 20:04
|
| kernel-headers |
CVE-2022-48834 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: usbtmc: Fix bug in pipe direction for control transfers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48834
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2025-01-22 18:03
|
| kernel-headers |
CVE-2022-48835 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpt3sas: Page fault in reply q processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48835
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48836 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: aiptek - properly check endpoint type
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48837 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: gadget: rndis: prevent integer overflow in rndis_set_response()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48837
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48839 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/packet: fix slab-out-of-bounds access in packet_recvmsg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48839
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48840 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iavf: Fix hang during reboot/shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48844 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_core: Fix leaking sent_cmd skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48844
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48848 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/osnoise: Do not unregister events twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48848
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48849 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: bypass tiling flag check in virtual display case (v2)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48849
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2025-06-19 13:15
|
| kernel-headers |
CVE-2022-48850 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net-sysfs: add check for netdevice being present to speed_show
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48850
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: swiotlb: fix info leak with DMA_FROM_DEVICE
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2025-12-21 12:15
|
| kernel-headers |
CVE-2022-48858 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix a race on command flush flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48858
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48861 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa: fix use-after-free on vp_vdpa_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48862 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost: fix hung thread due to erroneous iotlb entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48863 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mISDN: Fix memory leak in dsp_pipeline_build()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48863
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48864 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48864
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48865 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix kernel panic when enabling bearer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48865
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48866 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48875 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: sdata can be NULL during AMPDU start
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48875
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-04 18:33
|
| kernel-headers |
CVE-2022-48876 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fix initialization of rx->link and rx->link_sta
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48876
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:41
|
| kernel-headers |
CVE-2022-48879 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: efi: fix NULL-deref in init error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48879
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-08-29 02:39
|
| kernel-headers |
CVE-2022-48885 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix potential memory leak in ice_gnss_tty_write()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48885
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:46
|
| kernel-headers |
CVE-2022-48886 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Add check for kzalloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48886
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:48
|
| kernel-headers |
CVE-2022-48889 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: sof-nau8825: fix module alias overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:08
|
| kernel-headers |
CVE-2022-48899 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/virtio: Fix GEM handle creation UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48899
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:22
|
| kernel-headers |
CVE-2022-48913 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blktrace: fix use after free for struct blk_trace
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48913
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:12
|
| kernel-headers |
CVE-2022-48914 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen/netfront: destroy queues before real_num_tx_queues is zeroed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48914
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 02:15 修改: 2024-09-12 13:27
|
| kernel-headers |
CVE-2022-48915 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48915
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 02:15 修改: 2024-08-27 16:07
|
| kernel-headers |
CVE-2022-48921 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/fair: Fix fault in reweight_entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48921
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 02:15 修改: 2024-09-12 12:58
|
| kernel-headers |
CVE-2022-48929 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48929
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 04:15 修改: 2024-08-23 02:00
|
| kernel-headers |
CVE-2022-48931 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: configfs: fix a race in configfs_{,un}register_subsystem()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48931
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 04:15 修改: 2024-08-23 01:54
|
| kernel-headers |
CVE-2022-48934 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48934
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 04:15 修改: 2024-08-22 20:33
|
| kernel-headers |
CVE-2022-48938 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: CDC-NCM: avoid overflow in sanity checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48938
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 04:15 修改: 2024-11-08 16:15
|
| kernel-headers |
CVE-2022-48943 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86/mmu: make apf token non-zero to fix bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48943
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 04:15 修改: 2024-08-22 18:27
|
| kernel-headers |
CVE-2022-48946 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: Fix preallocation discarding at indirect extent boundary
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48946
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:13
|
| kernel-headers |
CVE-2022-48950 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf: Fix perf_pending_task() UaF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48950
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:02
|
| kernel-headers |
CVE-2022-48951 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: ops: Check bounds for second channel in snd_soc_put_volsw_sx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48951
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:01
|
| kernel-headers |
CVE-2022-48953 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtc: cmos: Fix event handler registration ordering issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48953
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 20:07
|
| kernel-headers |
CVE-2022-48961 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mdio: fix unbalanced fwnode reference count in mdio_device_release()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48961
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 20:02
|
| kernel-headers |
CVE-2022-48969 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen-netfront: Fix NULL sring after live migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48969
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 21:22
|
| kernel-headers |
CVE-2022-48971 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix not cleanup led when bt_init fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48971
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:23
|
| kernel-headers |
CVE-2022-48972 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mac802154: fix missing INIT_LIST_HEAD in ieee802154_if_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48972
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:22
|
| kernel-headers |
CVE-2022-48974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: conntrack: fix using __this_cpu_add in preemptible
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:25
|
| kernel-headers |
CVE-2022-48975 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpiolib: fix memory leak in gpiochip_setup_dev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48975
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:48
|
| kernel-headers |
CVE-2022-48981 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/shmem-helper: Remove errant put in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48981
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:33
|
| kernel-headers |
CVE-2022-48982 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix crash when replugging CSR fake controllers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48982
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-09-08 16:15
|
| kernel-headers |
CVE-2022-48983 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48983
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:58
|
| kernel-headers |
CVE-2022-48984 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: slcan: fix freed work crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48984
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:53
|
| kernel-headers |
CVE-2022-48985 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mana: Fix race on per-CQ variable napi work_done
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48985
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-07 19:35
|
| kernel-headers |
CVE-2022-48986 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/gup: fix gup_pud_range() for dax
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48986
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:30
|
| kernel-headers |
CVE-2022-48987 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: v4l2-dv-timings.c: fix too strict blanking sanity checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48987
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:27
|
| kernel-headers |
CVE-2022-48988 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memcg: fix possible use-after-free in memcg_write_event_control()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48988
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-01 15:20
|
| kernel-headers |
CVE-2022-48989 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fscache: Fix oops due to race with cookie_lru and use_cookie
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48989
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 16:02
|
| kernel-headers |
CVE-2022-48990 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix use-after-free during gpu recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48990
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 16:03
|
| kernel-headers |
CVE-2022-48991 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48991
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-07 19:36
|
| kernel-headers |
CVE-2022-48994 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48994
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-07 13:52
|
| kernel-headers |
CVE-2022-49006 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Free buffers when a used dynamic event is removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49006
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-04 13:16
|
| kernel-headers |
CVE-2022-49011 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49011
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:01
|
| kernel-headers |
CVE-2022-49012 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: afs: Fix server->active leak in afs_put_server
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:07
|
| kernel-headers |
CVE-2022-49013 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: fix memory leak in sctp_stream_outq_migrate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:09
|
| kernel-headers |
CVE-2022-49014 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tun: Fix use-after-free in tun_detach()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49014
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:29
|
| kernel-headers |
CVE-2022-49015 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hsr: Fix potential use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49015
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:31
|
| kernel-headers |
CVE-2022-49017 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: re-fetch skb cb after tipc_msg_validate
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49017
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:36
|
| kernel-headers |
CVE-2022-49021 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: fix null-ptr-deref while probe() failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49021
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:44
|
| kernel-headers |
CVE-2022-49022 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49022
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 18:48
|
| kernel-headers |
CVE-2022-49024 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49024
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 03:50
|
| kernel-headers |
CVE-2022-49028 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ixgbevf: Fix resource leak in ixgbevf_init_module()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49028
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 15:51
|
| kernel-headers |
CVE-2022-49029 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49029
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 15:59
|
| kernel-headers |
CVE-2022-49048 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: fix panic when forwarding a pkt with no in6 dev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49048
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-14 19:06
|
| kernel-headers |
CVE-2022-49052 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: fix unexpected zeroed page mapping with zram swap
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49052
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-14 19:05
|
| kernel-headers |
CVE-2022-49053 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: tcmu: Fix possible page UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49053
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-24 17:43
|
| kernel-headers |
CVE-2022-49060 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49060
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49061 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49061
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49062 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cachefiles: Fix KASAN slab-out-of-bounds in cachefiles_set_volume_xattr
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49062
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49074 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: irqchip/gic-v3: Fix GICR_CTLR.RWP polling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49074
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-14 20:31
|
| kernel-headers |
CVE-2022-49076 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/hfi1: Fix use-after-free bug for mm struct
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49076
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-24 17:42
|
| kernel-headers |
CVE-2022-49077 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-14 20:26
|
| kernel-headers |
CVE-2022-49078 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: lz4: fix LZ4_decompress_safe_partial read out of bound
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-12-19 14:58
|
| kernel-headers |
CVE-2022-49082 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 18:55
|
| kernel-headers |
CVE-2022-49087 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: fix a race in rxrpc_exit_net()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49087
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 16:21
|
| kernel-headers |
CVE-2022-49089 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49089
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 18:11
|
| kernel-headers |
CVE-2022-49092 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ipv4: fix route with nexthop object delete warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49092
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-14 20:22
|
| kernel-headers |
CVE-2022-49094 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/tls: fix slab-out-of-bounds bug in decrypt_internal
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49094
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 16:41
|
| kernel-headers |
CVE-2022-49096 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sfc: add missing xdp queue reinitialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49096
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49100 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio_console: eliminate anonymous module_init & module_exit
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49100
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-14 20:01
|
| kernel-headers |
CVE-2022-49110 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: conntrack: revisit gc autotuning
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49110
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 18:16
|
| kernel-headers |
CVE-2022-49118 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: hisi_sas: Free irq vectors in order for v3 HW
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-15 19:44
|
| kernel-headers |
CVE-2022-49123 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ath11k: Fix frames flush failure caused by deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49123
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49129 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mt76: mt7921: fix crash when startup fails.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49129
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 16:18
|
| kernel-headers |
CVE-2022-49130 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ath11k: mhi: use mhi_sync_power_up()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49130
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49132 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ath11k: pci: fix crash on suspend if board file is not found
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49132
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 18:17
|
| kernel-headers |
CVE-2022-49134 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum: Guard against invalid local ports
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49134
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49138 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_event: Ignore multiple conn complete events
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49138
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 18:23
|
| kernel-headers |
CVE-2022-49148 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: watch_queue: Free the page array when watch_queue is dismantled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49148
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49149 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix call timer start racing with call destruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49149
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 13:53
|
| kernel-headers |
CVE-2022-49154 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: fix panic on out-of-bounds guest IRQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49154
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 14:11
|
| kernel-headers |
CVE-2022-49159 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Implement ref count for SRB
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49159
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 14:14
|
| kernel-headers |
CVE-2022-49171 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: don't BUG if someone dirty pages without asking ext4 first
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49171
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 13:39
|
| kernel-headers |
CVE-2022-49174 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49174
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-22 17:16
|
| kernel-headers |
CVE-2022-49176 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bfq: fix use-after-free in bfq_dispatch_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49176
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 16:11
|
| kernel-headers |
CVE-2022-49179 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block, bfq: don't move oom_bfqq
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49179
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 15:07
|
| kernel-headers |
CVE-2022-49182 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns3: add vlan list lock to protect vlan list
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49182
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 15:07
|
| kernel-headers |
CVE-2022-49187 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: Fix clk_hw_get_clk() when dev is NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49187
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49190 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kernel/resource: fix kfree() of bootmem memory again
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49190
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-11-03 20:15
|
| kernel-headers |
CVE-2022-49196 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries: Fix use after free in remove_phb_dynamic()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49196
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 15:07
|
| kernel-headers |
CVE-2022-49198 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 13:50
|
| kernel-headers |
CVE-2022-49208 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/irdma: Prevent some integer underflows
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49208
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49215 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: Fix race at socket teardown
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49216 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49216
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49218 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/dp: Fix OOB read when handling Post Cursor2 register
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49218
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49219 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfio/pci: fix memory leak during D3hot to D0 transition
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49219
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-11-03 20:15
|
| kernel-headers |
CVE-2022-49231 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtw88: fix memory overrun and memory leak during hw_scan
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49231
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49236 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix UAF due to race between btf_try_get_module and load_module
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49236
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 15:08
|
| kernel-headers |
CVE-2022-49237 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ath11k: add missing of_node_put() to avoid leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49237
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49262 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: octeontx2 - remove CONFIG_DM_CRYPT check
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49262
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-09-22 20:57
|
| kernel-headers |
CVE-2022-49266 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix rq-qos breakage from skipping rq_qos_done_bio()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49266
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 11:50
|
| kernel-headers |
CVE-2022-49269 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: isotp: sanitize CAN ID checks in isotp_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49269
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 11:46
|
| kernel-headers |
CVE-2022-49275 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: m_can: m_can_tx_handler(): fix use after free of skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49275
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 15:24
|
| kernel-headers |
CVE-2022-49279 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: prevent integer overflow on 32 bit systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49279
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49286 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: use try_get_ops() in tpm-space.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49286
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-09-22 19:35
|
| kernel-headers |
CVE-2022-49288 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: pcm: Fix races among concurrent prealloc proc writes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49288
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 15:24
|
| kernel-headers |
CVE-2022-49294 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: Check if modulo is 0 before dividing.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49294
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49296 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix possible deadlock when holding Fwb to get inline_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49296
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49307 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: synclink_gt: Fix null-pointer-dereference in slgt_clean()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49307
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49314 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: Fix a possible resource leak in icom_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49314
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49316 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4: Don't hold the layoutget locks across multiple RPC calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49316
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49321 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xprtrdma: treat all calls not a bcall when bc_serv is NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49321
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49323 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49323
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49329 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vduse: Fix NULL pointer dereference on sysfs access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49329
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49332 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Address NULL pointer dereference after starget_to_rport()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49332
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49341 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, arm64: Clear prog->jited_len along prog->jited
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49341
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:18
|
| kernel-headers |
CVE-2022-49344 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: af_unix: Fix a data-race in unix_dgram_peer_wake_me().
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49344
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49349 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix use-after-free in ext4_rename_dir_prepare
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49349
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 14:51
|
| kernel-headers |
CVE-2022-49357 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: efi: Do not import certificates from UEFI Secure Boot for T2 Macs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49357
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:17
|
| kernel-headers |
CVE-2022-49370 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49370
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49371 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver core: fix deadlock in __device_attach
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49371
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49377 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: don't touch ->tagset in blk_mq_get_sq_hctx
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49377
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 14:58
|
| kernel-headers |
CVE-2022-49384 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: fix double free of io_acct_set bioset
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49384
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49385 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver: base: fix UAF when driver_attach failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49385
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 14:58
|
| kernel-headers |
CVE-2022-49388 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: ubi_create_volume: Fix use-after-free when volume creation failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49388
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 14:59
|
| kernel-headers |
CVE-2022-49389 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: usbip: fix a refcount leak in stub_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49389
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49390 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: macsec: fix UAF bug for real_dev
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49390
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 13:48
|
| kernel-headers |
CVE-2022-49395 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: um: Fix out-of-bounds read in LDT setup
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49395
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49400 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: Don't set mddev private to NULL in raid0 pers->free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49400
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49403 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: lib/string_helpers: fix not adding strarray to device's resource list
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49403
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49404 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/hfi1: Fix potential integer multiplication overflow errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49404
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49406 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: Fix potential deadlock in blk_ia_range_sysfs_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49406
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49407 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dlm: fix plock invalid read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49407
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-09-22 19:58
|
| kernel-headers |
CVE-2022-49408 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix memory leak in parse_apply_sb_mount_options()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49408
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2022-49410 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix potential double free in create_var_ref()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49410
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49411 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bfq: Make sure bfqg for which we are queueing requests is online
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49411
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 13:42
|
| kernel-headers |
CVE-2022-49412 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bfq: Avoid merging queues with different parents
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49412
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-06-19 13:15
|
| kernel-headers |
CVE-2022-49414 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix race condition between ext4_write and ext4_convert_inline_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49414
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49416 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fix use-after-free in chanctx code
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49416
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:57
|
| kernel-headers |
CVE-2022-49419 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49419
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:57
|
| kernel-headers |
CVE-2022-49420 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: annotate races around sk->sk_bound_dev_if
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49420
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:13
|
| kernel-headers |
CVE-2022-49426 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/arm-smmu-v3-sva: Fix mm use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49426
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:58
|
| kernel-headers |
CVE-2022-49437 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/xive: Fix refcount leak in xive_spapr_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49437
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49441 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: fix deadlock caused by calling printk() under tty_port->lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49441
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49444 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: module: fix [e_shstrndx].sh_size=0 OOB access
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49444
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 17:26
|
| kernel-headers |
CVE-2022-49446 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvdimm: Fix firmware activation deadlock scenarios
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49446
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49450 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix listen() setting the bar too high for the prealloc rings
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49450
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49455 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: misc: ocxl: fix possible double free in ocxl_file_register_afu
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49455
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49456 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: fix missed rcu protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49456
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-22 17:24
|
| kernel-headers |
CVE-2022-49465 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-throttle: Set BIO_THROTTLED when bio has been throttled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49465
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2026-01-21 16:08
|
| kernel-headers |
CVE-2022-49468 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal/core: Fix memory leak in __thermal_cooling_device_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49468
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49471 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtw89: cfo: check mac_id to avoid out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49471
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49472 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: micrel: Allow probing without .driver_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49472
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49474 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49474
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:59
|
| kernel-headers |
CVE-2022-49475 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49475
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49479 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mt76: fix tx status related use-after-free race on station removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49479
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:59
|
| kernel-headers |
CVE-2022-49481 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49481
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49486 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49486
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49492 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49492
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49493 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: rt5645: Fix errorenous cleanup order
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49493
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-09-03 17:15
|
| kernel-headers |
CVE-2022-49497 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: remove two BUG() from skb_checksum_help()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49497
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49503 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: ath9k_htc out-of-bounds access vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49503
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:09
|
| kernel-headers |
CVE-2022-49508 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: elan: Fix potential double free in elan_input_configured
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49508
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49518 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: ipc3-topology: Correct get_control_data for non bytes payload
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49518
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:07
|
| kernel-headers |
CVE-2022-49521 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49521
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:07
|
| kernel-headers |
CVE-2022-49523 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ath11k: disable spectral scan during spectral deinit
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49523
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49526 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/bitmap: don't set sb values if can't pass sanity check
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49526
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:05
|
| kernel-headers |
CVE-2022-49534 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49534
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49535 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49535
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-11-18 15:09
|
| kernel-headers |
CVE-2022-49536 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49536
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49542 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49542
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49548 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix potential array overflow in bpf_trampoline_get_progs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49548
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49556 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49556
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-02-26 07:01
|
| kernel-headers |
CVE-2022-49567 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/mempolicy: fix uninit-value in mpol_rebind_policy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49567
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-12-23 14:16
|
| kernel-headers |
CVE-2022-49571 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: Fix data-races around sysctl_tcp_max_reordering.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49571
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49578 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ip: Fix data-races around sysctl_ip_prot_sock.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49578
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49581 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: be2net buffer overflow in be_get_module_eeprom
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49581
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-22 19:10
|
| kernel-headers |
CVE-2022-49583 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iavf: Fix handling of dummy receive descriptors
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49583
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49597 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: Fix data-races around sysctl_tcp_base_mss.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49597
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49607 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49607
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49611 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/speculation: Fill RSB on vmexit for IBRS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49611
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-23 12:08
|
| kernel-headers |
CVE-2022-49613 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: 8250: Fix PM usage_count for console handover
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49613
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-23 12:08
|
| kernel-headers |
CVE-2022-49615 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49615
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49616 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: rt7*-sdw: harden jack_detect_handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49616
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-23 12:08
|
| kernel-headers |
CVE-2022-49617 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: sof_sdw: handle errors on card registration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49617
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-23 12:08
|
| kernel-headers |
CVE-2022-49620 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tipc: fix possible refcount leak in tipc_sk_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49620
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49624 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: atlantic: remove aq_nic_deinit() when resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49624
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-23 12:09
|
| kernel-headers |
CVE-2022-49626 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sfc: fix use after free when disabling sriov
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49626
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:49
|
| kernel-headers |
CVE-2022-49627 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ima: Fix potential memory leak in ima_init_crypto()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49627
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2022-49638 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: icmp: Fix data-races around sysctl.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49638
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49643 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ima: Fix a potential integer overflow in ima_appraise_measurement
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49643
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49644 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49644
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49647 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cgroup: Use separate src/dst nodes when preloading css_sets for migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49647
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:00
|
| kernel-headers |
CVE-2022-49651 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: srcu: Tighten cleanup_srcu_struct() GP checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49651
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:03
|
| kernel-headers |
CVE-2022-49656 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: meson: Fix refcount leak in meson_smp_prepare_cpus
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49656
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49657 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usbnet: fix memory leak in error case
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49657
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49658 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix insufficient bounds propagation from adjust_scalar_min_max_vals
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49658
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-23 12:10
|
| kernel-headers |
CVE-2022-49662 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: fix lockdep splat in in6_dump_addrs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49662
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-23 15:58
|
| kernel-headers |
CVE-2022-49664 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: move bc link creation back to tipc_node_create
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49664
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49667 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bonding: fix use-after-free after 802.3ad slave unbind
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49667
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:07
|
| kernel-headers |
CVE-2022-49670 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: linux/dim: Fix divide by 0 in RDMA DIM
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49670
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49671 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/cm: Fix memory leak in ib_cm_insert_listen
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49671
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49672 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tun: unlink NAPI from device on destruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49672
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-24 15:52
|
| kernel-headers |
CVE-2022-49679 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: Fix refcount leak in axxia_boot_secondary
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49679
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49694 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: disable the elevator int del_gendisk
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49694
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:27
|
| kernel-headers |
CVE-2022-49696 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix use-after-free Read in tipc_named_reinit
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49696
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 13:39
|
| kernel-headers |
CVE-2022-49700 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/slub: add missing TID updates on slab deactivation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49700
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 13:37
|
| kernel-headers |
CVE-2022-49715 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49715
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49716 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49716
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49720 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: Fix handling of offline queues in blk_mq_alloc_request_hctx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49720
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49728 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: Fix signed integer overflow in __ip6_append_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-11-03 20:15
|
| kernel-headers |
CVE-2022-49740 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49740
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2022-49743 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ovl: Use "buf" flexible array for memcpy() destination
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49743
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2022-49750 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: CPPC: Add u64 casts to avoid overflowing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49750
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2022-49753 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: Fix double increment of client_count in dma_chan_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49753
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-04-01 15:41
|
| kernel-headers |
CVE-2022-49759 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: VMCI: Use threaded irqs instead of tasklets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49759
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2022-49764 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Prevent bpf program recursion for raw tracepoint probes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49764
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:15 修改: 2025-11-06 21:58
|
| kernel-headers |
CVE-2022-49771 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm ioctl: fix misbehavior if list_versions races with module loading
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49771
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 18:25
|
| kernel-headers |
CVE-2022-49776 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: macvlan: enforce a consistent minimal mtu
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49776
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 18:40
|
| kernel-headers |
CVE-2022-49779 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49779
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 17:47
|
| kernel-headers |
CVE-2022-49780 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49780
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 17:47
|
| kernel-headers |
CVE-2022-49781 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/amd: Fix crash due to race between amd_pmu_enable_all, perf NMI and throttling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49781
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 17:47
|
| kernel-headers |
CVE-2022-49783 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/fpu: Drop fpregs lock before inheriting FPU permissions
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49783
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 17:48
|
| kernel-headers |
CVE-2022-49786 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-cgroup: properly pin the parent in blkcg_css_online
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49786
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 17:49
|
| kernel-headers |
CVE-2022-49791 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: fix multishot accept request leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49791
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-05 15:19
|
| kernel-headers |
CVE-2022-49797 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49797
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-06 18:21
|
| kernel-headers |
CVE-2022-49799 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix wild-memory-access in register_synth_event()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49799
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 19:33
|
| kernel-headers |
CVE-2022-49801 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix memory leak in tracing_read_pipe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49801
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 19:34
|
| kernel-headers |
CVE-2022-49802 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix null pointer dereference in ftrace_add_mod()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49802
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 19:02
|
| kernel-headers |
CVE-2022-49803 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netdevsim: Fix memory leak of nsim_dev->fa_cookie
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49803
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 19:20
|
| kernel-headers |
CVE-2022-49810 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfs: Fix missing xas_retry() calls in xarray iteration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49810
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 19:31
|
| kernel-headers |
CVE-2022-49812 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bridge: switchdev: Fix memory leaks when changing VLAN protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49812
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 18:54
|
| kernel-headers |
CVE-2022-49819 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeon_ep: fix potential memory leak in octep_device_setup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49819
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 20:57
|
| kernel-headers |
CVE-2022-49821 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mISDN: fix possible memory leak in mISDN_dsp_element_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49821
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 20:17
|
| kernel-headers |
CVE-2022-49822 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: Fix connections leak when tlink setup failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49822
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 20:17
|
| kernel-headers |
CVE-2022-49823 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ata: libata-transport: fix error handling in ata_tdev_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 20:16
|
| kernel-headers |
CVE-2022-49824 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ata: libata-transport: fix error handling in ata_tlink_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49824
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 20:16
|
| kernel-headers |
CVE-2022-49825 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ata: libata-transport: fix error handling in ata_tport_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49825
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 20:16
|
| kernel-headers |
CVE-2022-49829 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/scheduler: fix fence ref counting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49829
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 20:07
|
| kernel-headers |
CVE-2022-49832 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49832
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 19:57
|
| kernel-headers |
CVE-2022-49836 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: siox: fix possible memory leak in siox_device_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:13
|
| kernel-headers |
CVE-2022-49837 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix memory leaks in __check_func_call
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49837
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49838 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: clear out_curr if all frag chunks of current msg are pruned
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49838
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:13
|
| kernel-headers |
CVE-2022-49840 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, test_run: Fix alignment problem in bpf_prog_test_run_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49844 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: dev: fix skb drop check
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49844
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49845 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: j1939: j1939_send_one(): fix missing CAN header initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49845
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49847 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ethernet: ti: am65-cpsw: Fix segmentation fault at module unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49847
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:14
|
| kernel-headers |
CVE-2022-49853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: macvlan: fix memory leaks of macvlan_common_newlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49858 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: Fix SQE threshold checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49858
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:03
|
| kernel-headers |
CVE-2022-49860 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: ti: k3-udma-glue: fix memory leak when register device fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49860
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49863 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: af_can: fix NULL pointer dereference in can_rx_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49863
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49865 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49865
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-05-02 13:52
|
| kernel-headers |
CVE-2022-49866 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: wwan: mhi: fix memory leak in mhi_mbim_dellink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49867 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: wwan: iosm: fix memory leak in ipc_wwan_dellink
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49867
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49870 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: capabilities: fix undefined behavior in bit shift for CAP_TO_MASK
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49870
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:04
|
| kernel-headers |
CVE-2022-49871 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tun: Fix memory leaks of napi_get_frags
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49871
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49876 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49876
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49877 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49877
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:05
|
| kernel-headers |
CVE-2022-49879 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix BUG_ON() when directory entry has invalid rec_len
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49879
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:20
|
| kernel-headers |
CVE-2022-49881 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: fix memory leak in query_regdb_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49881
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49883 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49883
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:19
|
| kernel-headers |
CVE-2022-49885 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49885
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49892 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix use-after-free for dynamic ftrace_ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49892
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-05-07 13:19
|
| kernel-headers |
CVE-2022-49893 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/region: Fix cxl_region leak, cleanup targets at region delete
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49893
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:18
|
| kernel-headers |
CVE-2022-49894 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/region: Fix region HPA ordering validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49894
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49895 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/region: Fix decoder allocation crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49895
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49900 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: piix4: Fix adapter not be removed in piix4_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49900
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:18
|
| kernel-headers |
CVE-2022-49901 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: Fix kmemleak in blk_mq_init_allocated_queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49901
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2022-49905 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Fix possible leaked pernet namespace in smc_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49905
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-11 01:42
|
| kernel-headers |
CVE-2022-49908 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: L2CAP: Fix memory leak in vhci_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49908
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49918 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipvs: fix WARNING in __ip_vs_cleanup_batch()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49918
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-12 15:59
|
| kernel-headers |
CVE-2022-49921 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sched: Fix use after free in red_enqueue()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49921
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 15:15
|
| kernel-headers |
CVE-2022-49925 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/core: Fix null-ptr-deref in ib_core_cleanup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49925
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 15:15
|
| kernel-headers |
CVE-2022-49928 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49928
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 15:15
|
| kernel-headers |
CVE-2022-49929 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix mr leak in RESPST_ERR_RNR
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49929
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-12 15:57
|
| kernel-headers |
CVE-2022-49931 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/hfi1: Correctly move list in sc_disable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49931
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 15:15
|
| kernel-headers |
CVE-2022-49932 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49932
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 15:56
|
| kernel-headers |
CVE-2022-49948 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vt: Clear selection before changing the font
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49948
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-14 19:49
|
| kernel-headers |
CVE-2022-49963 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/ttm: fix CCS handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49963
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-14 18:08
|
| kernel-headers |
CVE-2022-49970 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, cgroup: Fix kernel BUG in purge_effective_progs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49970
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-06-18 13:46
|
| kernel-headers |
CVE-2022-49972 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: Fix corrupted packets for XDP_SHARED_UMEM
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49972
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-13 21:23
|
| kernel-headers |
CVE-2022-49987 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: call __md_stop_writes in md_stop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49987
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-14 18:13
|
| kernel-headers |
CVE-2022-49989 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen/privcmd: fix error exit of privcmd_ioctl_dm_op()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49989
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-14 18:12
|
| kernel-headers |
CVE-2022-50008 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kprobes: don't call disarm_kprobe() for disabled kprobes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-14 16:59
|
| kernel-headers |
CVE-2022-50043 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: fix potential refcount leak in ndisc_router_discovery()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50043
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-13 18:32
|
| kernel-headers |
CVE-2022-50059 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: don't leak snap_rwsem in handle_cap_grant
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50059
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-13 18:10
|
| kernel-headers |
CVE-2022-50060 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-af: Fix mcam entry resource leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50060
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-13 18:10
|
| kernel-headers |
CVE-2022-50065 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio_net: fix memory leak inside XPD_TX with mergeable
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50065
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-17 18:27
|
| kernel-headers |
CVE-2022-50082 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix warning in ext4_iomap_begin as race between bmap and write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-18 02:38
|
| kernel-headers |
CVE-2022-50098 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50098
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 14:11
|
| kernel-headers |
CVE-2022-50103 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched, cpuset: Fix dl_cpu_busy() panic due to empty cs->cpus_allowed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50103
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 13:29
|
| kernel-headers |
CVE-2022-50118 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/perf: Optimize clearing the pending PMI and remove WARN_ON for PMI check in power_pmu_disable
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-18 18:13
|
| kernel-headers |
CVE-2022-50130 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: staging: fbtft: core: set smem_len before fb_deferred_io_init call
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50130
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-18 18:09
|
| kernel-headers |
CVE-2022-50142 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: intel_th: msu: Fix vmalloced buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50142
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 13:29
|
| kernel-headers |
CVE-2022-50144 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soundwire: revisit driver bind/unbind and callbacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50144
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-20 21:38
|
| kernel-headers |
CVE-2022-50167 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: fix potential 32-bit overflow when accessing ARRAY map element
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50167
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-17 19:48
|
| kernel-headers |
CVE-2022-50174 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hinic: avoid kernel hung in hinic_get_stats64()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50174
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-28 14:50
|
| kernel-headers |
CVE-2022-50186 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ath11k: fix missing skb drop on htc_tx_completion error
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50186
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:51
|
| kernel-headers |
CVE-2022-50220 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usbnet: Fix linkwatch use-after-free on disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50220
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:59
|
| kernel-headers |
CVE-2022-50222 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: vt: initialize unicode screen buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50222
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:58
|
| kernel-headers |
CVE-2022-50224 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50224
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:58
|
| kernel-headers |
CVE-2022-50231 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of service or information disclosure in arm64/poly1305 due to out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50231
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:57
|
| kernel-headers |
CVE-2022-50233 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name}
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50233
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-09 15:15 修改: 2025-11-19 17:13
|
| kernel-headers |
CVE-2022-50234 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to improper io_uring/af_unix file cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50234
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-24 17:46
|
| kernel-headers |
CVE-2022-50255 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix reading strings from synthetic events
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50255
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-25 16:49
|
| kernel-headers |
CVE-2022-50266 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kprobes: Fix check for probe enabled in kill_kprobe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50266
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-02 19:27
|
| kernel-headers |
CVE-2022-50267 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via unchecked return value in mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50267
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-03 18:15
|
| kernel-headers |
CVE-2022-50280 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pnode: terminate at peers of source
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50280
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 14:55
|
| kernel-headers |
CVE-2022-50282 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: chardev: fix error handling in cdev_device_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50282
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 18:56
|
| kernel-headers |
CVE-2022-50305 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: sof_es8336: fix possible use-after-free in sof_es8336_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50305
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:31
|
| kernel-headers |
CVE-2022-50307 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/cio: fix out-of-bounds access on cio_ignore free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50307
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:30
|
| kernel-headers |
CVE-2022-50314 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nbd: Fix hung when signal interrupts nbd_start_device_ioctl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50314
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:22
|
| kernel-headers |
CVE-2022-50315 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50315
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:21
|
| kernel-headers |
CVE-2022-50320 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: tables: FPDT: Don't call acpi_os_map_memory() on invalid phys address
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50320
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:19
|
| kernel-headers |
CVE-2022-50321 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50321
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-03 19:29
|
| kernel-headers |
CVE-2022-50323 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: do not sense pfmemalloc status in skb_append_pagefrags()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50323
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:07
|
| kernel-headers |
CVE-2022-50328 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50328
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 13:42
|
| kernel-headers |
CVE-2022-50334 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50334
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 13:49
|
| kernel-headers |
CVE-2022-50366 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50366
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50370 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: designware: Fix handling of real but unexpected device interrupts
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50370
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50373 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: dlm: fix race in lowcomms
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50373
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50375 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50375
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50380 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: /proc/pid/smaps_rollup: fix no vma's null-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50380
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50382 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: padata: Always leave BHs disabled when running ->parallel()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50382
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50386 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: L2CAP: Fix user-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50386
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50394 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: ismt: Fix an out-of-bounds bug in ismt_access()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50394
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50401 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50401
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:15
|
| kernel-headers |
CVE-2022-50409 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50409
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2025-12-23 14:16
|
| kernel-headers |
CVE-2022-50411 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPICA: Fix error code path in acpi_ds_call_control_method()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50411
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:15
|
| kernel-headers |
CVE-2022-50414 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50414
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:15
|
| kernel-headers |
CVE-2022-50419 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50419
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:15
|
| kernel-headers |
CVE-2022-50422 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50422
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2022-50430 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: vub300: fix warning - do not call blocking ops when !TASK_RUNNING
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50430
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:12
|
| kernel-headers |
CVE-2022-50433 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: efi: ssdt: Don't free memory if ACPI table was loaded successfully
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50433
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 15:33
|
| kernel-headers |
CVE-2022-50435 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: avoid crash when inline data creation follows DIO write
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50435
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-12-23 14:16
|
| kernel-headers |
CVE-2022-50436 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: don't set up encryption key during jbd2 transaction
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50436
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:12
|
| kernel-headers |
CVE-2022-50438 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hinic: fix memory leak when reading function table
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50438
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:12
|
| kernel-headers |
CVE-2022-50461 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ethernet: ti: am65-cpsw: Fix PM runtime leakage in am65_cpsw_nuss_ndo_slave_open()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50461
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 19:14
|
| kernel-headers |
CVE-2022-50470 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xhci: Remove device endpoints from bandwidth list when freeing the device
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50470
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50475 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/core: Make sure "ib_port" is valid when access sysfs node
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50475
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50476 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ntb_netdev: Use dev_kfree_skb_any() in interrupt context
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50476
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50485 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50485
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50486 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ethernet: ti: Fix return type of netcp_ndo_start_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50486
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50490 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Propagate error from htab_lock_bucket() to userspace
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50490
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50493 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Fix crash when I/O abort times out
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50493
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50496 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm cache: Fix UAF in destroy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50496
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50498 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eth: alx: take rtnl_lock on resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50498
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50516 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: dlm: fix invalid derefence of sb_lvbptr
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50534 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm thin: Use last transaction's pmd->root when commit failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50534
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50536 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50536
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50540 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: qcom-adm: fix wrong sizeof config in slave_config
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50540
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50541 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50541
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50543 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix mr->map double free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50543
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50551 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50551
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50552 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: use quiesced elevator switch when reinitializing queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50552
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50558 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regmap-irq: Use the new num_config_regs property in regmap_add_irq_chip_fwnode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50558
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50579 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: ftrace: fix module PLTs with mcount
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50579
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50582 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: core: Prevent integer underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50582
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50583 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid0, raid10: Don't set discard sectors for request queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50583
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2022-50616 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: core: Use different devices for resource allocation and DT lookup
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50616
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2022-50618 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: meson-gx: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50618
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2022-50621 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: verity-loadpin: Only trust verity targets with enforcement
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50621
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2022-50630 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: hugetlb: fix UAF in hugetlb_handle_userfault
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50630
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2022-50636 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Fix pci_device_is_present() for VFs by checking PF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50636
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50640 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: core: Fix kernel panic when remove non-standard SDIO card
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50640
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50642 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/chrome: cros_ec_typec: zero out stale pointers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50642
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50651 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: eeprom: fix null-deref on genl_info in dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50651
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50663 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: stmmac: fix possible memory leak in stmmac_dvr_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50663
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50666 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/siw: Fix QP destroy to wait for all references dropped
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50666
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50668 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix deadlock due to mbcache entry corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50668
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50671 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix "kernel NULL pointer dereference" error
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50671
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50678 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: fix invalid address access when enabling SCAN log level
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50678
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50700 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath10k: Delay the unmapping of the buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50700
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50701 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50701
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50709 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50709
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50723 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service via memory leak in bnxt_nvm_test()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50723
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50731 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: akcipher - default implementation for setting a private key
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50731
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50744 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50744
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50751 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: configfs: fix possible memory leak in configfs_create_dir()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50751
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50764 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6/sit: use DEV_STATS_INC() to avoid data-races
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50764
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50772 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to memory leak in netdevsim
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50772
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50774 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: qat - fix DMA transfer direction
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50774
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50780 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50780
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50816 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: ensure sane device mtu in tunnels
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50816
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50817 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hsr: avoid possible NULL deref in skb_clone()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50817
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50821 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: Don't leak netobj memory when gss_read_proxy_verf() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50821
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50838 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: stream: purge sk_error_queue in sk_stream_kill_queues()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50838
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50847 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/bridge: it6505: Initialize AUX channel in it6505_i2c_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50847
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50849 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50849
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50852 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7921: fix use after free in mt7921_acpi_read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50852
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4: Fix a credential leak in _nfs4_discover_trunking()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50866 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: pxa: fix null-pointer dereference in filter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50871 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: Fix qmi_msg_handler data structure initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50871
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50880 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50880
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50884 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm: Prevent drm_copy_field() to attempt copying a NULL pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50884
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-1077 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Type confusion in pick_next_rt_entity()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-03-27 21:15 修改: 2024-11-21 07:38
|
| kernel-headers |
CVE-2023-1118 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: use-after-free in drivers/media/rc/ene_ir.c due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-03-02 18:15 修改: 2025-04-23 17:16
|
| kernel-headers |
CVE-2023-1380 |
中危 |
5.14.0-611.24.1.el9_7 |
|
Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1380
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-03-27 21:15 修改: 2024-11-21 07:39
|
| kernel-headers |
CVE-2023-1838 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Possible use-after-free since the two fdget() during vhost_net_set_backend()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1838
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-05 19:15 修改: 2024-11-21 07:39
|
| kernel-headers |
CVE-2023-2019 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netdevsim: fib: reference count leak on route deletion failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2019
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-24 21:15 修改: 2025-03-18 20:15
|
| kernel-headers |
CVE-2023-2156 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: IPv6 RPL protocol reachable assertion leads to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2156
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-05-09 22:15 修改: 2024-11-21 07:58
|
| kernel-headers |
CVE-2023-2162 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: UAF during login when accessing the shost ipaddress
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-2162
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-19 20:15 修改: 2025-03-19 16:15
|
| kernel-headers |
CVE-2023-28327 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: denial of service problem in net/unix/diag.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28327
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-19 23:15 修改: 2025-03-19 16:15
|
| kernel-headers |
CVE-2023-3006 |
中危 |
5.14.0-611.24.1.el9_7 |
|
RHEL: Add Spectre-BHB mitigation for AmpereOne
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3006
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-05-31 20:15 修改: 2025-01-09 21:15
|
| kernel-headers |
CVE-2023-31082 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sleeping function called from an invalid context in gsmld_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-24 06:15 修改: 2024-11-21 08:01
|
| kernel-headers |
CVE-2023-31085 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: divide-by-zero error in ctrl_cdev_ioctl when do_div happens and erasesize is 0
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31085
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-24 06:15 修改: 2024-11-21 08:01
|
| kernel-headers |
CVE-2023-4459 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4459
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-21 19:15 修改: 2024-11-21 08:35
|
| kernel-headers |
CVE-2023-45862 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drivers/usb/storage/ene_ub6250.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-10-14 21:15 修改: 2024-11-21 08:27
|
| kernel-headers |
CVE-2023-5090 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5090
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-11-06 11:15 修改: 2024-11-21 08:41
|
| kernel-headers |
CVE-2023-5197 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: use-after-free due to addition and removal of rules from chain bindings within the same transaction
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-09-27 15:19 修改: 2025-12-11 15:37
|
| kernel-headers |
CVE-2023-52450 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: intel: Fix NULL pointer dereference issue in upi_fill_topology()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52450
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52469 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: use-after-free in kv_parse_power_table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52469
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52486 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52486
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-11 18:15 修改: 2025-01-14 15:01
|
| kernel-headers |
CVE-2023-52487 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Fix peer flow lists handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52487
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-11 18:15 修改: 2024-12-12 17:31
|
| kernel-headers |
CVE-2023-52508 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52508
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-02 22:15 修改: 2025-03-19 16:11
|
| kernel-headers |
CVE-2023-52518 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_codec: Fix leaking content of local_codecs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52518
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-02 22:15 修改: 2025-03-19 16:24
|
| kernel-headers |
CVE-2023-52568 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/sgx: SECS reclaim vs. page fault for EAUG race
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52568
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:23
|
| kernel-headers |
CVE-2023-52582 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfs: improper loop in netfs_rreq_unlock_folios()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52582
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-02 22:15 修改: 2025-01-16 17:33
|
| kernel-headers |
CVE-2023-52583 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix deadlock or deadcode of misusing dget()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52583
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-06 07:15 修改: 2025-02-03 14:18
|
| kernel-headers |
CVE-2023-52619 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pstore/ram: Fix crash when setting number of cpus to an odd number
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52619
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-18 11:15 修改: 2025-03-10 15:48
|
| kernel-headers |
CVE-2023-52628 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52628
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-28 08:15 修改: 2025-11-04 18:15
|
| kernel-headers |
CVE-2023-52646 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: aio: fix mremap after fork null-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52646
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-26 13:15 修改: 2025-01-27 15:09
|
| kernel-headers |
CVE-2023-52702 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52702
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:19
|
| kernel-headers |
CVE-2023-52739 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Fix page corruption caused by racy check in __free_pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52739
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-23 19:06
|
| kernel-headers |
CVE-2023-52752 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix use-after-free bug in cifs_debug_data_proc_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-11-25 17:25
|
| kernel-headers |
CVE-2023-52786 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix racy may inline data check in dio write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52786
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:34
|
| kernel-headers |
CVE-2023-52787 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: make sure active queue usage is held for bio_integrity_prep()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52787
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-26 16:23
|
| kernel-headers |
CVE-2023-52803 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52803
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-23 20:14
|
| kernel-headers |
CVE-2023-52832 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52832
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2026-01-05 11:15
|
| kernel-headers |
CVE-2023-52835 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/core: Bail out early if the request AUX area is out of bound
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52835
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-23 22:47
|
| kernel-headers |
CVE-2023-52846 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hsr: Prevent use after free in prp_create_tagged_frame()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52846
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:00
|
| kernel-headers |
CVE-2023-52854 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: padata: Fix refcnt handling in padata_free_shell()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52854
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-02-03 16:13
|
| kernel-headers |
CVE-2023-52869 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pstore/platform: Add check for kstrdup
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52869
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:18
|
| kernel-headers |
CVE-2023-52872 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: n_gsm: fix race condition in status line change on dead connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52872
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:15
|
| kernel-headers |
CVE-2023-52885 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52885
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-14 08:15 修改: 2024-11-21 08:40
|
| kernel-headers |
CVE-2023-52898 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xhci: Fix null pointer dereference when host dies
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52898
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:46
|
| kernel-headers |
CVE-2023-52901 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: xhci: Check endpoint is valid before dereferencing it
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52901
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:37
|
| kernel-headers |
CVE-2023-52902 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nommu: fix memory leak in do_mmap() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52902
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:29
|
| kernel-headers |
CVE-2023-52905 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: Fix resource leakage in VF driver unbind
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52905
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:27
|
| kernel-headers |
CVE-2023-52906 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: act_mpls: Fix warning during failed attribute validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52906
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-13 13:21
|
| kernel-headers |
CVE-2023-52908 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix potential NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52908
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:54
|
| kernel-headers |
CVE-2023-52909 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: fix handling of cached open files in nfsd4_open codepath
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52909
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:52
|
| kernel-headers |
CVE-2023-52910 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/iova: Fix alloc iova overflows issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52910
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:47
|
| kernel-headers |
CVE-2023-52912 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fixed bug on error when unloading amdgpu
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52912
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-12 14:35
|
| kernel-headers |
CVE-2023-52920 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: support non-r10 register spill/fill to/from stack in precision tracking
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52920
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 10:15 修改: 2025-01-09 16:15
|
| kernel-headers |
CVE-2023-52930 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Fix potential bit_17 double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52930
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2023-52931 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Avoid potential vm use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52931
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-04-01 15:40
|
| kernel-headers |
CVE-2023-52932 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/swapfile: add cond_resched() in get_swap_pages()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52932
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2023-52935 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/khugepaged: fix ->anon_vma race
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52935
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-11-25 17:28
|
| kernel-headers |
CVE-2023-52973 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52973
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-04-01 15:40
|
| kernel-headers |
CVE-2023-52974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-04-01 15:39
|
| kernel-headers |
CVE-2023-52975 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52975
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2023-52983 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block, bfq: fix uaf for bfqq in bic_set_bfqq()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52983
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-04-01 15:39
|
| kernel-headers |
CVE-2023-52992 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Skip task with pid=1 in send_signal_common()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52992
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-29 17:00
|
| kernel-headers |
CVE-2023-53008 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: fix potential memory leaks in session setup
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2023-53016 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix possible deadlock in rfcomm_sk_state_change
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53016
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2023-53026 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/core: Fix ib block iterator counter overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53026
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2023-53032 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ipset: Fix overflow before widen in the bitmap_ip_create() function.
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53032
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-31 18:49
|
| kernel-headers |
CVE-2023-53034 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53034
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2023-53037 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Bad drive in topology results kernel crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53037
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 19:13
|
| kernel-headers |
CVE-2023-53041 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Perform lockless command completion in abort path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53041
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 19:15
|
| kernel-headers |
CVE-2023-53062 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: smsc95xx: Limit packet length to skb->len
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53062
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-07 02:23
|
| kernel-headers |
CVE-2023-53075 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix invalid address access in lookup_rec() when index is 0
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 20:49
|
| kernel-headers |
CVE-2023-53080 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: Add missing overflow check in xdp_umem_reg
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53080
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 20:49
|
| kernel-headers |
CVE-2023-53101 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: zero i_disksize when initializing the bootloader inode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53101
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:56
|
| kernel-headers |
CVE-2023-53109 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tunnels: annotate lockless accesses to dev->needed_headroom
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53109
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:54
|
| kernel-headers |
CVE-2023-53111 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: loop: Fix use-after-free issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53111
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:53
|
| kernel-headers |
CVE-2023-53118 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: core: Fix a procfs host directory removal regression
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:51
|
| kernel-headers |
CVE-2023-53123 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: s390: Fix use-after-free of PCI resources with per-function hotplug
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53123
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:50
|
| kernel-headers |
CVE-2023-53133 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Fix an infinite loop error when len is 0 in tcp_bpf_recvmsg_parser()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53133
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:40
|
| kernel-headers |
CVE-2023-53144 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: erofs: fix wrong kunmap when using LZMA on HIGHMEM platforms
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53144
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:37
|
| kernel-headers |
CVE-2023-53145 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53145
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-10 15:15 修改: 2025-11-12 20:42
|
| kernel-headers |
CVE-2023-53147 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: add NULL check in xfrm_update_ae_params
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53147
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-25 17:03
|
| kernel-headers |
CVE-2023-53181 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dma-buf/dma-resv: Stop leaking on krealloc() failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53181
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 02:57
|
| kernel-headers |
CVE-2023-53189 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6/addrconf: fix a potential refcount underflow for idev
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53189
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 02:55
|
| kernel-headers |
CVE-2023-53199 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53199
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-03 19:39
|
| kernel-headers |
CVE-2023-53200 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: x_tables: fix percpu counter block leak on error path when creating new netns
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53200
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:07
|
| kernel-headers |
CVE-2023-53201 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: wraparound mbox producer index
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53201
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:07
|
| kernel-headers |
CVE-2023-53225 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: imx: Don't skip cleanup in remove's error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53225
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53226 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53226
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53232 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53232
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-09-15 15:22
|
| kernel-headers |
CVE-2023-53240 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: check IFF_UP earlier in Tx path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53240
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53251 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53251
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53257 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: check S1G action frame size
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53257
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53259 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel VMCI: Denial of Service via GPF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53259
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-16 19:50
|
| kernel-headers |
CVE-2023-53272 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ena: fix shift-out-of-bounds in exponential backoff
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53272
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53277 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwl3945: Add missing check for create_singlethread_workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53277
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53282 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53282
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53286 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Return the firmware result upon destroying QP/RQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53286
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53295 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: Do not update file length for failed writes to inline files
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53295
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53302 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwl4965: Add missing check for create_singlethread_workqueue()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53302
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53305 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: L2CAP: Fix use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53305
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53315 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: Fix SKB corruption in REO destination ring
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53315
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53326 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc: Don't try to copy PPR for task with NULL pt_regs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53326
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53327 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd/selftest: Catch overflow of uptr and length
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53327
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53340 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Collect command failures data only for known commands
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53340
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53345 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53345
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53347 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Handle pairing of E-switch via uplink un/load APIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53347
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53360 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4.2: Rework scratch handling for READ_PLUS (again)
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53360
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53368 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix race issue between cpu buffer write and swap
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53368
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53382 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Reset connection when trying to use SMCRv2 fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53382
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53386 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix potential use-after-free when clear keys
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53386
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53427 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: Fix warning and UAF when destroy the MR list
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53427
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2023-53438 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/MCE: Always save CS register on AMD Zen IF Poison errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53438
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2023-53446 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53446
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2023-53452 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: fix potential race condition between napi_init and napi_enable
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53452
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 21:23
|
| kernel-headers |
CVE-2023-53454 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: multitouch: Correct devm device reference for hidinput input_dev name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53454
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 21:21
|
| kernel-headers |
CVE-2023-53457 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: FS: JFS: Fix null-ptr-deref Read in txBegin
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53457
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 20:59
|
| kernel-headers |
CVE-2023-53463 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ibmvnic: Do not reset dql stats on NON_FATAL err
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53463
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 21:31
|
| kernel-headers |
CVE-2023-53475 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: xhci: tegra: fix sleep in atomic call
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53475
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 16:45
|
| kernel-headers |
CVE-2023-53480 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kobject: Add sanity check for kset->kobj.ktype in kset_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53480
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-05 11:16
|
| kernel-headers |
CVE-2023-53481 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53481
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 16:36
|
| kernel-headers |
CVE-2023-53484 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: lib: cpu_rmap: Avoid use after free on rmap->obj array entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53484
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 16:35
|
| kernel-headers |
CVE-2023-53488 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/hfi1: Fix possible panic during hotplug remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53488
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:12
|
| kernel-headers |
CVE-2023-53491 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: start_kernel: Add __no_stack_protector function attribute
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53491
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:12
|
| kernel-headers |
CVE-2023-53500 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: fix slab-use-after-free in decode_session6
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53500
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53503 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: allow ext4_get_group_info() to fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53503
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53504 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Properly order ib_device_unalloc() to avoid UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53504
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53506 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: Do not bother merging very long extents
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53506
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53509 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: qed: allow sleep in qed_mcp_trace_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53509
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53512 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpt3sas: Fix a memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53512
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53514 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpu: host1x: Fix memory leak of device names
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53514
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53515 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio-mmio: don't break lifecycle of vm_dev
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53515
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53516 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: macvlan: add forgotten nla_policy for IFLA_MACVLAN_BC_CUTOFF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53520 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix hci_suspend_sync crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53520
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53521 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53521
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53522 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cgroup,freezer: hold cpu_hotplug_lock before freezer_mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53522
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53525 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/cma: Allow UD qp_type to join multicast only
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53525
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53526 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: check 'jh->b_transaction' before removing it from checkpoint
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53526
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53528 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix unsafe drain work queue code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53528
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53529 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw88: Fix memory leak in rtw88_usb
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53529
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53531 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: null_blk: fix poll request timeout handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53532 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix deinitialization of firmware resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53532
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53535 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bcmgenet: Add a check for oversized packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53535
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53540 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: reject auth/assoc to AP with our address
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53540
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53543 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53543
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53546 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53546
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53549 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ipset: Rework long task execution when adding/deleting entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53549
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53555 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/damon/core: initialize damo_filter->list from damos_new_filter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53555
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53558 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53558
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53559 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ip_vti: fix potential slab-use-after-free in decode_session6
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53559
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53560 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/histograms: Add histograms to hist_vars if they have referenced variables
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53560
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53567 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: qup: Don't skip cleanup in remove's error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53567
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53572 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: imx: scu: use _safe list iterator to avoid a use after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53572
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53574 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw88: delete timer and free skb queue when unloading
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53574
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53575 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: fix potential array out of bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53575
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53576 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: null_blk: Always check queue mode setting from configfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53576
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53581 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Check for NOT_READY flag state after locking
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53581
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53587 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ring-buffer: Sync IRQ works before buffer destruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53587
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53589 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: don't trust firmware n_channels
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53589
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53591 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Fix deadlock in tc route query code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53591
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53598 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53598
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53600 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tunnels: fix kasan splat when generating ipv4 pmtu error
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53600
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53601 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: do not assume skb mac_header is set
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53601
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53609 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed"
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53609
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53615 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Fix deletion race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53615
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53619 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53619
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53620 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: fix soft lockup in status_resync
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53620
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53624 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: sch_fq: fix integer overflow of "credit"
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53624
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53625 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/gvt: fix vgpu debugfs clean in remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53625
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53626 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix possible double unlock when moving a directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53626
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53627 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: hisi_sas: Grab sas_dev lock when traversing the members of sas_dev.list
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53627
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53628 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: drop gfx_v11_0_cp_ecc_error_irq_funcs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53628
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-29 11:15
|
| kernel-headers |
CVE-2023-53629 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: dlm: fix use after free in midcomms commit
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53629
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53632 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Take RTNL lock when needed before calling xdp_set_features()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53632
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53635 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: conntrack: fix wrong ct->timeout value
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53635
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53638 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeon_ep: cancel queued works in probe error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53638
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53639 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath6kl: reduce WARN to dev_dbg() in callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53639
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53643 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-tcp: don't access released socket during error recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53643
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53645 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Make bpf_refcount_acquire fallible for non-owning refs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53645
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53646 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/perf: add sentinel to xehp_oa_b_counters
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53646
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53652 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa: Add features attr to vdpa_nl_policy for nlattr length check
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53652
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53659 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iavf: Fix out-of-bounds when setting channels on remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53659
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53661 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt: avoid overflow in bnxt_get_nvram_directory()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53661
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53665 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: don't dereference mddev after export_rdev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53665
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53667 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53667
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53668 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ring-buffer: Fix deadloop issue on reading trace_pipe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53668
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53669 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: fix skb_copy_ubufs() vs BIG TCP
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53669
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53675 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ses: Fix possible desc_ptr out-of-bounds accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53675
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53676 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53676
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53677 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Fix memory leaks in i915 selftests
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53677
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53678 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Fix system suspend without fbdev being initialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53678
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53679 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt7601u: fix an integer underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53679
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53680 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53680
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53682 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (xgene) Fix ioremap and memremap leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53682
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53684 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: Zero padding when dumping algos and encap
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53684
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53695 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: Detect system inodes linked into directory hierarchy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53695
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53697 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53697
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53698 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: fix refcount underflow in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53698
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53703 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: amd_sfh: Fix for shift-out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53703
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53705 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53705
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53713 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: sme: Use STR P to clear FFR context field in streaming SVE mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53713
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53717 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53717
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53720 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Release the label when replacing existing ct entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53720
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53721 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53721
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53726 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: csum: Fix OoB access in IP checksum code for negative lengths
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53726
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53729 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soc: qcom: qmi_encdec: Restrict string length in decode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53729
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53733 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53733
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-24 12:15 修改: 2025-10-27 13:20
|
| kernel-headers |
CVE-2023-53747 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53747
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53751 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel Bluetooth L2CAP: Kernel crash due to use-after-free via race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53751
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53759 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: High impact due to data race in hidraw_open() during concurrent device opening
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53759
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53762 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel Bluetooth: Denial of Service due to use-after-free in connection handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53762
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53765 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm cache: free background tracker's queued work in btracker_destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53765
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53777 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: erofs: kill hooked chains to avoid loops on deduplicated compressed images
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53777
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53783 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-iocost: fix divide by 0 error in calc_lcoefs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53783
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53785 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mt76: mt7921: don't assume adequate headroom for SDIO headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53785
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53788 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53788
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53794 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: fix session state check in reconnect to avoid use-after-free issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53794
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53799 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: api - Use work queue in crypto_destroy_instance
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53799
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53800 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: Fix use-after-free when volume resizing failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53800
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53802 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53802
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53806 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: populate subvp cmd info only for the top pipe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53806
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53808 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mwifiex: fix memory leak in mwifiex_histogram_read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53808
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53811 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/irdma: Cap MSIX used to online CPUs + 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53811
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53815 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: posix-timers: Prevent RT livelock in itimer_delete()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53815
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53822 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: Ignore frags from uninitialized peer in dp
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53822
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53824 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netlink: annotate lockless accesses to nlk->max_recvmsg_len
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53824
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53828 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53828
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53832 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: fix null-ptr-deref in raid10_sync_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53832
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53840 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: early: xhci-dbc: Fix a potential out-of-bound memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53841 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: devlink: report devlink_port_type_warn source device
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53841
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53843 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: openvswitch: reject negative ifindex
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53843
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53850 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iavf: use internal state to free traffic IRQs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53850
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netlink: annotate accesses to nlk->cb_running
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53860 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: don't attempt to queue IO under RCU protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53860
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53861 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: correct grp validation in ext4_mb_good_group
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53989 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: mm: fix VA-range sanity check
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53989
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-53990 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SMB3: Add missing locks to protect deferred close file list
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53990
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-53996 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53996
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54012 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: fix stack overflow when LRO is disabled for virtual interfaces
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54013 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: interconnect: Fix locking for runpm vs reclaim
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54014 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54014
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54015 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54015
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54016 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory leak in ath12k Wi-Fi driver can lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54016
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54028 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54028
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54034 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Make sure to zero vfio_iommu_type1_info before copying to user
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54034
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54039 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54039
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54040 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to incorrect FDIR filter fallback logic
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54040
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54052 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel Wi-Fi driver: Denial of Service due to missing transmit status
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54052
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54053 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in iwlwifi due to NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54053
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54055 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory leak in RDMA/irdma subsystem leads to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54055
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54069 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54085 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to NULL pointer dereference in mptcp fastopen
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54085
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54089 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio_pmem: add the missing REQ_OP_WRITE for flush bio
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54089
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54094 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: prevent skb corruption on frag list segmentation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54094
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54106 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via memory leak in mlx5e_init_rep_rx
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54106
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54113 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rcu: dump vmalloc memory info safely
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54113
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54116 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/fbdev-generic: prohibit potential out-of-bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54116
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54118 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: sc16is7xx: setup GPIO controller later in probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54119 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: inotify: Avoid reporting event with invalid wd
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54119
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54131 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel rt2x00 Wi-Fi driver: Denial of Service via memory leak during device removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54131
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54136 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: sprd: Fix DMA buffer leak issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54136
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54141 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54141
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54148 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54148
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54150 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd: Fix an out of bounds error in BIOS parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54150
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54155 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54155
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54164 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: ISO: fix iso_conn related locking and validity issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54164
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54165 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: zsmalloc: move LRU update from zs_map_object() to zs_malloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54165
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54168 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54168
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54169 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: fix memory leak in mlx5e_ptp_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54169
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54193 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: cls_api: remove block_cb from driver_list before freeing
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54193
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54197 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54200 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: always release netdev hooks from notifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54200
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54216 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: TC, Fix using eswitch mapping in nic mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54216
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54226 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: af_unix: Fix data races around sk->sk_shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54226
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54229 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: fix registration of 6Ghz-only phy without the full channel range
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54229
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54236 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/net_failover: fix txq exceeding warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54236
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54239 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Check for uptr overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54239
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54243 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ebtables: fix table blob use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54243
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54251 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54251
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54263 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54263
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54265 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: Fix an uninit variable access bug in __ip6_make_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54265
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54271 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via NULL pointer dereference in blk-cgroup
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54271
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54275 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory leak in ath11k Wi-Fi driver leads to Denial of Service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54275
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54276 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54276
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54278 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/vmem: split pages when debug pagealloc is enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54278
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54280 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: fix potential race when tree connecting ipc
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54280
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54287 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: serial: imx: disable Ageing Timer interrupt request irq
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54287
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54295 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54295
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54298 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: intel: quark_dts: fix error pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54298
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54302 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/irdma: Fix data race on CQP completion stats
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54302
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54317 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm flakey: don't corrupt the zero page
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54317
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54325 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: qat - fix out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54325
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-7192 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: refcount leak in ctnetlink_create_conntrack()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7192
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-01-02 19:15 修改: 2024-11-21 08:45
|
| kernel-headers |
CVE-2023-7324 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7324
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-29 14:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2024-0443 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0443
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-01-12 00:15 修改: 2024-11-21 08:46
|
| kernel-headers |
CVE-2024-0607 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nf_tables: pointer math issue in nft_byteorder_eval()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0607
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-01-18 16:15 修改: 2024-11-21 08:46
|
| kernel-headers |
CVE-2024-0639 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: potential deadlock on &net->sctp.addr_wq_lock leading to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0639
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-01-17 16:15 修改: 2024-11-21 08:47
|
| kernel-headers |
CVE-2024-0775 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: use-after-free while changing the mount option in __ext4_remount leading
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0775
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-01-22 13:15 修改: 2024-11-21 08:47
|
| kernel-headers |
CVE-2024-1151 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: stack overflow problem in Open vSwitch kernel module leading to DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-11 15:15 修改: 2024-11-21 08:49
|
| kernel-headers |
CVE-2024-21823 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-16 21:16 修改: 2024-11-21 08:55
|
| kernel-headers |
CVE-2024-24858 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24858
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-05 08:15 修改: 2025-03-05 14:10
|
| kernel-headers |
CVE-2024-24859 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bluetooth: race condition in sniff_{min,max}_interval_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24859
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-05 08:15 修改: 2024-11-21 08:59
|
| kernel-headers |
CVE-2024-26598 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kvm: Avoid potential UAF in LPI translation cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26598
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-23 15:15 修改: 2024-11-21 09:02
|
| kernel-headers |
CVE-2024-26601 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: regenerate buddy after block freeing failed if under fc replay
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26601
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 09:02
|
| kernel-headers |
CVE-2024-26637 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: rely on mac80211 debugfs handling for vif
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26637
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-18 11:15 修改: 2025-03-10 17:02
|
| kernel-headers |
CVE-2024-26666 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fix RCU use in TDLS fast-xmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26666
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-02 07:15 修改: 2025-04-08 19:24
|
| kernel-headers |
CVE-2024-26682 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: improve CSA/ECSA connection refusal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26682
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-02 07:15 修改: 2025-03-17 15:41
|
| kernel-headers |
CVE-2024-26683 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: detect stuck ECSA element in probe resp
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26683
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-02 07:15 修改: 2025-03-17 15:41
|
| kernel-headers |
CVE-2024-26689 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: prevent use-after-free in encode_cap_msg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26689
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-01-14 17:26
|
| kernel-headers |
CVE-2024-26698 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26698
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-03-17 15:36
|
| kernel-headers |
CVE-2024-26708 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: really cope with fastopen race
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26708
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-04-08 15:31
|
| kernel-headers |
CVE-2024-26771 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: ti: edma: Add some null pointer checks to the edma_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26771
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-01-27 14:59
|
| kernel-headers |
CVE-2024-26772 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26772
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-04-04 14:16
|
| kernel-headers |
CVE-2024-26779 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fix race condition on enabling fast-xmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26779
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-04-04 14:15
|
| kernel-headers |
CVE-2024-26785 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Fix protection fault in iommufd_test_syz_conv_iova
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26785
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-04 09:15 修改: 2025-04-04 14:04
|
| kernel-headers |
CVE-2024-26810 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfio/pci: Lock external INTx masking ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26810
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-05 09:15 修改: 2025-04-08 19:20
|
| kernel-headers |
CVE-2024-26816 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86, relocs: Ignore relocations in .notes section
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26816
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 14:15 修改: 2025-03-27 21:10
|
| kernel-headers |
CVE-2024-26851 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26851
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-04-02 13:17
|
| kernel-headers |
CVE-2024-26889 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_core: Fix possible buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-03-21 14:35
|
| kernel-headers |
CVE-2024-26902 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf: RISCV: Fix panic on pmu overflow handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26902
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2024-11-21 09:03
|
| kernel-headers |
CVE-2024-26918 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Fix active state requirement in PME polling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26918
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 16:15 修改: 2025-09-16 16:30
|
| kernel-headers |
CVE-2024-26984 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nouveau: fix instmem race condition around ptr stores
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26984
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 06:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-26991 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26991
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 06:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-26999 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial/pmac_zilog: Remove flawed mitigation for rx irq flood
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26999
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 06:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-27031 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27031
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:46
|
| kernel-headers |
CVE-2024-27039 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: hisilicon: hi3559a: Fix an erroneous devm_kfree()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27039
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2025-09-18 15:48
|
| kernel-headers |
CVE-2024-27056 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-27062 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nouveau: lock the client object tree.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27062
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2025-04-08 19:42
|
| kernel-headers |
CVE-2024-27077 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2024-12-23 14:38
|
| kernel-headers |
CVE-2024-27399 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27399
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-14 15:12 修改: 2024-11-21 09:04
|
| kernel-headers |
CVE-2024-27413 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: efi/capsule-loader: fix incorrect allocation size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-17 12:15 修改: 2025-12-17 19:39
|
| kernel-headers |
CVE-2024-3056 |
中危 |
5.14.0-611.24.1.el9_7 |
|
podman: kernel: containers in shared IPC namespace are vulnerable to denial of service attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-3056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-02 21:16 修改: 2024-12-27 16:15
|
| kernel-headers |
CVE-2024-35803 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/efistub: Call mixed mode boot services on the firmware's stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35803
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-17 14:15 修改: 2025-09-26 15:57
|
| kernel-headers |
CVE-2024-35868 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix potential UAF in cifs_stats_proc_write()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35868
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2024-12-30 17:37
|
| kernel-headers |
CVE-2024-35878 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: of: module: prevent NULL pointer dereference in vsnprintf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35878
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2025-04-07 18:57
|
| kernel-headers |
CVE-2024-35891 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: micrel: Fix potential null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2024-12-30 17:07
|
| kernel-headers |
CVE-2024-35933 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btintel: Fix null ptr deref in btintel_read_version
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35933
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 11:15 修改: 2026-01-05 11:16
|
| kernel-headers |
CVE-2024-35978 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix memory leak in hci_req_sync_complete()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35978
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2024-11-21 09:21
|
| kernel-headers |
CVE-2024-35980 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: tlb: Fix TLBI RANGE operand
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35980
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2025-01-16 17:21
|
| kernel-headers |
CVE-2024-35999 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb3: missing lock when picking channel
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35999
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2025-04-04 14:32
|
| kernel-headers |
CVE-2024-36011 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: HCI: Fix potential null-ptr-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36011
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-23 07:15 修改: 2025-05-07 20:15
|
| kernel-headers |
CVE-2024-36013 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-23 07:15 修改: 2025-04-01 18:40
|
| kernel-headers |
CVE-2024-36021 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns3: fix kernel crash when devlink reload during pf initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36021
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 15:15 修改: 2025-09-30 17:20
|
| kernel-headers |
CVE-2024-36286 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36286
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-36350 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: information leak via transient execution vulnerability in some AMD processors
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36350
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-08 17:15 修改: 2025-11-04 22:16
|
| kernel-headers |
CVE-2024-36357 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: transient execution vulnerability in some AMD processors
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36357
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-08 17:15 修改: 2025-11-04 22:16
|
| kernel-headers |
CVE-2024-36884 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36884
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36891 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36921 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36921
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-03-01 02:47
|
| kernel-headers |
CVE-2024-36930 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: fix null pointer dereference within spi_sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36930
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36966 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: erofs: reliably distinguish block based and fscache mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36966
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-08 13:15 修改: 2025-10-01 14:43
|
| kernel-headers |
CVE-2024-36970 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: Use request_module_nowait
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36970
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-08 13:15 修改: 2025-02-03 15:51
|
| kernel-headers |
CVE-2024-36975 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KEYS: trusted: Do not use WARN when encode fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36975
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-18 20:15 修改: 2025-10-01 15:16
|
| kernel-headers |
CVE-2024-38541 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: of: module: add buffer overflow check in of_modalias()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38541
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-38559 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qedf: Ensure the copied buf is NUL terminated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38559
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-38561 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kunit: Fix kthread reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38561
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2024-11-21 09:26
|
| kernel-headers |
CVE-2024-38598 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: fix resync softlockup when bitmap size is less than array size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38598
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-38606 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: qat - validate slices count returned by FW
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38606
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-03-06 12:56
|
| kernel-headers |
CVE-2024-38612 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: sr: fix invalid unregister error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38612
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-39487 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39487
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-09 10:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-39490 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: sr: fix missing sk_buff release in seg6_input_core
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39490
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-10 08:15 修改: 2025-03-24 17:23
|
| kernel-headers |
CVE-2024-39493 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39493
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-10 08:15 修改: 2024-11-21 09:27
|
| kernel-headers |
CVE-2024-39494 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ima: Fix use-after-free on a dentry's dname.name
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39494
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2026-01-06 15:06
|
| kernel-headers |
CVE-2024-39504 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_inner: validate mandatory meta and payload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39504
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2024-11-21 09:27
|
| kernel-headers |
CVE-2024-39920 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: TCP: SnailLoad timing side channel in TCP
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39920
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-03 04:15 修改: 2024-11-21 09:28
|
| kernel-headers |
CVE-2024-40900 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cachefiles: remove requests from xarray during flushing requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40900
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40903 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40903
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40904 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40904
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40906 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Always stop health timer during driver removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40906
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40907 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ionic: fix kernel panic in XDP_TX action
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40907
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2024-11-21 09:31
|
| kernel-headers |
CVE-2024-40935 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cachefiles: flush all requests after setting CACHEFILES_DEAD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40935
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40937 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gve: Clear napi->skb before dev_kfree_skb_any()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40937
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40956 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40956
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40959 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40959
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40965 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40965
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2024-12-09 13:10
|
| kernel-headers |
CVE-2024-40967 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: imx: Introduce timeout when waiting on transmitter empty
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40967
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries: Enforce hcall result buffer validity and size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40977 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40977
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40980 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drop_monitor: replace spin_lock by raw_spin_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40980
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40990 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Add check for srq max_sge attribute
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40990
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40995 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40995
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41007 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: avoid too many retransmit packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41007
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-15 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41010 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix too early release of tcx_entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-17 07:15 修改: 2024-11-21 09:32
|
| kernel-headers |
CVE-2024-41023 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/deadline: Fix task_struct reference leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41023
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-03-04 16:58
|
| kernel-headers |
CVE-2024-41031 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/filemap: skip to create PMD-sized page cache if needed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41031
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-10-07 16:26
|
| kernel-headers |
CVE-2024-41035 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41035
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41037 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: Intel: hda: fix null deref on system suspend entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41037
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2024-11-21 09:32
|
| kernel-headers |
CVE-2024-41038 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41038
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41045 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Defer work in bpf_timer_cancel_and_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-09-25 20:03
|
| kernel-headers |
CVE-2024-41060 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: check bo_va->bo is non-NULL before using it
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41060
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41064 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/eeh: avoid possible crash when edev->pdev changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41069 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: topology: Fix references to freed memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41087 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ata: libata-core: Fix double free on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41087
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41089 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41089
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41095 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41095
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41097 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42069 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mana: Fix possible double free in error handling path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-42070 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42070
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42076 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: can: j1939: Initialize unused data in j1939_send_one()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42076
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42079 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42079
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2024-11-21 09:33
|
| kernel-headers |
CVE-2024-42083 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ionic: fix kernel panic due to multi-buffer handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2024-11-21 09:33
|
| kernel-headers |
CVE-2024-42094 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/iucv: Avoid explicit cpumask var allocation on stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42094
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 18:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42101 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42101
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42106 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: inet_diag: Initialize pad field in struct inet_diag_req_v2
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42106
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42107 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Don't process extts if PTP is disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42107
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-01-08 21:32
|
| kernel-headers |
CVE-2024-42114 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42114
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42123 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix double free err_addr pointer warnings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42123
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2024-11-21 09:33
|
| kernel-headers |
CVE-2024-42133 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Ignore too large handle values in BIG
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42133
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2024-12-11 17:27
|
| kernel-headers |
CVE-2024-42135 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost_task: Handle SIGKILL by flushing work and exiting
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2024-12-11 14:59
|
| kernel-headers |
CVE-2024-42139 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix improper extts handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42139
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:13
|
| kernel-headers |
CVE-2024-42145 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/core: Implement a limit on UMAD receive List
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42145
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42148 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnx2x: Fix multiple UBSAN array-index-out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42148
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42161 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42161
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42162 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gve: Account for stopped queues when reading NIC stats
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42162
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2024-11-21 09:33
|
| kernel-headers |
CVE-2024-42224 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: mv88e6xxx: Correct check for empty list
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42224
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42228 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42228
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42229 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: aead,cipher - zeroize key buffer after use
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42229
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42232 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: libceph: fix race between delayed_work() and ceph_monc_stop()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42232
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42238 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: cs_dsp: Return error if block header overflows file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42238
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42239 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fail bpf_timer_cancel when callback is being cancelled
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42239
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:54
|
| kernel-headers |
CVE-2024-42240 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42240
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42241 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/shmem: disable PMD-sized page cache if needed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42241
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53
|
| kernel-headers |
CVE-2024-42259 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/gem: Fix Virtual Memory mapping boundaries calculation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42259
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-14 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42268 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix missing lock on sync reset reload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42268
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42272 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched: act_ct: take care of padding in struct zones_ht_key
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42272
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42278 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: TAS2781: Fix tasdev_load_calibrated_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42278
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2024-09-30 12:53
|
| kernel-headers |
CVE-2024-42281 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix a segment issue when downgrading gso_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42281
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42285 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/iwcm: Fix a use-after-free related to destroying CM IDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42285
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42286 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: validate nvme_local_port correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42286
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42288 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Fix for possible memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42288
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42289 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: During vport delete send async logout explicitly
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42289
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42290 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: irqchip/imx-irqsteer: Handle runtime power management correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42290
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42294 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix deadlock between sd_remove & sd_release
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42294
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2024-08-19 19:43
|
| kernel-headers |
CVE-2024-42302 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42302
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42315 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: fix potential deadlock on __exfat_get_dentry_set
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42315
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-42316 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/mglru: fix div-by-zero in vmpressure_calc_level()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42316
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-42317 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/huge_memory: avoid PMD-size page cache if needed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42317
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-10-07 20:24
|
| kernel-headers |
CVE-2024-43816 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43816
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-09-29 15:21
|
| kernel-headers |
CVE-2024-43821 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix a possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43821
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2024-09-03 17:49
|
| kernel-headers |
CVE-2024-43823 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43828 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix infinite loop when replaying fast_commit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43828
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43829 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/qxl: Add check for drm_cvt_mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43829
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43834 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xdp: fix invalid wait context of page_pool_destroy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43834
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43835 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio_net: Fix napi_skb_cache_put warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43835
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43846 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: lib: objagg: Fix general protection fault
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43846
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cgroup/cpuset: Prevent UAF in proc_cpuset_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43856 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dma: fix call order in dmam_free_coherent
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43856
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43861 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: qmi_wwan: fix memory leak for not ip packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-20 22:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43871 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: devres: Fix memory leakage caused by driver API devm_free_percpu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43871
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 01:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43873 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost/vsock: always initialize seqpacket_allow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43873
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 01:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43874 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43874
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:26
|
| kernel-headers |
CVE-2024-43880 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_acl_erp: Fix object nesting warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43880
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 01:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43882 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exec: Fix ToCToU between perm check and set-uid/gid usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43882
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 01:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43884 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: MGMT: Add error handling to pair_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43884
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 08:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43889 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: padata: Fix possible divide-by-0 panic in padata_mt_helper()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43892 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memcg: protect concurrent access to mem_cgroup_idr
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43892
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43896 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: cs-amp-lib: Fix NULL pointer crash if efi.get_variable is NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43896
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:37
|
| kernel-headers |
CVE-2024-43906 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/admgpu: fix dereferencing null pointer context
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43906
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2024-08-27 13:41
|
| kernel-headers |
CVE-2024-43908 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix the null pointer dereference to ras_manager
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43908
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43910 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43910
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2024-09-05 18:30
|
| kernel-headers |
CVE-2024-43911 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fix NULL dereference at band check in starting tx ba session
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43911
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43912 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: nl80211: disallow setting special AP channel widths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43912
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43914 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid5: avoid BUG_ON() while continue reshape after reassembling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43914
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-44931 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpio: prevent potential speculation leaks in gpio_device_get_desc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44931
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44932 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: fix UAFs when destroying the queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44932
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:08
|
| kernel-headers |
CVE-2024-44934 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bridge: mcast: wait for previous gc cycles when removing port
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44934
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44935 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: Fix null-ptr-deref in reuseport_add_sock().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44935
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44944 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ctnetlink: use helper function to calculate expect ID
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44944
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-30 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44954 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: line6: Fix racy access to midibuf
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44954
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44957 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen: privcmd: Switch from mutex to spinlock for irqfds
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44957
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2024-09-06 16:37
|
| kernel-headers |
CVE-2024-44958 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/smt: Fix unbalance sched_smt_present dec/inc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44958
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44960 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: gadget: core: Check for unset descriptor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44960
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44961 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Forward soft recovery errors to userspace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44961
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2024-10-04 16:39
|
| kernel-headers |
CVE-2024-44964 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: fix memory leaks and crashes while performing a soft reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44964
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2024-09-06 16:36
|
| kernel-headers |
CVE-2024-44965 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/mm: Fix pti_clone_pgtable() alignment assumption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44965
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44967 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/mgag200: Bind I2C lifetime to DRM device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44967
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 19:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: pm: avoid possible UaF when selecting endp
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44977 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Validate TA binary size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44977
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44983 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: flowtable: validate vlan header
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44983
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44984 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix double DMA unmapping for XDP_REDIRECT
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44984
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2024-10-10 16:48
|
| kernel-headers |
CVE-2024-44985 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: prevent possible UAF in ip6_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44985
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44986 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: fix possible UAF in ip6_finish_output2()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44986
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44987 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: prevent UAF in ip6_send_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44987
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44989 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: fix xfrm real_dev null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44989
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44990 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: fix null pointer deref in bond_ipsec_offload_ok
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44990
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-44994 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu: Restore lost return in iommu_report_device_fault()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44994
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2024-10-10 15:59
|
| kernel-headers |
CVE-2024-44996 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vsock: fix recursive ->recvmsg calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44996
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2024-09-16 12:21
|
| kernel-headers |
CVE-2024-44998 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: atm: idt77252: prevent use after free in dequeue_rx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44998
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45000 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/netfs/fscache_cookie: add missing "n_accesses" check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45000
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45001 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mana: Fix RX buf alloc_size alignment and atomic op panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45001
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-45003 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfs: Don't evict inode under the inode lru traversing context
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45003
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45005 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: s390: fix validity interception issue when gisa is switched off
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45005
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2024-10-09 15:30
|
| kernel-headers |
CVE-2024-45006 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45006
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45008 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: MT - limit max slots
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-04 20:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45009 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: pm: only decrement add_addr_accepted for MPJ req
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45009
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45010 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: pm: only mark 'subflow' endp as available
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45013 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme: move stopping keep-alive into nvme_uninit_ctrl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:35
|
| kernel-headers |
CVE-2024-45016 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netem: fix return value if duplicate enqueue fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45016
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45022 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45022
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45025 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45025
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45026 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/dasd: fix error recovery leading to data corruption on ESE devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45026
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46673 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: aacraid: Fix double-free on probe failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46673
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46675 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: core: Prevent USB core invalid event buffer address access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46675
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46678 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: change ipsec_lock from spin lock to mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46678
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2024-09-23 14:44
|
| kernel-headers |
CVE-2024-46679 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: check device is present when getting link settings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46679
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46689 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soc: qcom: cmd-db: Map shared memory as WC, not WB
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46689
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46697 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: ensure that nfsd4_fattr_args.context is zeroed out
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46697
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2024-09-19 17:53
|
| kernel-headers |
CVE-2024-46711 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: pm: fix ID 0 endp usage after multiple re-creations
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46711
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46715 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver: iio: add missing checks on iio_info's callback access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46715
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46717 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: SHAMPO, Fix incorrect page release
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46717
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46719 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: ucsi: Fix null pointer dereference in trace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46719
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46722 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix mc_data out-of-bounds read warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46722
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46723 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix ucode out-of-bounds read warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46723
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46724 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46724
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46725 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix out-of-bounds write warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46725
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46736 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix double put of @cfile in smb2_rename_path()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46736
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-09-26 17:44
|
| kernel-headers |
CVE-2024-46737 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet-tcp: fix kernel crash if commands allocation fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46737
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46738 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46738
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46739 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46739
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46743 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46743
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46744 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Squashfs: sanity check symbolic link size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46744
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46746 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: amd_sfh: free driver_data after destroying hid device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46746
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46747 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46747
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46748 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cachefiles: Set the max subreq size for cache writes to MAX_RW_COUNT
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46748
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-10-08 17:08
|
| kernel-headers |
CVE-2024-46750 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Add missing bridge lock to pci_bus_lock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46750
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46755 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46755
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46759 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46759
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46760 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw88: usb: schedule rx work after everything is set up
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:18
|
| kernel-headers |
CVE-2024-46761 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46761
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46762 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen: privcmd: Fix possible access to a freed kirqfd instance
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46762
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:12
|
| kernel-headers |
CVE-2024-46766 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: move netif_queue_set_napi to rtnl-protected sections
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46766
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-09-23 16:15
|
| kernel-headers |
CVE-2024-46767 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: Fix missing of_node_put() for leds
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46767
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-09-26 18:20
|
| kernel-headers |
CVE-2024-46770 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Add netif_device_attach/detach into PF reset flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46770
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46771 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: bcm: Remove proc entry when dev is unregistered.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46771
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46777 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: Avoid excessive partition lengths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46777
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46783 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp_bpf: fix return value of tcp_bpf_sendmsg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46783
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46786 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46786
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2024-46787 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: userfaultfd: fix checks for huge PMDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46787
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-11-20 15:33
|
| kernel-headers |
CVE-2024-46791 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46791
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46793 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: Boards: Fix NULL pointer deref in BYT/CHT boards harder
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46793
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-09-24 16:00
|
| kernel-headers |
CVE-2024-46796 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix double put of @cfile in smb2_set_path_size()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46796
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-09-20 18:20
|
| kernel-headers |
CVE-2024-46798 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46798
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46800 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sch/netem: fix use after free in netem_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46800
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46805 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix the waring dereferencing hive
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46805
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46806 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix the warning division or modulo by zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46806
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-02 13:17
|
| kernel-headers |
CVE-2024-46807 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/amdgpu: Check tbo resource pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46807
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46819 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: the warning dereferencing obj for nbio_v7_4
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46819
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46822 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46822
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46826 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ELF: fix kernel.randomize_va_space double read
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46826
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46828 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched: sch_cake: fix bulk flow accounting logic for host fairness
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46828
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46830 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46830
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2024-46834 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: fail closed if we can't get max channel used in indirection tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46834
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:57
|
| kernel-headers |
CVE-2024-46835 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix smatch static checker warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46835
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46842 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46842
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-08 18:22
|
| kernel-headers |
CVE-2024-46853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: nxp-fspi: fix the KASAN report out-of-bounds bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46855 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_socket: fix sk refcount leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46855
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46857 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix bridge mode operations when there are no VFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46857
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46859 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46859
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46863 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46863
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:32
|
| kernel-headers |
CVE-2024-46871 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46871
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-09 14:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47408 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: check smcd_v2_ext_offset when receiving proposal msg
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47408
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-47660 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fsnotify: clear PARENT_WATCHED flags lazily
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47660
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-09 14:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47668 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47668
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-09 15:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47673 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47673
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-09 15:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47678 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: icmp: change the order of rate limits
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47678
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47679 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfs: fix race between evice_inodes() and find_inode()&iput()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47679
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47682 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: sd: Fix off-by-one error in sd_read_block_characteristics()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47682
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47684 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: check skb is non-NULL in tcp_rto_delta_us()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47684
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47685 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47685
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-18 15:36
|
| kernel-headers |
CVE-2024-47687 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa/mlx5: Fix invalid mr resource destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47687
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2024-10-23 15:22
|
| kernel-headers |
CVE-2024-47692 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: return -EINVAL when namelen is 0
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47692
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47693 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/core: Fix ib_cache_setup_one error flow cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47693
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47696 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47696
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47700 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: check stripe size compatibility on remount as well
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47700
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2024-10-23 21:27
|
| kernel-headers |
CVE-2024-47701 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: avoid OOB when system.data xattr changes underneath the filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47701
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47703 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, lsm: Add check for BPF LSM return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47703
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:33
|
| kernel-headers |
CVE-2024-47705 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix potential invalid pointer dereference in blk_add_partition
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47705
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47706 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block, bfq: fix possible UAF for bfqq->bic with merge chain
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47706
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47707 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47707
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47710 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sock_map: Add a cond_resched() in sock_hash_free()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47710
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47713 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47713
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47718 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw88: always wait for both firmware loading attempts
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47718
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47719 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Protect against overflow of ALIGN() during iova allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47719
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2024-10-24 16:21
|
| kernel-headers |
CVE-2024-47737 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: call cache_put if xdr_reserve_space returns NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47737
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47738 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: don't use rate mask for offchannel TX either
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47738
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47739 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: padata: use integer wrap around to prevent deadlock on seq_nr overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47739
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47748 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost_vdpa: assign irq bypass producer token correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47748
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47749 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/cxgb4: Added NULL check for lookup_atid
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47749
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-48873 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: check return value of ieee80211_probereq_get() for RNR
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48873
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-48876 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: stackdepot: fix stack_depot_save_flags() in NMI context
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48876
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-09-23 16:38
|
| kernel-headers |
CVE-2024-49568 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49568
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-10-15 20:28
|
| kernel-headers |
CVE-2024-49570 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/tracing: Fix a potential TP_printk UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49570
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-03-24 18:56
|
| kernel-headers |
CVE-2024-49571 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49571
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49851 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: Clean up TPM space after command failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49851
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49855 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nbd: fix race between timeout and normal completion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49855
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49856 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/sgx: Fix deadlock in SGX NUMA node search
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49856
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49860 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: sysfs: validate return type of _STR method
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49860
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49862 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powercap: intel_rapl: Fix off by one in get_rpi()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2024-10-23 16:53
|
| kernel-headers |
CVE-2024-49864 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix a race between socket set up and I/O thread creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49864
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:23
|
| kernel-headers |
CVE-2024-49870 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cachefiles: fix dentry leak in cachefiles_open_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49870
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49878 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: resource: fix region_intersects() vs add_memory_driver_managed()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49878
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49880 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix off by one issue in alloc_flex_gd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49880
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-10-25 14:42
|
| kernel-headers |
CVE-2024-49881 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: update orig_path in ext4_find_extent()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49881
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49882 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix double brelse() the buffer of the extents path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49882
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49883 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: aovid use-after-free in ext4_ext_insert_extent()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49883
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49884 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix slab-use-after-free in ext4_split_extent_at()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49884
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49885 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm, slub: avoid zeroing kmalloc redzone
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49885
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:36
|
| kernel-headers |
CVE-2024-49886 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49886
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49888 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix a sdiv overflow issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49888
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-11-13 14:54
|
| kernel-headers |
CVE-2024-49889 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: avoid use-after-free in ext4_ext_show_leaf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49891 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49904 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: add list empty check to avoid null pointer issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49904
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:54
|
| kernel-headers |
CVE-2024-49925 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbdev: efifb: Register sysfs groups through driver core
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49925
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49927 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/ioapic: Handle allocation failures gracefully
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49927
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49928 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: avoid reading out of bounds when loading TX power FW elements
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49928
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:22
|
| kernel-headers |
CVE-2024-49929 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49929
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49930 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix array out-of-bound access in SoC stats
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49930
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49933 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk_iocost: fix more out of bound shifts
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49933
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49934 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49934
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49935 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: PAD: fix crash in exit_round_robin()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49935
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49937 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: Set correct chandef when starting CAC
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49937
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49938 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49938
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49939 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: avoid to add interface to list twice when SER
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49939
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49940 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: l2tp: prevent possible tunnel refcount underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49940
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-11-13 13:26
|
| kernel-headers |
CVE-2024-49944 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49944
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49946 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ppp: do not assume bh is held in ppp_channel_bridge_input()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49946
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49948 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: add more sanity checks to qdisc_pkt_len_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49948
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49950 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: L2CAP: Fix uaf in l2cap_connect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49950
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49951 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49951
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49952 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: prevent nf_skb_duplicated corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49952
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49953 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49953
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-11-07 17:44
|
| kernel-headers |
CVE-2024-49954 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: static_call: Replace pointless WARN_ON() in static_call_module_notify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49954
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49955 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: battery: Fix possible crash when unregistering a battery hook
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49955
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49959 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49959
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49960 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix timer use-after-free on failed mount
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49960
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49962 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49962
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49968 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: filesystems without casefold feature cannot be mounted with siphash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49968
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2024-49971 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: Increase array size of dummy_boolean
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49971
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-11-01 19:59
|
| kernel-headers |
CVE-2024-49973 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: r8169: add tally counter fields added with RTL8125
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49973
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: Limit the number of concurrent async COPY operations
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49975 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: uprobes: fix kernel info leak via "[uprobes]" vma
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49975
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49976 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/timerlat: Drop interface_lock in stop_kthread()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49976
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-10-25 20:14
|
| kernel-headers |
CVE-2024-49978 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gso: fix udp gso fraglist segmentation after pull from frag_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49978
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49983 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49983
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49991 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49991
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49994 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix integer overflow in BLKSECDISCARD
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49994
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49999 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: afs: Fix the setting of the server responding flag
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49999
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2024-10-29 18:03
|
| kernel-headers |
CVE-2024-50000 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50000
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50002 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: static_call: Handle module init failure correctly in static_call_del_module()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50002
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50006 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix i_data_sem unlock order in ext4_ind_migrate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50006
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50007 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: asihpi: Fix potential OOB array access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50007
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50008 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50009 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50009
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-02-02 11:15
|
| kernel-headers |
CVE-2024-50010 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exec: don't WARN for racy path_noexec check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50012 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: Avoid a bad reference count on CPU node
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50013 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: fix memory leak in exfat_load_bitmap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50014 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix access to uninitialised lock in fc replay path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50014
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2026-01-05 11:17
|
| kernel-headers |
CVE-2024-50015 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: dax: fix overflowing extents beyond inode size when partially writing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50015
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50019 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kthread: unpark only parked kthread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50019
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50020 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50020
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:50
|
| kernel-headers |
CVE-2024-50021 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50021
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:52
|
| kernel-headers |
CVE-2024-50022 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: device-dax: correct pgoff align in dax_set_mapping()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50022
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50023 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: Remove LED entry from LEDs list on unregister
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50023
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:07
|
| kernel-headers |
CVE-2024-50024 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: Fix an unsafe loop on the list
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50024
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50027 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: core: Free tzp copy along with the thermal zone
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50027
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-08 16:15
|
| kernel-headers |
CVE-2024-50028 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: core: Reference count the zone in thermal_zone_get_by_id()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50028
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:21
|
| kernel-headers |
CVE-2024-50029 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50029
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 15:27
|
| kernel-headers |
CVE-2024-50033 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: slip: make slhc_remember() more robust against malicious packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50033
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50035 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ppp: fix ppp_async_encode() illegal access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50035
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50036 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: do not delay dst_entries_add() in dst_release()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50036
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50038 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: xtables: avoid NFPROTO_UNSPEC where needed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50038
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50039 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: accept TCA_STAB only for root qdisc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50039
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50040 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: igb: Do not bring the device up after non-fatal error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50040
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50041 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50041
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50042 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix increasing MSI-X on VF
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50042
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-11-22 17:21
|
| kernel-headers |
CVE-2024-50045 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: br_netfilter: fix panic with metadata_dst skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50046 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50046
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50047 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix UAF in async decryption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50047
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-50048 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50048
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50055 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver core: bus: Fix double free in driver API bus_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50055
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2026-01-05 11:17
|
| kernel-headers |
CVE-2024-50057 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tipd: Free IRQ only if it was requested before
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50057
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 16:12
|
| kernel-headers |
CVE-2024-50058 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: protect uart_port_dtr_rts() in uart_shutdown() too
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50058
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50060 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: check if we need to reschedule during overflow flush
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50060
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50063 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Prevent tail call between progs attached to different hooks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50063
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-50064 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: zram: free secondary algorithms names
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-04-16 19:15
|
| kernel-headers |
CVE-2024-50067 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: uprobe: avoid out-of-bounds memory access of fetching args
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50067
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-28 01:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50073 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50073
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50074 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: parport: Proper fix for array out-of-bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50074
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50075 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xhci: tegra: fix checked USB2 port number
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50076 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vt: prevent kernel-infoleak in con_font_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50076
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2024-11-08 16:15
|
| kernel-headers |
CVE-2024-50077 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: ISO: Fix multiple init when debugfs is disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50078 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Call iso_exit() on module unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50081 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: setup queue ->tag_set before initializing hctx
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50081
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2024-50083 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: fix mptcp DSS corruption due to large pmtu xmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50095 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mad: Improve handling of timed out WRs of mad agent
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50095
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 17:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50106 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: fix race between laundromat and free_stateid
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50106
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15
|
| kernel-headers |
CVE-2024-50109 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: fix null ptr dereference in raid10_size()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50109
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50114 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Unregister redistributor for failed vCPU creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50114
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15
|
| kernel-headers |
CVE-2024-50117 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd: Guard against bad data for ATIF ACPI method
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50117
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50126 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sched: use RCU read-side critical section in taprio_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50126
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50127 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sched: fix use-after-free in taprio_change()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50127
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50128 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: wwan: fix global oob in wwan_rtnl_policy
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50128
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50131 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Consider the NULL character when validating the event length
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50131
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50135 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-pci: fix race condition between reset and nvme_dev_disable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50136 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Unregister notifier on eswitch init failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50136
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50139 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Fix shift-out-of-bounds bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50139
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50141 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50141
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50143 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: fix uninit-value use in udf_get_fileshortad
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50143
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50145 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50145
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50146 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Don't call cleanup on profile rollback failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50146
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-50147 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix command bitmask initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50147
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50151 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix OOBs when building SMB2_IOCTL request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50152 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix possible double free in smb2_set_ea()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50152
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2024-11-19 02:16
|
| kernel-headers |
CVE-2024-50153 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: core: Fix null-ptr-deref in target_alloc_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50153
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50155 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netdevsim: use cond_resched() in nsim_dev_trap_report_work()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50155
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50157 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50157
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-02-02 11:15
|
| kernel-headers |
CVE-2024-50158 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Fix out of bound check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50158
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50160 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda/cs8409: Fix possible NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50160
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50162 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: devmap: provide rxq after redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50162
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50164 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix overloading of MEM_UNINIT's meaning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50164
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-50165 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Preserve param->string when parsing mount options
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50165
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50167 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: be2net: fix potential memory leak in be_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50167
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50169 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vsock: Update rx_bytes on read_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50169
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50172 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Fix a possible memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50172
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50179 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: remove the incorrect Fw reference check when dirtying pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50179
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50182 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: secretmem: disable memfd_secret() if arch cannot set direct map
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50182
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50183 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50183
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50185 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: handle consistently DSS corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50185
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50189 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: amd_sfh: Switch to device-managed dmam_alloc_coherent()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50189
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50191 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: don't set SB_RDONLY after filesystem errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50191
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2026-01-05 11:17
|
| kernel-headers |
CVE-2024-50195 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: posix-clock: Fix missing timespec64 check in pc_clock_settime()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50195
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50197 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pinctrl: intel: platform: fix error path in device_for_each_child_node()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50207 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ring-buffer: Fix reader locking when changing the sub buffer order
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50207
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50208 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50208
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50209 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Add a check for memory allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50209
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50215 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet-auth: assign dh_key to NULL after kfree_sensitive
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50223 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/numa: Fix the potential null pointer dereference in task_numa_work()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50223
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50235 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: clear wdev->cqm_config pointer on free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50235
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50236 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath10k: Fix memory leak in management tx
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50236
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50237 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50237
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50250 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fsdax: dax_unshare_iter needs to copy entire blocks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50250
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50251 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_payload: sanitize offset and length before calling skb_checksum()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50251
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50255 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50255
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50256 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50256
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50258 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: fix crash when config small gso_max_size/gso_ipv4_max_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50258
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-50259 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50259
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50261 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: macsec: Fix use-after-free while sending the offloading packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50261
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50262 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix out-of-bounds write in trie_get_next_key()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50262
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50264 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50264
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50267 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: serial: io_edgeport: fix use after free in debug printk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50267
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50268 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50268
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50271 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: signal: restore the override_rlimit logic
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50271
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50272 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: filemap: Fix bounds checking in filemap_read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50272
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50274 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: avoid vport access in idpf_get_link_ksettings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50274
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50275 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64/sve: Discard stale CPU state when handling SVE traps
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50275
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-50277 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: fix a crash if blk_alloc_disk fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50277
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50278 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm cache: fix potential out-of-bounds access on the first resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50278
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50279 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm cache: fix out-of-bounds access to the dirty bitset when resizing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50279
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50282 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50282
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50294 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix missing locking causing hanging calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50294
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50299 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: properly validate chunk size in sctp_sf_ootb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50299
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50301 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: security/keys: fix slab-out-of-bounds in key_task_permission
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50301
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50303 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: resource,kexec: walk_system_ram_res_rev must retain resource flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50303
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50304 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50304
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-52332 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: igb: Fix potential invalid memory access in igb_init_module()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52332
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53042 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53042
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53044 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: sch_api: fix xa_insert() error path in tcf_block_get_ext()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53044
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53045 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: dapm: fix bounds checker error in dapm_widget_list_create
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53048 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix crash on probe for DPLL enabled E810 LOM
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53048
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53050 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/hdcp: Add encoder check in hdcp2_get_capability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53050
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53052 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53052
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53055 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: fix 6 GHz scan construction
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53055
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53057 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53057
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53059 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53059
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53060 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53060
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53066 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfs: Fix KMSAN warning in decode_getfattr_attrs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53066
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53070 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: fix fault at system suspend if device was already runtime suspended
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53070
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53073 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: Never decrement pending_async_copies on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53073
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2024-12-14 21:15
|
| kernel-headers |
CVE-2024-53074 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: don't leak a link on AP removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53074
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53079 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/thp: fix deferred split unqueue naming and locking
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53079
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53082 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio_net: Add hash_key_length check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53085 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: Lock TPM chip in tpm_pm_suspend() first
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53085
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2024-12-09 13:10
|
| kernel-headers |
CVE-2024-53088 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: fix race condition by adding filter's intermediate sync state
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53088
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53090 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: afs: Fix lock recursion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53090
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-21 19:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53091 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53091
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-21 19:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53093 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-multipath: defer partition scanning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53093
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-21 19:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53095 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: Fix use-after-free of network namespace.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53095
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-21 19:15 修改: 2025-03-24 17:21
|
| kernel-headers |
CVE-2024-53096 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: resolve faulty mmap_region() error path behaviour
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53096
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-25 22:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53099 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Check validity of link->type in bpf_link_show_fdinfo()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53099
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-25 22:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53100 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme: tcp: avoid race between queue_lock lock and destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53100
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-25 22:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53103 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53103
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 08:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53109 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nommu: pass NULL argument to vma_iter_prealloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53109
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53110 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vp_vdpa: fix id_table array not null terminated error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53110
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53114 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53114
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53117 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio/vsock: Improve MSG_ZEROCOPY error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53117
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53118 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vsock: Fix sk_error_queue memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53119 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio/vsock: Fix accept_queue memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53119
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53120 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53120
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53121 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: fs, lock FTE when checking if active
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53121
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53123 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: error out earlier on disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53123
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53124 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: fix data-races around sk->sk_forward_alloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53124
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-02 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53134 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pmdomain: imx93-blk-ctrl: correct remove path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53134
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-04 15:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53135 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-04 15:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53136 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: revert "mm: shmem: fix data-race in shmem_getattr()"
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53136
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-04 15:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53138 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: kTLS, Fix incorrect page refcounting
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53138
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-04 15:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53140 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netlink: terminate outstanding dump on socket close
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53140
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-04 15:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53144 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53144
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-17 16:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53146 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: Prevent a potential integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53146
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-24 12:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53147 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: fix out-of-bounds access of directory entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53147
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-24 12:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53166 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block, bfq: fix bfqq uaf in bfq_limit_depth()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53166
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-53167 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfs/blocklayout: Don't attempt unregister for invalid block device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53167
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-08 14:41
|
| kernel-headers |
CVE-2024-53168 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53168
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-02-10 18:15
|
| kernel-headers |
CVE-2024-53169 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-fabrics: fix kernel crash while shutting down controller
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53169
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53170 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix uaf for flush rq while iterating tags
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53170
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53173 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4.0: Fix a use-after-free problem in the asynchronous open()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53173
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53174 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: make sure cache entry active before cache_show
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53174
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53177 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: prevent use-after-free due to open_cached_dir error paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53177
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-03-24 17:26
|
| kernel-headers |
CVE-2024-53178 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: Don't leak cfid when reconnect races with open_cached_dir
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53178
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-53179 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix use-after-free of signing key
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53179
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-02-10 18:15
|
| kernel-headers |
CVE-2024-53185 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix NULL ptr deref in crypto_aead_setkey()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53185
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-05-02 07:15
|
| kernel-headers |
CVE-2024-53194 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Fix use-after-free of slot->bus on hot remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53194
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53195 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Get rid of userspace_irqchip_in_use
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53195
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-08 14:07
|
| kernel-headers |
CVE-2024-53196 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Don't retire aborted MMIO instruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53196
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53207 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: MGMT: Fix possible deadlocks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53207
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53209 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix receive ring space parameters when XDP is active
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53209
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-53219 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtiofs: use pages instead of pointer for kernel direct IO
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53219
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-53236 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: Free skb when TX metadata options are invalid
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53236
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-08 13:47
|
| kernel-headers |
CVE-2024-53239 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: 6fire: Release resources at card release
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53239
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53240 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen: netfront: Backend can crash Linux netfront (Xen Security Advisory 465)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53240
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-24 10:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53241 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen: Xen hypercall page unsafe against speculative attacks (Xen Security Advisory 466)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53241
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-24 10:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53680 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53680
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-54460 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: iso: Fix circular lock in iso_listen_bis
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-54460
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-54683 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: IDLETIMER: Fix for possible ABBA deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-54683
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-55642 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: Prevent potential deadlocks in zone write plug error recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-55642
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56369 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/modes: Avoid divide by zero harder in drm_mode_vrefresh()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56369
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56535 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: coex: check NULL return of kmalloc in btc_fw_set_monreg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56535
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56558 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: make sure exp active before svc_export_show
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56558
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56569 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix regression with module command in stack_trace_filter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56569
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56589 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: hisi_sas: Add cond_resched() for no forced preemption model
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56589
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56600 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: inet6: do not leave a dangling sk pointer in inet6_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56600
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56604 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56604
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56605 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56605
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56609 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56609
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-56615 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: fix OOB devmap writes when deleting elements
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56615
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56633 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56633
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56636 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: geneve: do not assume mac header is set in geneve_xmit_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56636
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56637 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ipset: Hold module reference while requesting a module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56637
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56638 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_inner: incorrect percpu area handling under softirq
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56638
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-07 20:19
|
| kernel-headers |
CVE-2024-56640 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: fix LGR and link use-after-free issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56640
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56642 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: Fix use-after-free of kernel socket in cleanup_bearer().
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56642
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56647 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: Fix icmp host relookup triggering ip_rt_bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56647
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56648 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hsr: avoid potential out-of-bound access in fill_frame_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56648
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56654 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56654
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56658 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: defer final 'struct net' free in netns dismantle
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56658
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56662 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56662
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56664 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Fix race between element replace and close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56664
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56667 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Fix NULL pointer dereference in capture_engine
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56667
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56672 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-cgroup: Fix UAF in blkcg_unpin_online()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56672
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56675 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56675
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56677 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56677
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56678 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/mm/fault: Fix kfence page fault reporting
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56678
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56679 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56679
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56688 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56688
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56690 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56690
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56693 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: brd: defer automatic disk creation until module initialization succeeds
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56693
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56703 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: Fix soft lockups in fib6_select_path under high next hop churn
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56703
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56709 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: check if iowq is killed before queuing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56709
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 09:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56716 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netdevsim: prevent bad user input in nsim_dev_health_break_write()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56716
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 09:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56718 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: protect link down work from execute after lgr freed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56718
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 09:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56725 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56725
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56726 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in cn10k.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56726
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56727 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56727
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56729 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: Initialize cfid->tcon before performing network ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56729
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56739 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtc: check if __rtc_read_time was successful in rtc_timer_do_work()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56739
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56751 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: release nexthop on device removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56751
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56757 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: mediatek: add intf release flow when usb disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56757
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-06 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56760 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/MSI: Handle lack of irqdomain gracefully
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-06 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56763 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Prevent bad count for tracing_cpumask_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56763
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-06 17:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56765 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries/vas: Add close() callback in vas_vm_ops struct
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56765
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-06 17:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56770 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: netem: account for backlog updates from child qdisc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56770
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-08 17:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56772 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kunit: string-stream: Fix a UAF bug in kunit_init_suite()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56772
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-08 18:15 修改: 2025-02-10 18:15
|
| kernel-headers |
CVE-2024-56779 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56779
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-08 18:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56783 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56783
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-08 18:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57791 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: check return value of sock_recvmsg when draining clc data
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57791
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57793 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57793
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-09-24 18:53
|
| kernel-headers |
CVE-2024-57795 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Remove the direct link to net_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57795
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-15 13:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2024-57798 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57798
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57849 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/cpum_sf: Handle CPU hotplug remove during sampling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57849
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57875 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: RCU protect disk->conv_zones_bitmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57875
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 15:15 修改: 2025-10-17 15:27
|
| kernel-headers |
CVE-2024-57882 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: fix TCP options overflow.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57882
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-15 13:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57890 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/uverbs: Prevent integer overflow issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57890
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-15 13:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57924 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: relax assertions on failure to encode file handles
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57924
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 12:15 修改: 2025-11-03 18:15
|
| kernel-headers |
CVE-2024-57932 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gve: guard XDP xmit NDO on existence of xdp queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57932
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 12:15 修改: 2025-09-26 19:10
|
| kernel-headers |
CVE-2024-57938 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sctp: Prevent autoclose integer overflow in sctp_association_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57938
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57940 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: fix the infinite loop in exfat_readdir()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57940
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 13:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57946 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio-blk: don't keep queue frozen during system suspend
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57946
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 13:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57948 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mac802154: check local interfaces before deleting sdata list
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57948
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57951 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hrtimers: Handle CPU state correctly on hotplug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57951
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-12 14:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udp: Deal with race between UDP socket address change and rehash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-23 18:00
|
| kernel-headers |
CVE-2024-57977 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memcg: fix soft lockup in the OOM process
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57977
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-57979 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pps: Fix a use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57979
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-57980 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: uvcvideo: Fix double free in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57980
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-57981 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: xhci: Fix NULL pointer dereference on certain command aborts
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57981
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-57982 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: state: fix out-of-bounds read during lookup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57982
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2024-57985 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: qcom: scm: Cleanup global '__scm' on probe failures
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57985
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-23 17:56
|
| kernel-headers |
CVE-2024-57986 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57986
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-57987 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57987
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-57988 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57988
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-57989 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57989
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-57995 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57995
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-02 14:15
|
| kernel-headers |
CVE-2024-57996 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: sch_sfq: don't allow 1 packet limit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57996
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-58005 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: Change to kvalloc() in eventlog/acpi.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58005
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-58013 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-58014 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58014
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-58015 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Fix for out-of bound access error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58015
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-10-22 19:37
|
| kernel-headers |
CVE-2024-58017 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58017
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-58053 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix handling of received connection abort
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58053
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-28 02:48
|
| kernel-headers |
CVE-2024-58057 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: convert workqueues to unbound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58057
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-28 02:48
|
| kernel-headers |
CVE-2024-58061 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: prohibit deactivating all links
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58061
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58062 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58062
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-58064 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-58069 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58071 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: team: prevent adding a device which is already a team device lower
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58071
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58072 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtlwifi: remove unused check_buddy_priv
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58072
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58075 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: tegra - do not transfer req when tegra init fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-31 16:33
|
| kernel-headers |
CVE-2024-58083 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58088 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix deadlock when freeing cgroup storage
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58088
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-58092 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: fix legacy client tracking initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58092
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 11:15 修改: 2025-10-28 19:11
|
| kernel-headers |
CVE-2024-58093 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: PCI/ASPM use-after-free during hot-unplug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58093
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-10-28 18:53
|
| kernel-headers |
CVE-2024-58096 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58096
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-10-28 18:55
|
| kernel-headers |
CVE-2024-58097 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix RCU stall while reaping monitor destination ring
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2024-58098 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: track changes_pkt_data property for global functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58098
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-05 15:15 修改: 2025-11-10 17:35
|
| kernel-headers |
CVE-2024-58100 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: check changes_pkt_data property for extension programs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58100
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-05 15:15 修改: 2025-11-10 17:35
|
| kernel-headers |
CVE-2024-58237 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: consider that tail calls invalidate packet pointers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58237
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-05 15:15 修改: 2025-11-10 17:35
|
| kernel-headers |
CVE-2024-58238 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58238
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-09 15:15 修改: 2025-11-19 17:20
|
| kernel-headers |
CVE-2024-58240 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tls: separate no-async decryption request handling from async
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58240
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-28 10:15 修改: 2026-01-09 19:17
|
| kernel-headers |
CVE-2024-58241 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Bluetooth HCI local DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58241
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-24 11:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-21631 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21631
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2025-21649 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21649
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21653 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21653
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21659 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netdev: prevent accessing NAPI instances from another namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21659
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 13:15 修改: 2025-10-15 13:47
|
| kernel-headers |
CVE-2025-21664 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm thin: make get_first_thin use rcu-safe list first function
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21664
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 13:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21670 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vsock/bpf: return early if transport is not assigned
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21670
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21671 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: zram: fix potential UAF of zram table
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21671
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21672 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: afs: Fix merge preference rule failure condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21672
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21673 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix double free of TCP_Server_Info::hostname
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21673
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21681 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: openvswitch: fix lockup on tx to unregistering netdev with carrier
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21681
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21682 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eth: bnxt: always recalculate features after XDP clearing, fix null-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21682
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21683 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix bpf_sk_select_reuseport() memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21683
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-31 12:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21689 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21689
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 16:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21692 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sched: fix ets qdisc OOB Indexing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21692
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 16:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21693 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: zswap: properly synchronize freeing resources during CPU hotunplug
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21693
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 16:15 修改: 2025-04-16 19:15
|
| kernel-headers |
CVE-2025-21696 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: clear uffd-wp PTE/PMD state on mremap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21696
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-12 14:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21700 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sched: Disallow replacing of child qdisc from one parent to another
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21700
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-13 12:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21706 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: pm: only set fullmesh for subflow endp
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21706
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21707 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: consolidate suboption status
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21707
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21709 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kernel: be more careful about dup_mmap() failures and uprobe registering
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21709
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-23 17:45
|
| kernel-headers |
CVE-2025-21714 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Fix implicit ODP use after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21714
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-03-24 17:50
|
| kernel-headers |
CVE-2025-21724 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: iommufd/iova_bitmap shift-out-of-bounds vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21724
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21725 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix oops due to unset link speed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21725
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21728 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Send signals asynchronously if !preemptible
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21729 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21729
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-03-24 18:57
|
| kernel-headers |
CVE-2025-21731 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nbd: don't allow reconnect after disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21731
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21732 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21732
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-10-28 20:41
|
| kernel-headers |
CVE-2025-21738 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ata: libata-sff: Ensure that we cannot write outside the allocated buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21738
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21739 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ufs: core: Fix use-after free in init error and remove paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21739
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-03-24 17:12
|
| kernel-headers |
CVE-2025-21745 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-cgroup: Fix class @block_class's subsystem refcount leakage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21745
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21746 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: synaptics - fix crash when enabling pass-through port
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21746
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-10-28 20:48
|
| kernel-headers |
CVE-2025-21760 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ndisc: extend RCU protection in ndisc_send_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21761 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21761
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21762 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arp: use RCU protection in arp_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21762
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21763 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: neighbour: use RCU protection in __neigh_notify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21763
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21764 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ndisc: use RCU protection in ndisc_alloc_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21764
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21765 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: use RCU protection in ip6_default_advmss()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21765
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21767 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21767
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21768 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21768
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-10-28 20:28
|
| kernel-headers |
CVE-2025-21772 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: partitions: mac: fix handling of bogus partition table
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21772
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21787 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: team: better TEAM_OPTION_TYPE_STRING validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21787
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21790 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vxlan: check vxlan_vnigroup_init() return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21790
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21796 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: clear acl_access/acl_default after releasing them
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21796
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21808 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: xdp: Disallow attaching device-bound programs in generic mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21808
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-10-28 02:56
|
| kernel-headers |
CVE-2025-21809 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc, afs: Fix peer hash locking vs RCU callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21809
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21814 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ptp: Ensure info->enable callback is always set
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21814
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21816 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hrtimers: Force migrate away hrtimers queued after CPUHP_AP_HRTIMERS_DYING
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21816
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-11-03 18:15
|
| kernel-headers |
CVE-2025-21817 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: mark GFP_NOIO around sysfs ->store()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21817
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-10-28 02:53
|
| kernel-headers |
CVE-2025-21826 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: reject mismatching sum of field_len with set key length
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21826
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21828 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: don't flush non-uploaded STAs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21828
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-31 16:17
|
| kernel-headers |
CVE-2025-21836 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/kbuf: re-using old struct io_buffer_list may lead to a use-after-free situation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-07 09:15 修改: 2025-10-29 20:51
|
| kernel-headers |
CVE-2025-21838 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: gadget: core: flush gadget workqueue after device removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21838
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-07 09:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21839 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21839
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-07 09:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21844 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: Add check for next_buffer in receive_encrypted_standard()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21844
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21846 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: acct: perform last write from workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21846
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21848 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21848
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21852 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: Add rx_skb of kfree_skb to raw_tp_null_args[].
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21852
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: avoid holding freeze_mutex during mmap operation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21854 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sockmap, vsock: For connectible sockets allow only connected
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21854
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21855 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ibmvnic: Don't reference skb after sending to VIOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21855
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21856 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/ism: add release function for struct device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21856
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21857 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: cls_api: fix error handling causing NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21857
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21858 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: geneve: Fix use-after-free in geneve_find_dev().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21858
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21861 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-02 14:15
|
| kernel-headers |
CVE-2025-21862 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drop_monitor: fix incorrect initialization order
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21864 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: drop secpath at the same time as we currently drop dst
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21864
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21870 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21870
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 14:15 修改: 2025-10-29 21:07
|
| kernel-headers |
CVE-2025-21874 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm-integrity: Avoid divide by zero in table status in Inline mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21874
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-30 16:12
|
| kernel-headers |
CVE-2025-21885 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21885
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:52
|
| kernel-headers |
CVE-2025-21892 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Fix the recovery flow of the UMR QP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21892
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-29 17:18
|
| kernel-headers |
CVE-2025-21899 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix bad hist from corrupting named_triggers list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21899
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21900 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4: Fix a deadlock when recovering state on a sillyrenamed file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21900
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2025-21905 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: limit printed string from FW file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21905
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21908 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21908
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21913 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21913
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21920 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vlan: enforce underlying device type
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21920
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21936 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21936
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21938 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21938
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21939 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/hmm: Don't dereference struct page pointers without notifier lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21939
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-30 19:44
|
| kernel-headers |
CVE-2025-21948 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: appleir: Fix potential NULL dereference at raw event handle
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21948
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21951 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21951
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21959 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21959
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21966 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21966
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-01 19:15
|
| kernel-headers |
CVE-2025-21969 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21969
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2025-21971 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: Prevent creation of classes with TC_H_ROOT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21971
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21973 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eth: bnxt: fix kernel panic in the bnxt_get_queue_stats{rx | tx}
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21973
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-04-01 20:26
|
| kernel-headers |
CVE-2025-21974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-31 19:15
|
| kernel-headers |
CVE-2025-21975 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: handle errors in mlx5_chains_create_table()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21975
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21979 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21979
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21980 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched: address a potential NULL pointer dereference in the GRED scheduler.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21980
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21993 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21993
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-02 13:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21997 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: fix an integer overflow in xp_create_and_assign_umem()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21997
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21999 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: proc: fix UAF in proc_get_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21999
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22004 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: atm: fix use after free in lec_send()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22004
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22005 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22005
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22013 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-08 09:15 修改: 2025-10-28 17:16
|
| kernel-headers |
CVE-2025-22015 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/migrate: fix shmem xarray update during migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22015
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-08 09:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22016 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dpll: fix xa_alloc_cyclic() error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22016
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-08 09:15 修改: 2025-10-28 17:09
|
| kernel-headers |
CVE-2025-22017 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: devlink: fix xa_alloc_cyclic() error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22017
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-08 09:15 修改: 2025-10-28 17:08
|
| kernel-headers |
CVE-2025-22021 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: socket: Lookup orig tuple for IPv6 SNAT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22021
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 11:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22024 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: fix management of listener transports
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22024
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2025-22025 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: put dl_stid if fail to queue dl_recall
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22025
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22044 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: acpi: nfit: fix narrowing conversion in acpi_nfit_ctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22044
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22050 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usbnet:fix NPE during rx_complete
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22050
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22053 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ibmveth: make veth_pool_store stop hanging
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22053
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-10-31 20:18
|
| kernel-headers |
CVE-2025-22057 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: decrease cached dst counters in dst_release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22057
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-10-31 20:17
|
| kernel-headers |
CVE-2025-22062 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: add mutual exclusion in proc_sctp_do_udp_port()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22062
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22063 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22063
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22065 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: fix adapter NULL pointer dereference on reboot
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22065
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2025-22075 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtnetlink: Allocate vfinfo size for VF GUIDs when supported
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22077 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: Fix netns refcount imbalance causing leaks and use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-10-31 20:46
|
| kernel-headers |
CVE-2025-22090 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/mm/pat: Fix VM_PAT handling when fork() fails in copy_page_range()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22090
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-22097 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vkms: Fix use after free and double free on init error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22106 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vmxnet3: unregister xdp rxq info in the reset path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22106
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:42
|
| kernel-headers |
CVE-2025-22108 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Mask the bd_cnt field in the TX BD properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22108
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:42
|
| kernel-headers |
CVE-2025-22124 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22124
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:27
|
| kernel-headers |
CVE-2025-22125 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid1,raid10: don't ignore IO flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22125
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:27
|
| kernel-headers |
CVE-2025-2312 |
中危 |
5.14.0-611.24.1.el9_7 |
|
cifs-utils: kernel: cifs-utils: cifs.upcall makes an upcall to the wrong namespace in containerized environments
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-2312
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-25 18:15 修改: 2025-03-27 16:45
|
| kernel-headers |
CVE-2025-23131 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dlm: prevent NPD when writing a positive value to event_done
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23131
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:01
|
| kernel-headers |
CVE-2025-23132 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: f2fs: quota: fix to avoid warning in dquot_writeback_dquots()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23132
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:01
|
| kernel-headers |
CVE-2025-23133 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: update channel list in reg notifier instead reg worker
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23133
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:01
|
| kernel-headers |
CVE-2025-23134 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: timer: Don't take register_mutex with copy_from/to_user()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23134
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2025-23136 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: int340x: Add NULL check for adev
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23136
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-23137 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq/amd-pstate: Add missing NULL ptr check in amd_pstate_update
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23137
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-06-27 11:15
|
| kernel-headers |
CVE-2025-23138 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: watch_queue: fix pipe accounting mismatch
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23138
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:00
|
| kernel-headers |
CVE-2025-23141 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23141
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 21:50
|
| kernel-headers |
CVE-2025-23142 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: SCTP use-after-free due to race condition in sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23142
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 22:04
|
| kernel-headers |
CVE-2025-23143 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23143
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 22:05
|
| kernel-headers |
CVE-2025-23145 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: fix NULL pointer in can_accept_new_subflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23145
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 18:05
|
| kernel-headers |
CVE-2025-23161 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23161
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 17:51
|
| kernel-headers |
CVE-2025-23163 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: vlan: don't propagate flags on open
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23163
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 17:50
|
| kernel-headers |
CVE-2025-37745 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37745
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 16:06
|
| kernel-headers |
CVE-2025-37747 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf: Fix hang while freeing sigtrap event
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37747
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 16:16
|
| kernel-headers |
CVE-2025-37757 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix memory leak in tipc_link_xmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37757
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-04 18:00
|
| kernel-headers |
CVE-2025-37761 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel drm/xe: Out-of-bounds shift in TLB invalidation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37761
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-11-06 21:44
|
| kernel-headers |
CVE-2025-37773 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtiofs: add filesystem context source name check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37773
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-11-05 17:49
|
| kernel-headers |
CVE-2025-37785 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix OOB read when checking dotdot dir
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37785
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 07:15 修改: 2025-11-03 20:18
|
| kernel-headers |
CVE-2025-37789 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: openvswitch: fix nested key length validation in the set() action
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37789
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-11-06 17:27
|
| kernel-headers |
CVE-2025-37791 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: cmis_cdb: use correct rpl size in ethtool_cmis_module_poll()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37791
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-05-02 13:53
|
| kernel-headers |
CVE-2025-37798 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37798
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 15:15 修改: 2025-11-06 20:49
|
| kernel-headers |
CVE-2025-37800 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver core: fix potential NULL pointer dereference in dev_uevent()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37800
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-06-05 14:32
|
| kernel-headers |
CVE-2025-37807 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix kmemleak warning for percpu hashmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37807
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-10 17:32
|
| kernel-headers |
CVE-2025-37808 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: null - Use spin lock instead of mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37808
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-10 17:31
|
| kernel-headers |
CVE-2025-37809 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: class: Fix NULL pointer access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37809
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-12 21:42
|
| kernel-headers |
CVE-2025-37811 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: chipidea: ci_hdrc_imx: fix usbmisc handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37811
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-12 21:40
|
| kernel-headers |
CVE-2025-37813 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: xhci: Fix invalid pointer dereference in Etron workaround
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37813
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-12 21:38
|
| kernel-headers |
CVE-2025-37819 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: irqchip/gic-v2m use-after-free vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37819
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-12 21:25
|
| kernel-headers |
CVE-2025-37820 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37820
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-12 21:24
|
| kernel-headers |
CVE-2025-37824 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix NULL pointer dereference in tipc_mon_reinit_self()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37824
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-10 15:45
|
| kernel-headers |
CVE-2025-37825 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet: fix out-of-bounds access in nvmet_enable_port
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37825
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-10 15:42
|
| kernel-headers |
CVE-2025-37829 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37829
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-12 21:45
|
| kernel-headers |
CVE-2025-37830 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37830
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-37834 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/vmscan: don't try to reclaim hwpoison folio
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37834
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-14 19:48
|
| kernel-headers |
CVE-2025-37836 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Fix reference leak in pci_register_host_bridge()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-14 19:52
|
| kernel-headers |
CVE-2025-37839 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: remove wrong sb->s_sequence check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37839
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-14 19:54
|
| kernel-headers |
CVE-2025-37842 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: fsl-qspi: use devm function instead of driver remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37842
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-17 12:49
|
| kernel-headers |
CVE-2025-37843 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: pciehp: Avoid unnecessary device replacement check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37843
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-17 12:49
|
| kernel-headers |
CVE-2025-37844 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: avoid NULL pointer dereference in dbg call
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37844
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-17 12:49
|
| kernel-headers |
CVE-2025-37846 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: mops: Do not dereference src reg for a set operation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37846
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-17 12:54
|
| kernel-headers |
CVE-2025-37848 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: accel/ivpu: Fix PM related deadlocks in MS IOCTLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37848
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-17 12:54
|
| kernel-headers |
CVE-2025-37849 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Tear down vGIC on failed vCPU creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37849
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-17 12:54
|
| kernel-headers |
CVE-2025-37857 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: st: Fix array overflow in st_setup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37857
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 20:08
|
| kernel-headers |
CVE-2025-37859 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: page_pool: avoid infinite loop to schedule delayed worker
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37859
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 20:10
|
| kernel-headers |
CVE-2025-37860 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sfc: fix NULL dereferences in ef100_process_design_param()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37860
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 07:15 修改: 2025-11-02 14:15
|
| kernel-headers |
CVE-2025-37861 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 20:12
|
| kernel-headers |
CVE-2025-37862 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: pidff: Fix null pointer dereference in pidff_find_fields
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 20:13
|
| kernel-headers |
CVE-2025-37867 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/core: Silence oversized kvmalloc() warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37867
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 20:15
|
| kernel-headers |
CVE-2025-37869 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Use local fence in error path of xe_migrate_clear
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37869
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 20:37
|
| kernel-headers |
CVE-2025-37873 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eth: bnxt: fix missing ring index trim on error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37873
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:51
|
| kernel-headers |
CVE-2025-37875 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: igc: fix PTM cycle trigger logic
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37875
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:52
|
| kernel-headers |
CVE-2025-37876 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfs: Only create /proc/fs/netfs with CONFIG_PROC_FS
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37876
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:52
|
| kernel-headers |
CVE-2025-37877 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu: Clear iommu-dma ops on cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37877
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:53
|
| kernel-headers |
CVE-2025-37878 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37878
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2026-01-02 16:15
|
| kernel-headers |
CVE-2025-37882 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: xHCI driver isochronous event handling race condition leading to data loss or UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37882
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:28
|
| kernel-headers |
CVE-2025-37883 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/sclp: Add check for get_zeroed_page()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37883
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:29
|
| kernel-headers |
CVE-2025-37884 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37884
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2026-01-02 16:15
|
| kernel-headers |
CVE-2025-37885 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Reset IRTE to host control if *new* route isn't postable
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37885
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:36
|
| kernel-headers |
CVE-2025-37888 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix null-ptr-deref in mlx5_create_{inner_,}ttc_table()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37888
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:36
|
| kernel-headers |
CVE-2025-37889 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: ops: Consistently treat platform_max as control value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-17 17:13
|
| kernel-headers |
CVE-2025-37891 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: ALSA: ump buffer overflow via malformed UMP SysEx message
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-19 08:15 修改: 2025-11-17 19:21
|
| kernel-headers |
CVE-2025-37912 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37912
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-17 18:11
|
| kernel-headers |
CVE-2025-37918 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37918
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-17 16:52
|
| kernel-headers |
CVE-2025-37919 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: amd: acp: Fix NULL pointer deref in acp_i2s_set_tdm_slot
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37919
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-12 16:36
|
| kernel-headers |
CVE-2025-37921 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vxlan: vnifilter: Fix unlocked deletion of default FDB entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37921
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-10 21:09
|
| kernel-headers |
CVE-2025-37922 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: book3s64/radix : Align section vmemmap start address to PAGE_SIZE
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37922
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-10 21:03
|
| kernel-headers |
CVE-2025-37933 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeon_ep: Fix host hang issue during device reboot
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37933
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-17 15:11
|
| kernel-headers |
CVE-2025-37940 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Add cond_resched() to ftrace_graph_set_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37940
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-19 17:44
|
| kernel-headers |
CVE-2025-37944 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37944
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-17 12:57
|
| kernel-headers |
CVE-2025-37948 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37948
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-18 20:57
|
| kernel-headers |
CVE-2025-37949 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xenbus: Use kref to track req lifetime
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37949
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-17 20:05
|
| kernel-headers |
CVE-2025-37954 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: Avoid race in open_cached_dir with lease breaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37954
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-14 17:03
|
| kernel-headers |
CVE-2025-37957 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37957
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-14 17:03
|
| kernel-headers |
CVE-2025-37959 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Scrub packet on bpf_redirect_peer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37959
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-16 20:38
|
| kernel-headers |
CVE-2025-37960 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memblock: Accept allocated memory before use in memblock_double_array()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37960
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-14 17:02
|
| kernel-headers |
CVE-2025-37961 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipvs: fix uninit-value for saddr in do_output_route4
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37961
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-16 20:38
|
| kernel-headers |
CVE-2025-37963 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37963
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-16 20:29
|
| kernel-headers |
CVE-2025-37967 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: ucsi: displayport: Fix deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37967
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 17:15 修改: 2025-12-16 20:30
|
| kernel-headers |
CVE-2025-37973 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37973
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 17:15 修改: 2025-11-14 17:02
|
| kernel-headers |
CVE-2025-37974 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/pci: Fix missing check for zpci_create_device() error return
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 17:15 修改: 2025-11-14 17:01
|
| kernel-headers |
CVE-2025-37978 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: integrity: Do not call set_page_dirty_lock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37978
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 17:15 修改: 2025-11-14 17:01
|
| kernel-headers |
CVE-2025-37985 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: wdm: close race between wdm_open and wdm_wwan_port_stop
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37985
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 18:15 修改: 2025-12-16 20:19
|
| kernel-headers |
CVE-2025-37986 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: class: Invalidate USB device pointers on partner unregistration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37986
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 18:15 修改: 2025-11-14 16:59
|
| kernel-headers |
CVE-2025-37989 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: leds: fix memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37989
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 18:15 修改: 2025-12-16 20:19
|
| kernel-headers |
CVE-2025-37990 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37990
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 18:15 修改: 2025-12-16 20:19
|
| kernel-headers |
CVE-2025-37992 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: Flush gso_skb list too during ->change()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37992
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-26 15:15 修改: 2025-12-16 20:19
|
| kernel-headers |
CVE-2025-37995 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: module: ensure that kobject_put() is safe for module type kobjects
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37995
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-29 14:15 修改: 2025-12-16 20:20
|
| kernel-headers |
CVE-2025-37997 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ipset: fix region locking in hash types
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37997
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-29 14:15 修改: 2025-12-16 20:20
|
| kernel-headers |
CVE-2025-37998 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: openvswitch: Fix unsafe attribute parsing in output_userspace()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37998
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-29 14:15 修改: 2025-12-16 20:21
|
| kernel-headers |
CVE-2025-38003 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: bcm: add missing rcu read protection for procfs content
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38003
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-08 11:15 修改: 2025-12-17 20:04
|
| kernel-headers |
CVE-2025-38004 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: bcm: add locking for bcm_op runtime updates
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38004
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-08 11:15 修改: 2025-12-17 20:03
|
| kernel-headers |
CVE-2025-38008 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to race condition in unaccepted memory handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-17 12:56
|
| kernel-headers |
CVE-2025-38014 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38014
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 19:02
|
| kernel-headers |
CVE-2025-38015 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: idxd: fix memory leak in error handling path of idxd_alloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38015
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:54
|
| kernel-headers |
CVE-2025-38017 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via endless busy loop in eventpoll
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38017
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 19:01
|
| kernel-headers |
CVE-2025-38018 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Local Denial of Service due to NULL pointer dereference in net/tls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38018
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:54
|
| kernel-headers |
CVE-2025-38019 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38019
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 19:01
|
| kernel-headers |
CVE-2025-38022 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38022
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-38023 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service via NULL pointer dereference in NFS unlock path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38023
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:48
|
| kernel-headers |
CVE-2025-38024 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38024
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:48
|
| kernel-headers |
CVE-2025-38029 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to sleepable page allocation in KASAN
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38029
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:09
|
| kernel-headers |
CVE-2025-38031 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: padata: do not leak refcount in reorder_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38031
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-18 21:36
|
| kernel-headers |
CVE-2025-38035 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet-tcp: don't restore null sk_state_change
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38035
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 18:09
|
| kernel-headers |
CVE-2025-38036 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to null pointer dereference in GT MMIO initialization for VFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38036
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:08
|
| kernel-headers |
CVE-2025-38038 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in amd-pstate cpufreq driver via deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38038
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:08
|
| kernel-headers |
CVE-2025-38040 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38040
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-18 21:32
|
| kernel-headers |
CVE-2025-38044 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: cx231xx: set device_caps for 417
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38044
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 18:15
|
| kernel-headers |
CVE-2025-38047 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/fred: Fix system hang during S4 resume with FRED enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38047
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:07
|
| kernel-headers |
CVE-2025-38048 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Data race in virtio_ring can lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38048
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 18:17
|
| kernel-headers |
CVE-2025-38051 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: Fix use-after-free in cifs_fill_dirent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38051
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2026-01-12 13:11
|
| kernel-headers |
CVE-2025-38055 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freq
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38055
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:07
|
| kernel-headers |
CVE-2025-38056 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-after-free in ASoC SOF Intel HDA driver allows information disclosure, privilege escalation, or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:06
|
| kernel-headers |
CVE-2025-38057 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: espintcp: fix skb leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38057
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-38058 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38058
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-18 21:32
|
| kernel-headers |
CVE-2025-38060 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: BPF verifier security bypass due to incorrect state handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38060
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:06
|
| kernel-headers |
CVE-2025-38061 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: pktgen: fix access outside of user given buffer in pktgen_thread_write()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38061
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-18 21:31
|
| kernel-headers |
CVE-2025-38062 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-After-Free vulnerability in MSI translation via IOMMU domain change during VFIO operation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38062
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-18 21:31
|
| kernel-headers |
CVE-2025-38063 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: fix unconditional IO throttle caused by REQ_PREFLUSH
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38063
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:18
|
| kernel-headers |
CVE-2025-38064 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio: break and reset virtio devices on device_shutdown()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:05
|
| kernel-headers |
CVE-2025-38066 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm cache: prevent BUG_ON by blocking retries on failed device resumes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38066
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:18
|
| kernel-headers |
CVE-2025-38067 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rseq: Fix segfault on registration when rseq_cs is non-zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38067
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 18:52
|
| kernel-headers |
CVE-2025-38071 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/mm: Check return value from memblock_phys_alloc_range()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38071
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 18:54
|
| kernel-headers |
CVE-2025-38072 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: libnvdimm/labels: Fix divide error in nd_label_data_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38072
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 18:54
|
| kernel-headers |
CVE-2025-38077 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Buffer overflow in dell-wmi-sysman leading to denial of service, information disclosure, or code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 17:58
|
| kernel-headers |
CVE-2025-38078 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-After-Free vulnerability in PCM OSS layer due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 17:57
|
| kernel-headers |
CVE-2025-38083 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: prio: fix a race in prio_tune()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-20 12:15 修改: 2025-12-17 17:01
|
| kernel-headers |
CVE-2025-38095 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel dma-buf: Denial of Service via memory reordering
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38095
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 08:15 修改: 2025-12-16 17:18
|
| kernel-headers |
CVE-2025-38099 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel Bluetooth: Denial of Service via improper SCO voice setting
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38099
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:52
|
| kernel-headers |
CVE-2025-38100 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Local Denial of Service due to TIF_IO_BITMAP inconsistency
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38100
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-16 17:13
|
| kernel-headers |
CVE-2025-38102 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38102
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-16 17:10
|
| kernel-headers |
CVE-2025-38103 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38103
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-16 17:03
|
| kernel-headers |
CVE-2025-38105 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in USB-audio MIDI driver due to improper timer shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38105
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:39
|
| kernel-headers |
CVE-2025-38106 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel io_uring: Local privilege escalation, information disclosure, or denial of service via use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38106
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:36
|
| kernel-headers |
CVE-2025-38107 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Race condition in network scheduler can cause denial of service and data compromise.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38107
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-16 17:02
|
| kernel-headers |
CVE-2025-38108 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: red: fix a race in __red_change()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38108
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-16 17:02
|
| kernel-headers |
CVE-2025-38109 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix ECVF vports unload on shutdown flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38109
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:36
|
| kernel-headers |
CVE-2025-38111 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mdiobus: Fix potential out-of-bounds read/write access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38111
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-16 16:54
|
| kernel-headers |
CVE-2025-38112 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to TOCTOU in `sk_is_readable()`
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38112
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:13
|
| kernel-headers |
CVE-2025-38113 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: CPPC: Fix NULL pointer dereference when nosmp is used
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38113
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:28
|
| kernel-headers |
CVE-2025-38115 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Local Denial of Service in network scheduler
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38115
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:13
|
| kernel-headers |
CVE-2025-38117 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: MGMT: Protect mgmt_pending list with its own lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38117
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:33
|
| kernel-headers |
CVE-2025-38118 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:29
|
| kernel-headers |
CVE-2025-38120 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_set_pipapo_avx2: fix initial map fill
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38120
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:49
|
| kernel-headers |
CVE-2025-38122 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38122
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:11
|
| kernel-headers |
CVE-2025-38125 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: stmmac: make sure that ptp_rate is not 0 before configuring EST
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38125
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-38126 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in stmmac network driver due to division by zero during PTP timestamping configuration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38126
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:12
|
| kernel-headers |
CVE-2025-38127 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix Tx scheduler error handling in XDP callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38127
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:32
|
| kernel-headers |
CVE-2025-38128 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory corruption in Bluetooth subsystem via malformed HCI_CMD_SYNC command
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38128
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:31
|
| kernel-headers |
CVE-2025-38129 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-after-free vulnerability in page_pool_recycle_in_ring can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38129
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-38134 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service due to null pointer dereference in USB ACPI module
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38134
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 20:11
|
| kernel-headers |
CVE-2025-38140 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Local denial of service in device mapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38140
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 20:11
|
| kernel-headers |
CVE-2025-38141 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-after-free in device mapper due to race condition in zone reporting
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38141
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 20:10
|
| kernel-headers |
CVE-2025-38146 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel Open vSwitch: Denial of Service via malformed MPLS packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38146
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 21:23
|
| kernel-headers |
CVE-2025-38147 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: calipso: Don't call calipso functions for AF_INET sk.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38147
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 21:06
|
| kernel-headers |
CVE-2025-38149 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: clear phydev->devlink when the link is deleted
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38149
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 20:09
|
| kernel-headers |
CVE-2025-38154 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-after-free in BPF sockmap can lead to denial of service and privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38154
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 21:09
|
| kernel-headers |
CVE-2025-38157 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath9k_htc: Abort software beacon handling if disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38157
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 21:09
|
| kernel-headers |
CVE-2025-38161 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38161
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 17:30
|
| kernel-headers |
CVE-2025-38162 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in netfilter due to integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38162
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 19:44
|
| kernel-headers |
CVE-2025-38166 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: fix ktls panic with sockmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38166
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 20:51
|
| kernel-headers |
CVE-2025-38169 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Data corruption due to FPSIMD state clobbering during context switch
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38169
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 19:28
|
| kernel-headers |
CVE-2025-38177 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sch_hfsc: make hfsc_qlen_notify() idempotent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38177
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 13:15 修改: 2025-12-18 16:48
|
| kernel-headers |
CVE-2025-38180 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: atm: fix /proc/net/atm/lec handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38180
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 15:36
|
| kernel-headers |
CVE-2025-38181 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of service due to null pointer dereference in CALIPSO SYN cookie handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38181
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 16:49
|
| kernel-headers |
CVE-2025-38184 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38184
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 16:53
|
| kernel-headers |
CVE-2025-38186 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38186
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-19 20:55
|
| kernel-headers |
CVE-2025-38190 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: atm: Revert atm_account_tx() if copy_from_iter_full() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38190
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 17:24
|
| kernel-headers |
CVE-2025-38192 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: clear the dst when changing skb protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38192
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-19 20:47
|
| kernel-headers |
CVE-2025-38197 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: dell_rbu: Fix list usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:26
|
| kernel-headers |
CVE-2025-38198 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbcon: Make sure modelist not set on unregistered console
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:25
|
| kernel-headers |
CVE-2025-38199 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Fix memory leak due to multiple rx_stats allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38199
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-18 17:17
|
| kernel-headers |
CVE-2025-38201 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38201
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-18 17:09
|
| kernel-headers |
CVE-2025-38206 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: fix double free in delayed_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38206
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:17
|
| kernel-headers |
CVE-2025-38208 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: add NULL check in automount_fullpath
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38208
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-18 16:49
|
| kernel-headers |
CVE-2025-38209 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-tcp: remove tag set when second admin queue config fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38209
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-18 16:45
|
| kernel-headers |
CVE-2025-38210 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: configfs-tsm-report: Fix NULL dereference of tsm_ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38210
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-18 15:46
|
| kernel-headers |
CVE-2025-38212 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipc: fix to protect IPCS lookups using RCU
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38212
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:11
|
| kernel-headers |
CVE-2025-38214 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38214
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:10
|
| kernel-headers |
CVE-2025-38215 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 20:01
|
| kernel-headers |
CVE-2025-38216 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Restore context entry setup order for aliased devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38216
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-18 15:45
|
| kernel-headers |
CVE-2025-38222 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: inline: fix len overflow in ext4_prepare_inline_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38222
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 19:48
|
| kernel-headers |
CVE-2025-38231 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: Initialize ssc before laundromat_work to prevent NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38231
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 19:27
|
| kernel-headers |
CVE-2025-38232 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: fix race between nfsd registration and exports_proc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38232
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-11-18 16:22
|
| kernel-headers |
CVE-2025-38234 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/rt: Fix race in push_rt_task
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38234
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2026-01-08 10:15
|
| kernel-headers |
CVE-2025-38238 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: fnic: Fix crash in fnic_wq_cmpl_handler when FDMI times out
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38238
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-11-19 15:54
|
| kernel-headers |
CVE-2025-38244 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in SMB client due to deadlock during channel reconnection
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38244
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-11-20 20:13
|
| kernel-headers |
CVE-2025-38245 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in ATM subsystem due to a race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38245
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-12-18 17:14
|
| kernel-headers |
CVE-2025-38246 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt: properly flush XDP redirect lists
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38246
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-11-20 20:14
|
| kernel-headers |
CVE-2025-38248 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel:A use-after-free in bridge multicast in br_multicast_port_ctx_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38248
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-11-19 21:01
|
| kernel-headers |
CVE-2025-38249 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38249
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-12-18 17:11
|
| kernel-headers |
CVE-2025-38251 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: atm: clip: prevent NULL deref in clip_push()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38251
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-12-18 17:08
|
| kernel-headers |
CVE-2025-38253 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: wacom: fix crash in wacom_aes_battery_handler()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38253
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-11-19 21:00
|
| kernel-headers |
CVE-2025-38255 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38255
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-11-19 20:58
|
| kernel-headers |
CVE-2025-38257 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via integer overflow in s390/pkey memory allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38257
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-12-18 17:07
|
| kernel-headers |
CVE-2025-38258 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path on write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38258
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-11-19 20:52
|
| kernel-headers |
CVE-2025-38262 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: serial: uartlite: register uart driver in init
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38262
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-12-18 16:59
|
| kernel-headers |
CVE-2025-38265 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: jsm: fix NPE during jsm_uart_port_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38265
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-18 18:27
|
| kernel-headers |
CVE-2025-38270 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: drv: netdevsim: don't napi_complete() from netpoll
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38270
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-20 16:49
|
| kernel-headers |
CVE-2025-38280 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Avoid __bpf_prog_ret0_warn when jit fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38280
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-18 16:51
|
| kernel-headers |
CVE-2025-38282 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kernfs: Relax constraint in draining guard
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38282
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-18 16:50
|
| kernel-headers |
CVE-2025-38284 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: pci: configure manual DAC mode via PCI config API only
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38284
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:36
|
| kernel-headers |
CVE-2025-38285 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix WARN() in get_bpf_raw_tp_regs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38285
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-18 16:46
|
| kernel-headers |
CVE-2025-38287 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service in IB/cm component due to improper message handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38287
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:37
|
| kernel-headers |
CVE-2025-38288 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38288
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-07-10 13:17
|
| kernel-headers |
CVE-2025-38289 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of service due to use-after-free in scsi: lpfc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38289
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:37
|
| kernel-headers |
CVE-2025-38290 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: fix node corruption in ar->arvifs list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38290
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:39
|
| kernel-headers |
CVE-2025-38291 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Prevent sending WMI commands to firmware during firmware crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38291
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:42
|
| kernel-headers |
CVE-2025-38293 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in ath11k wifi driver due to list node corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38293
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-18 16:44
|
| kernel-headers |
CVE-2025-38294 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel ath12k Wi-Fi driver: Denial of Service via NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38294
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:42
|
| kernel-headers |
CVE-2025-38302 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to improper bio submission in the block layer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38302
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:13
|
| kernel-headers |
CVE-2025-38303 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: eir: Fix possible crashes on eir_create_adv_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38303
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 20:17
|
| kernel-headers |
CVE-2025-38304 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (Bluetooth): Denial of Service due to NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38304
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-19 17:57
|
| kernel-headers |
CVE-2025-38305 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (PTP): Denial of Service due to recursive locking in virtual clock handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38305
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-19 17:58
|
| kernel-headers |
CVE-2025-38307 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: avs: Verify content returned by parse_int_array()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38307
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-18 12:55
|
| kernel-headers |
CVE-2025-38310 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (seg6): Information disclosure or denial of service via improper nexthop address validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38310
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-19 17:58
|
| kernel-headers |
CVE-2025-38311 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (iavf): Denial of Service due to a locking issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38311
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-18 12:55
|
| kernel-headers |
CVE-2025-38312 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38312
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-12-19 17:58
|
| kernel-headers |
CVE-2025-38315 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btintel: Check dsbr size from EFI variable
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38315
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-18 12:55
|
| kernel-headers |
CVE-2025-38317 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Fix buffer overflow in debugfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38317
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-18 12:54
|
| kernel-headers |
CVE-2025-38318 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in perf: arm-ni due to null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38318
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-18 12:54
|
| kernel-headers |
CVE-2025-38320 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Information disclosure and denial of service via stack-out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38320
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-19 16:44
|
| kernel-headers |
CVE-2025-38321 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: Log an error when close_all_cached_dirs fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38321
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-11-18 12:53
|
| kernel-headers |
CVE-2025-38322 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/intel: Fix crash in icl_update_topdown_event()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38322
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-19 16:49
|
| kernel-headers |
CVE-2025-38323 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: atm: add lec_mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38323
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-19 16:49
|
| kernel-headers |
CVE-2025-38324 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in MPLS subsystem due to suspicious RCU usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38324
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-19 16:55
|
| kernel-headers |
CVE-2025-38334 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/sgx: Prevent attempts to reclaim poisoned pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38334
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-16 17:55
|
| kernel-headers |
CVE-2025-38335 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38335
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-16 17:51
|
| kernel-headers |
CVE-2025-38337 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38337
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-16 17:49
|
| kernel-headers |
CVE-2025-38338 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38338
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-11-18 12:52
|
| kernel-headers |
CVE-2025-38342 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: software node: Correct a OOB check in software_node_get_reference_args()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38342
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-16 17:48
|
| kernel-headers |
CVE-2025-38344 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPICA: fix acpi parse and parseext cache leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38344
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-16 17:47
|
| kernel-headers |
CVE-2025-38346 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix UAF when lookup kallsym after ftrace disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38346
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-16 17:38
|
| kernel-headers |
CVE-2025-38349 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel use-after-free in eventpoll
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38349
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-18 08:15 修改: 2025-11-18 12:52
|
| kernel-headers |
CVE-2025-38353 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to invalid lock on device wedge in drm/xe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38353
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-11-18 12:51
|
| kernel-headers |
CVE-2025-38355 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Process deferred GGTT node removals on device unwind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38355
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-11-18 12:50
|
| kernel-headers |
CVE-2025-38356 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to a race condition in drm/xe/guc CT safe mode unwind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38356
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-11-18 12:50
|
| kernel-headers |
CVE-2025-38359 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/mm: Fix in_atomic() handling in do_secure_storage_access()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38359
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-11-18 20:33
|
| kernel-headers |
CVE-2025-38363 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/tegra: Fix a possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38363
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-16 14:11
|
| kernel-headers |
CVE-2025-38364 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38364
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-16 14:08
|
| kernel-headers |
CVE-2025-38369 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38369
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-11-18 19:27
|
| kernel-headers |
CVE-2025-38372 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to unsafe xarray access in RDMA/mlx5
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38372
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-11-18 19:26
|
| kernel-headers |
CVE-2025-38375 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio-net: ensure the received length does not exceed allocated size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38375
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-16 17:03
|
| kernel-headers |
CVE-2025-38386 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in ACPICA due to missing method arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38386
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-16 20:12
|
| kernel-headers |
CVE-2025-38391 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: altmodes/displayport: do not index invalid pin_assignments
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38391
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-23 19:28
|
| kernel-headers |
CVE-2025-38393 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38393
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-23 19:31
|
| kernel-headers |
CVE-2025-38399 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38399
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-23 19:37
|
| kernel-headers |
CVE-2025-38403 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Privilege escalation via uninitialized data in vmci transport packet
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38403
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 14:15 修改: 2025-12-23 19:42
|
| kernel-headers |
CVE-2025-38408 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via improper pointer initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38408
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 14:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-38412 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38412
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 14:15 修改: 2025-12-23 18:47
|
| kernel-headers |
CVE-2025-38414 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service in ath12k Wi-Fi driver due to incorrect register definition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38414
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 14:15 修改: 2025-11-19 18:59
|
| kernel-headers |
CVE-2025-38415 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38415
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 14:15 修改: 2025-12-23 18:45
|
| kernel-headers |
CVE-2025-38424 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service in perf due to user stack sampling during process exit
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38424
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 15:15 修改: 2025-12-23 18:35
|
| kernel-headers |
CVE-2025-38425 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: tegra: check msg length in SMBUS block read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38425
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 15:15 修改: 2025-12-23 18:35
|
| kernel-headers |
CVE-2025-38427 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to invalid I/O memory access via PCI framebuffer relocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38427
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 15:15 修改: 2025-11-19 18:59
|
| kernel-headers |
CVE-2025-38430 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38430
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 15:15 修改: 2025-12-22 21:54
|
| kernel-headers |
CVE-2025-38431 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in SMB client due to native symlink handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38431
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 15:15 修改: 2025-11-19 19:01
|
| kernel-headers |
CVE-2025-38436 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/scheduler: signal scheduled fence when kill job
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38436
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 15:15 修改: 2025-11-19 18:09
|
| kernel-headers |
CVE-2025-38439 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38439
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:55
|
| kernel-headers |
CVE-2025-38440 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to race condition in mlx5e driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38440
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-11-19 18:09
|
| kernel-headers |
CVE-2025-38441 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38441
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:55
|
| kernel-headers |
CVE-2025-38443 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nbd: fix uaf in nbd_genl_connect() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38443
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:53
|
| kernel-headers |
CVE-2025-38444 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: raid10: cleanup memleak at raid10_make_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38444
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:53
|
| kernel-headers |
CVE-2025-38445 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to stack memory use-after-return in raid1_reshape
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38445
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:53
|
| kernel-headers |
CVE-2025-38450 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel mt7925 Wi-Fi driver: Denial of Service via NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38450
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-11-19 17:52
|
| kernel-headers |
CVE-2025-38455 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38455
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:54
|
| kernel-headers |
CVE-2025-38457 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to invalid queueing discipline (qdisc) parent class handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38457
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:49
|
| kernel-headers |
CVE-2025-38458 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: atm: clip: Fix NULL pointer dereference in vcc_sendmsg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38458
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:49
|
| kernel-headers |
CVE-2025-38459 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38459
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:50
|
| kernel-headers |
CVE-2025-38462 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in vsock due to TOCTOU race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38462
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:52
|
| kernel-headers |
CVE-2025-38465 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netlink: Fix wraparounds of sk->sk_rmem_alloc.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38465
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 19:36
|
| kernel-headers |
CVE-2025-38466 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in uprobes due to improper instruction validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38466
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 19:38
|
| kernel-headers |
CVE-2025-38468 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38468
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-12-22 19:36
|
| kernel-headers |
CVE-2025-38470 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38470
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-12-22 19:34
|
| kernel-headers |
CVE-2025-38473 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38473
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-12-22 19:29
|
| kernel-headers |
CVE-2025-38474 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Local privilege escalation or denial of service in usb: net: sierra driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38474
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-12-22 19:29
|
| kernel-headers |
CVE-2025-38475 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (smc): Denial of Service due to type confusion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38475
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-11-19 17:27
|
| kernel-headers |
CVE-2025-38477 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: sch_qfq: Fix race condition on qfq_aggregate
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38477
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-12-23 18:28
|
| kernel-headers |
CVE-2025-38478 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: comedi: Fix initialization of data for instructions that write to subdevice
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38478
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-12-23 18:27
|
| kernel-headers |
CVE-2025-38488 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in SMB client due to use-after-free in asynchronous crypto handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38488
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2026-01-07 16:26
|
| kernel-headers |
CVE-2025-38491 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: make fallback action and fallback decision atomic
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38491
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2026-01-07 16:26
|
| kernel-headers |
CVE-2025-38494 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: core: do not bypass hid_hw_raw_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38494
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-38495 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: core: ensure the allocated report buffer can contain the reserved report ID
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38495
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2026-01-07 16:26
|
| kernel-headers |
CVE-2025-38496 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in dm-bufio due to scheduling in atomic context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38496
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-11-19 17:47
|
| kernel-headers |
CVE-2025-38510 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kasan: remove kasan_find_vm_area() to prevent possible deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38510
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 11:15 修改: 2026-01-07 18:00
|
| kernel-headers |
CVE-2025-38511 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/pf: Clear all LMTT pages on alloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38511
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 11:15 修改: 2025-11-18 21:50
|
| kernel-headers |
CVE-2025-38512 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: prevent A-MSDU attacks in mesh networks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38512
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 11:15 修改: 2026-01-07 17:58
|
| kernel-headers |
CVE-2025-38514 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix oops due to non-existence of prealloc backlog struct
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38514
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 11:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-38524 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix recv-recv race of completed call
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38524
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2025-11-18 21:53
|
| kernel-headers |
CVE-2025-38526 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: add NULL check in eswitch lag check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38526
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2025-11-18 18:14
|
| kernel-headers |
CVE-2025-38537 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: Don't register LEDs for genphy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38537
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2025-11-18 18:09
|
| kernel-headers |
CVE-2025-38539 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Add down_write(trace_event_sem) when adding trace event
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38539
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2026-01-07 18:42
|
| kernel-headers |
CVE-2025-38540 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38540
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-38541 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38541
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2025-11-18 18:09
|
| kernel-headers |
CVE-2025-38543 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/tegra: nvdec: Fix dma_alloc_coherent error check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38543
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2026-01-07 18:34
|
| kernel-headers |
CVE-2025-38544 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in rxrpc due to prealloc collision
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38544
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2025-11-18 18:09
|
| kernel-headers |
CVE-2025-38552 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: plug races between subflow fail and subflow creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38552
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2026-01-07 18:31
|
| kernel-headers |
CVE-2025-38553 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: Restrict conditions for adding duplicating netems to qdisc tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38553
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 06:15 修改: 2026-01-08 20:49
|
| kernel-headers |
CVE-2025-38557 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: apple: validate feature-report field count to prevent NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38557
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-28 14:41
|
| kernel-headers |
CVE-2025-38559 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86/intel/pmt: fix a crashlog NULL pointer access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38559
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-28 14:42
|
| kernel-headers |
CVE-2025-38560 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/sev: Evict cache lines during SNP memory validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38560
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-38568 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38568
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-26 20:04
|
| kernel-headers |
CVE-2025-38569 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: benet: fix BUG when creating VFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38569
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-08 21:08
|
| kernel-headers |
CVE-2025-38574 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pptp: ensure minimal skb length in pptp_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38574
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-09 14:39
|
| kernel-headers |
CVE-2025-38584 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: padata: Fix pd UAF once and for all
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38584
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-26 17:57
|
| kernel-headers |
CVE-2025-38587 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: fix possible infinite loop in fib6_info_uses_dev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38587
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-07 18:45
|
| kernel-headers |
CVE-2025-38588 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: prevent infinite loop in rt6_nlmsg_size()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38588
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-07 18:44
|
| kernel-headers |
CVE-2025-38592 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_devcd_dump: fix out-of-bounds via dev_coredumpv
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38592
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-26 17:59
|
| kernel-headers |
CVE-2025-38593 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38593
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-38601 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: clear initialized flag for deinit-ed srng lists
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38601
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-07 18:42
|
| kernel-headers |
CVE-2025-38602 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iwlwifi: Add missing check for alloc_ordered_workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38602
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-07 18:38
|
| kernel-headers |
CVE-2025-38605 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38605
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-26 18:02
|
| kernel-headers |
CVE-2025-38606 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Avoid accessing uninitialized arvif->ar during beacon miss
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38606
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-26 17:40
|
| kernel-headers |
CVE-2025-38609 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PM / devfreq: Check governor before using governor->name
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38609
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-07 18:23
|
| kernel-headers |
CVE-2025-38616 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in kTLS due to race condition in receive path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38616
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 14:15 修改: 2025-11-26 17:44
|
| kernel-headers |
CVE-2025-38617 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/packet: fix a race in packet_set_ring() and packet_notifier()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38617
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 14:15 修改: 2026-01-07 16:57
|
| kernel-headers |
CVE-2025-38618 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vsock: Do not allow binding to VMADDR_PORT_ANY
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38618
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 14:15 修改: 2026-01-07 16:56
|
| kernel-headers |
CVE-2025-38622 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: drop UFO packets in udp_rcv_segment()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38622
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 16:40
|
| kernel-headers |
CVE-2025-38629 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb: scarlett2: Fix missing NULL check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38629
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 17:10
|
| kernel-headers |
CVE-2025-38632 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pinmux: fix race causing mux_owner NULL with active mux_usecount
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38632
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 17:11
|
| kernel-headers |
CVE-2025-38641 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: Fix potential NULL dereference on kmalloc failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38641
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 16:37
|
| kernel-headers |
CVE-2025-38642 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fix WARN_ON for monitor mode on some devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38642
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 16:38
|
| kernel-headers |
CVE-2025-38644 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: reject TDLS operations when station is not associated
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38644
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 16:21
|
| kernel-headers |
CVE-2025-38645 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Check device memory pointer before usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38645
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 17:36
|
| kernel-headers |
CVE-2025-38646 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38646
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 16:42
|
| kernel-headers |
CVE-2025-38653 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38653
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 17:36
|
| kernel-headers |
CVE-2025-38659 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gfs2: No more self recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38659
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 16:32
|
| kernel-headers |
CVE-2025-38660 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: [ceph] parse_longname(): strrchr() expects NUL-terminated string
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38660
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:13
|
| kernel-headers |
CVE-2025-38664 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38664
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 17:32
|
| kernel-headers |
CVE-2025-38665 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38665
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 17:32
|
| kernel-headers |
CVE-2025-38668 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: core: fix NULL dereference on unbind due to stale coupling data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38668
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-08 22:30
|
| kernel-headers |
CVE-2025-38669 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Revert "drm/gem-shmem: Use dma_buf from GEM object instance"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38669
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:14
|
| kernel-headers |
CVE-2025-38673 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Revert "drm/gem-framebuffer: Use dma_buf from GEM object instance"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38673
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:14
|
| kernel-headers |
CVE-2025-38674 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Revert "drm/prime: Use dma_buf from GEM object instance"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38674
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:04
|
| kernel-headers |
CVE-2025-38676 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/amd: Avoid stack buffer overflow from kernel cmdline
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38676
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-26 13:15 修改: 2026-01-08 22:30
|
| kernel-headers |
CVE-2025-38678 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: reject duplicate device on updates
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38678
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-03 13:15 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-38680 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38680
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-08 22:32
|
| kernel-headers |
CVE-2025-38681 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38681
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-08 22:32
|
| kernel-headers |
CVE-2025-38683 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hv_netvsc: Fix panic during namespace deletion with VF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38683
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-08 22:32
|
| kernel-headers |
CVE-2025-38688 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Prevent ALIGN() overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38688
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-11-24 19:47
|
| kernel-headers |
CVE-2025-38691 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pNFS: Fix uninited ptr deref in block/scsi layout
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38691
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-09 18:57
|
| kernel-headers |
CVE-2025-38692 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: add cluster chain loop check for dir
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38692
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-11-24 19:45
|
| kernel-headers |
CVE-2025-38694 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38694
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-38695 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38695
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-09 17:06
|
| kernel-headers |
CVE-2025-38700 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38700
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-09 17:04
|
| kernel-headers |
CVE-2025-38701 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38701
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-09 16:18
|
| kernel-headers |
CVE-2025-38703 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Make dma-fences compliant with the safe access rules
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38703
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-11-24 19:45
|
| kernel-headers |
CVE-2025-38706 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38706
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-38709 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: loop: Avoid updating block size under exclusive owner
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38709
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-12-03 20:00
|
| kernel-headers |
CVE-2025-38710 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gfs2: Validate i_depth for exhash directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38710
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-11-25 22:07
|
| kernel-headers |
CVE-2025-38725 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: asix_devices: add phy_mask for ax88772 mdio bus
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38725
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-08 17:38
|
| kernel-headers |
CVE-2025-38729 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb-audio: Validate UAC3 power domain descriptors, too
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38729
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-08 17:31
|
| kernel-headers |
CVE-2025-38730 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Data corruption and system instability due to improper io_uring/net buffer handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38730
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2025-11-25 21:50
|
| kernel-headers |
CVE-2025-38731 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Fix vm_bind_ioctl double free bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38731
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2025-11-25 21:51
|
| kernel-headers |
CVE-2025-38732 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_reject: don't leak dst refcount for loopback packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38732
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-09 22:12
|
| kernel-headers |
CVE-2025-38735 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gve: prevent ethtool ops after shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38735
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-08 15:37
|
| kernel-headers |
CVE-2025-39673 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ppp: fix race conditions in ppp_fill_forward_path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39673
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-07 20:40
|
| kernel-headers |
CVE-2025-39677 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: Fix backlog accounting in qdisc_dequeue_internal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39677
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2025-11-25 21:28
|
| kernel-headers |
CVE-2025-39678 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39678
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2025-11-25 21:28
|
| kernel-headers |
CVE-2025-39682 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tls: fix handling of zero-length records on the rx_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39682
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-39683 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Limit access to parser->buffer when trace_get_user failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39683
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-08 15:32
|
| kernel-headers |
CVE-2025-39688 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: allow SC_STATUS_FREEABLE when searching via nfs4_lookup_stateid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39688
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 07:15 修改: 2025-11-06 21:34
|
| kernel-headers |
CVE-2025-39689 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Also allocate and copy hash for reading of filter files
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39689
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-08 14:52
|
| kernel-headers |
CVE-2025-39691 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/buffer: fix use-after-free when call bh_read() helper
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39691
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-08 16:10
|
| kernel-headers |
CVE-2025-39703 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net, hsr: reject HSR frame if skb can't hold tag
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39703
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-08 16:26
|
| kernel-headers |
CVE-2025-39713 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39713
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-07 20:39
|
| kernel-headers |
CVE-2025-39726 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/ism: fix concurrency management in ism_cmd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39726
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2025-11-25 18:05
|
| kernel-headers |
CVE-2025-39732 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39732
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-07 16:15 修改: 2025-11-25 17:52
|
| kernel-headers |
CVE-2025-39742 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39742
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-09 19:09
|
| kernel-headers |
CVE-2025-39746 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath10k: shutdown driver when hardware is unreliable
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39746
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 18:13
|
| kernel-headers |
CVE-2025-39750 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Correct tid cleanup when tid setup fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39750
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 21:11
|
| kernel-headers |
CVE-2025-39754 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/smaps: fix race between smaps_hugetlb_range and migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39754
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-26 16:20
|
| kernel-headers |
CVE-2025-39756 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via excessive file descriptor table allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39756
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-09 18:51
|
| kernel-headers |
CVE-2025-39760 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-39763 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39763
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 19:59
|
| kernel-headers |
CVE-2025-39764 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via double-increment of reference count in netfilter
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39764
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 19:58
|
| kernel-headers |
CVE-2025-39765 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: timer: fix ida_free call while not allocated
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39765
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 19:58
|
| kernel-headers |
CVE-2025-39766 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39766
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-09 18:44
|
| kernel-headers |
CVE-2025-39773 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bridge: fix soft lockup in br_multicast_query_expired()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39773
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-16 20:11
|
| kernel-headers |
CVE-2025-39775 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: mremap local denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39775
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 19:54
|
| kernel-headers |
CVE-2025-39782 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: prevent softlockup in jbd2_log_do_checkpoint()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39782
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-16 20:24
|
| kernel-headers |
CVE-2025-39790 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bus: mhi: host: Detect events pointing to unexpected TREs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39790
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-16 20:25
|
| kernel-headers |
CVE-2025-39791 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: dm-crypt: Do not partially accept write BIOs with zoned targets
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39791
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 18:20
|
| kernel-headers |
CVE-2025-39792 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: Always split write BIOs to zoned device limits
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39792
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-12 16:15 修改: 2025-11-25 18:16
|
| kernel-headers |
CVE-2025-39794 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: tegra: Use I/O memcpy to write to IRAM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39794
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-12 16:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-39797 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: Duplicate SPI Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39797
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-12 16:15 修改: 2025-11-24 18:04
|
| kernel-headers |
CVE-2025-39798 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFS: Fix the setting of capabilities when automounting a new filesystem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39798
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-12 16:15 修改: 2026-01-16 20:00
|
| kernel-headers |
CVE-2025-39808 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39808
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:07
|
| kernel-headers |
CVE-2025-39809 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: intel-thc-hid: intel-quicki2c: Fix ACPI dsd ICRS/ISUB length
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39809
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39810 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix memory corruption when FW resources change during ifdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39810
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39818 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39818
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39823 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: use array_index_nospec with indices that come from guest
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:38
|
| kernel-headers |
CVE-2025-39824 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (ASUS HID): Use-after-free vulnerability allows arbitrary code execution or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39824
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:37
|
| kernel-headers |
CVE-2025-39830 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39830
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39832 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix lockdep assertion on sync reset unload event
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39832
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39834 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39834
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39838 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: prevent NULL pointer dereference in UTF16 conversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39838
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-02 16:16
|
| kernel-headers |
CVE-2025-39847 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ppp: fix memory leak in pad_compress_skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39847
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:20
|
| kernel-headers |
CVE-2025-39850 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39850
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39851 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39851
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39853 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: Fix potential invalid access when MAC list is empty
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39853
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:16
|
| kernel-headers |
CVE-2025-39854 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix NULL access of tx->in_use in ice_ll_ts_intr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39854
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39855 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix NULL access of tx->in_use in ice_ptp_ts_irq
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39855
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39857 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39857
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-20 20:43
|
| kernel-headers |
CVE-2025-39858 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eth: mlx4: Fix IS_ERR() vs NULL check bug in mlx4_en_create_rx_ring
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39858
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39860 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39860
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-20 20:42
|
| kernel-headers |
CVE-2025-39861 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39862 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7915: fix list corruption after hardware restart
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39863 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39863
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39866 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: writeback: fix use-after-free in __mark_inode_dirty()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-39875 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: igb: Fix NULL pointer dereference in ethtool loopback test
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39875
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-23 06:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39877 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/damon/sysfs: fix use-after-free in state_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39877
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-23 06:15 修改: 2026-01-20 20:29
|
| kernel-headers |
CVE-2025-39880 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: libceph: fix invalid accesses to ceph_connection_v1_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39880
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-23 06:15 修改: 2026-01-20 20:27
|
| kernel-headers |
CVE-2025-39889 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: l2cap: Check encryption key size on incoming connection
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-24 11:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2025-39890 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel ath12k Wi-Fi memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39890
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-24 11:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2025-39891 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mwifiex: Initialize the chan_stats array to zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-39894 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39894
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:30
|
| kernel-headers |
CVE-2025-39901 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: remove read access to debugfs files
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39901
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39902 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/slub: avoid accessing metadata when pointer is invalid in object_err()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39902
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:30
|
| kernel-headers |
CVE-2025-39905 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39905
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39910 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39910
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2025-39911 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39911
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:37
|
| kernel-headers |
CVE-2025-39922 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ixgbe: fix incorrect map used in eee linkmode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39922
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2025-39926 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to improper permission checks in genl_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39926
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2025-39927 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix race condition validating r_parent before applying state
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39927
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2025-39931 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: af_alg - Set merge to zero early in af_alg_sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39931
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39932 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39932
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39933 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39933
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39939 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/s390: Fix memory corruption when using identity domain
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39939
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39940 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via integer overflow in dm-stripe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39940
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39944 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39944
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39945 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cnic: Fix use-after-free bugs in cnic_delete_task
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39945
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39946 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tls: make sure to abort the stream if headers are bogus
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39946
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39947 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Harden uplink netdev access against device unbind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39947
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39948 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix Rx page leak on multi-buffer frames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39948
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39949 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: qed: Don't collect too many protection override GRC elements
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39949
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39955 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39955
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-09 10:15 修改: 2025-10-09 15:50
|
| kernel-headers |
CVE-2025-39961 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/amd/pgtbl: Fix possible race while increase page table level
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39961
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-09 13:15 修改: 2025-10-09 15:50
|
| kernel-headers |
CVE-2025-39964 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39964
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-13 14:15 修改: 2025-10-14 19:36
|
| kernel-headers |
CVE-2025-39965 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39965
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-13 14:15 修改: 2025-10-14 19:36
|
| kernel-headers |
CVE-2025-39966 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Fix race during abort for file descriptors
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39966
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39967 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbcon: fix integer overflow in fbcon_do_set_font
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39967
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39968 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel i40e: Resource exhaustion via unbounded VF filter requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39968
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39969 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: fix validation of VF state in get resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39969
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39970 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: fix input validation logic for action_meta
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39970
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39972 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: fix idx validation in i40e_validate_queue_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39972
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39973 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: add validation for ring_len param
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39973
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39977 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: futex: Prevent use-after-free during requeue-PI
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39977
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39978 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39978
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39979 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: fs, fix UAF in flow counter release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39979
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39980 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nexthop: Forbid FDB status change while nexthop is in a group
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39980
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39981 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: MGMT: Fix possible UAFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39981
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-11-24 10:16
|
| kernel-headers |
CVE-2025-39983 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39983
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39989 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/mce: use is_copy_from_user() to determine copy-from-user context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39989
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 07:15 修改: 2025-11-06 21:33
|
| kernel-headers |
CVE-2025-39992 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: swap: check for stable address space before operating on the VMA
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39992
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| kernel-headers |
CVE-2025-39998 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Buffer overflow in target_lu_gp_members_show can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39998
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-29 14:15
|
| kernel-headers |
CVE-2025-40000 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40000
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| kernel-headers |
CVE-2025-40011 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/gma500: Fix null dereference in hdmi teardown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40011
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| kernel-headers |
CVE-2025-40014 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40014
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 07:15 修改: 2025-10-30 16:02
|
| kernel-headers |
CVE-2025-40016 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: uvcvideo Denial of Service from invalid UVC entity IDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40016
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| kernel-headers |
CVE-2025-40018 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipvs: Defer ip_vs_ftp unregister during netns cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40018
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-24 12:15 修改: 2025-10-29 14:15
|
| kernel-headers |
CVE-2025-40019 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: essiv - Check ssize for decryption and in-place encryption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40019
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-24 12:15 修改: 2025-10-29 14:15
|
| kernel-headers |
CVE-2025-40020 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: peak_usb: fix shift-out-of-bounds issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40020
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-24 13:15 修改: 2025-10-27 13:20
|
| kernel-headers |
CVE-2025-40026 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40026
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 10:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40030 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pinctrl: check the return value of pinmux_ops::get_function_name()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40030
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40037 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbdev: simplefb: Fix use after free in simplefb_detach_genpds()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40037
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40038 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40038
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40040 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/ksm: fix flag-dropping behavior in ksm_madvise
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40040
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40044 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: udf: fix OOB read in lengthAllocDescs handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40044
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40048 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: uio_hv_generic: Let userspace take care of interrupt mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40048
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40051 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost: vringh: Modify the return value check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40051
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40053 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dlink: handle copy_thresh allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40053
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40056 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost: vringh: Fix copy_to_iter return value check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40058 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Disallow dirty tracking if incoherent page walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40058
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40061 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix race in do_task() when draining
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40061
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40064 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smc: Fix use-after-free in __pnet_find_base_ndev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40070 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pps: fix warning in pps_register_cdev when register device fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40070
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40071 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: n_gsm: Don't block input queue by waiting MSC
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40071
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40074 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv4: start using dst_dev_rcu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40074
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40075 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp_metrics: use dst_dev_net_rcu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-12-18 14:15
|
| kernel-headers |
CVE-2025-40078 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via improper access validation in bpf_sock_addr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40080 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nbd: restrict sockets to TCP and UDP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40080
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40081 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40081
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40083 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: sch_qfq: Fix null-deref in agg_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-29 14:15 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40085 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40085
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-29 14:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40091 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ixgbe: fix too early devlink_free() in ixgbe_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40091
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40096 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40096
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40102 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel KVM: Denial of Service due to uninitialized vCPU event handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40102
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40104 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ixgbevf: fix mailbox API compatibility by negotiating supported features
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40104
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40109 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in crypto random number generator due to missing set_ent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40109
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-09 05:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40110 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Fix a null-ptr access in the cursor snooper
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40110
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 02:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-40111 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Fix Use-after-free in validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40111
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 02:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40115 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40115
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40120 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40120
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40121 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40121
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40129 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sunrpc: fix null pointer dereference on zero-length checksum
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40129
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40132 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40132
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40134 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: fix NULL pointer dereference in __dm_suspend()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40134
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40135 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: use RCU in ip6_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40139 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40139
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40140 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40140
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40141 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: ISO: Fix possible UAF on iso_conn_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40141
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40146 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: fix potential deadlock while nr_requests grown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40146
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40147 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-throttle: fix access race during throttle policy activation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40147
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40149 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40149
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2026-01-17 16:16
|
| kernel-headers |
CVE-2025-40153 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via mprotect() on huge transparent huge pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40153
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40154 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40154
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40155 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: debugfs: Fix legacy mode page table dump logic
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40155
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40158 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: use RCU in ip6_output()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40158
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40160 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen/events: Return -EEXIST for bound VIRQs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40160
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40166 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/guc: Check GuC running state before deregistering exec queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40166
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40167 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: detect invalid INLINE_DATA + EXTENTS flag combination
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40167
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40168 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40168
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40170 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: use dst_dev_rcu() in sk_setup_caps()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40170
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2026-01-08 10:15
|
| kernel-headers |
CVE-2025-40171 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service in nvmet-fc due to resource leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40171
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40173 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/ip6_tunnel: Prevent perpetual tunnel growth
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40173
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40178 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pid: Add a judgment for ns null in pid_nr_ns
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40178
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40179 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: verify orphan file size is not too big
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40179
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40181 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40181
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40185 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: ice_adapter: release xa entry on adapter allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40185
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40187 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40187
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40190 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: guard against EA inode refcount underflow in xattr update
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40190
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40194 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40194
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40195 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: NULL pointer dereference in mount leads to local denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40195
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40197 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: mc: Clear minor number before put device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40199 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40199
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40201 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40201
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40206 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_objref: validate objref and objrefmap expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40206
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40211 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40211
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-21 11:15 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40215 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: delete x->tunnel as we delete x
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 13:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-40216 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/rsrc: don't rely on user vaddr alignment
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40216
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40217 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pidfs: validate extensible ioctls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40217
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40218 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40218
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40220 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fuse: fix livelock in synchronous file put from fuseblk workers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40220
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40231 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vsock: fix lock inversion in vsock_assign_transport()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40231
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40237 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/notify: call exportfs_encode_fid with s_umount
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40237
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-23 17:15
|
| kernel-headers |
CVE-2025-40238 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix IPsec cleanup over MPV device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40238
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40239 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: micrel: always set shared->phydev for LAN8814
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40239
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40240 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: avoid NULL dereference when chunk data buffer is missing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40240
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40242 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gfs2: Fix unlikely race in gdlm_put_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40242
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40250 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Clean up only new IRQ glue on request_irq() failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40250
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40251 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40251
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40252 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40252
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40254 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: openvswitch: remove never-working support for setting nsh fields
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40254
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40255 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40255
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40257 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel MPTCP: Privilege escalation or denial of service via use-after-free in timer handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40257
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40258 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: fix race condition in mptcp_schedule_work()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40258
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40259 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: sg: Do not sleep in atomic context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40259
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40261 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40261
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40264 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: be2net driver NULL pointer dereference leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40264
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40269 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel ALSA USB audio driver: Buffer overflow leading to information disclosure and denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40269
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2026-01-02 16:16
|
| kernel-headers |
CVE-2025-40271 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40271
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40272 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/secretmem: fix use-after-free race in fault handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40272
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40273 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: free copynotify stateid in nfs4_free_ol_stateid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40273
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40277 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40277
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40280 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: Fix use-after-free in tipc_mon_reinit_self()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40280
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40281 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40281
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40283 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40283
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40284 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: MGMT: cancel mesh send timer when hdev removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40284
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40287 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: fix improper check of dentry.stream.valid_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40287
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40292 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio-net: fix received length check in big packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40292
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40293 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Don't overflow during division for dirty tracking
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40293
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40294 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Out-of-bounds write in Bluetooth MGMT can lead to information disclosure and denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40294
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40297 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bridge: fix use-after-free due to MST port state bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40297
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40302 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: videobuf2: forbid remove_bufs when legacy fileio is active
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40302
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40304 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40304
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40307 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: validate cluster allocation bits of the allocation bitmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40307
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40308 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: bcsp: receive data only if registered
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40308
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40309 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: SCO: Fix UAF on sco_conn_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40309
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2026-01-02 16:16
|
| kernel-headers |
CVE-2025-40318 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40318
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40319 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Sync pending IRQ work before freeing ring buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40319
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40320 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix potential cfid UAF in smb2_query_info_compound
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40320
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40321 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40321
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40322 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40322
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40323 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbcon: Set fb_display[i]->mode to NULL when the mode is released
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40323
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40324 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: Fix crash in nfsd4_read_release()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40324
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40328 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix potential UAF in smb2_close_cached_fid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40328
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2025-40329 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40329
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40330 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Shutdown FW DMA in bnxt_shutdown()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40330
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40331 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: Prevent TOCTOU out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40331
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40336 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/gpusvm: fix hmm_pfn_to_map_order() usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40336
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40338 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: avs: Do not share the name pointer between components
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40338
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40340 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40340
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40342 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-fc: use lock accessing port_state and rport state
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40342
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40343 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet-fc: avoid scheduling association deletion twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40343
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40344 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: avs: Disable periods-elapsed work when closing PCM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40344
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40345 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: storage: sddr55: Reject out-of-bound new_pba
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40345
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-12 18:15 修改: 2025-12-15 18:22
|
| kernel-headers |
CVE-2025-40350 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40350
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40353 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: mte: Do not warn if the page is already tagged in copy_highpage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40353
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40362 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix multifs mds auth caps issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40362
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40363 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ipv6: fix field-spanning memcpy warning in AH output
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40363
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68179 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68179
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68185 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68185
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68197 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68209 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlx5: Fix default values in create CQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68209
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68211 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68211
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2026-01-17 16:16
|
| kernel-headers |
CVE-2025-68223 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: delete radeon_fence_process in is_signaled, no deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68223
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68226 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix incomplete backport in cfids_invalidation_worker()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68226
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68229 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68229
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68231 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/mempool: fix poisoning order>0 pages with HIGHMEM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68231
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68239 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: binfmt_misc: restore write access before closing files opened by open_exec()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68239
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68241 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68241
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68242 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFS: Fix LTP test failures when timestamps are delegated
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68242
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68245 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to memory leak in netpoll during cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68245
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68259 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68259
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68261 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68261
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68265 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme: fix admin request_queue lifetime
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68265
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68282 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Use-after-free in USB gadget driver due to race condition during teardown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68282
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68292 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/memfd: fix information leak in hugetlb folios
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68292
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68296 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to race condition in fbcon setup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68296
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68299 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in AFS due to delayed key allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68299
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68301 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: atlantic: fix fragment overflow handling in RX path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68301
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68305 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68305
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68309 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/AER: Fix NULL pointer access by aer_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68309
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68310 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68310
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68313 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to inconsistent random number generation on AMD Zen5 processors
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68313
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68331 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68331
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| kernel-headers |
CVE-2025-68340 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: team: Move team device type change at the end of team_port_add
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68340
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| kernel-headers |
CVE-2025-68349 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68349
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68353 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service via NULL pointer dereference in VXLAN module
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68353
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68360 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68360
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68368 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: init bioset in mddev_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68368
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68372 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nbd: defer config put in recv_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68372
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68379 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in RDMA subsystem via repeated SRQ modification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68379
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68380 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix peer HE MCS assignment
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68380
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68745 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in qla2xxx SCSI driver due to improper command handling after chip reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68745
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68752 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iavf: Implement settime64 with -EOPNOTSUPP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-05 10:15 修改: 2026-01-08 18:09
|
| kernel-headers |
CVE-2025-68756 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68756
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-05 10:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68764 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68764
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-05 10:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68768 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: inet: frags: flush pending skbs in fqdir_pre_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68768
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68776 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via NULL pointer dereference in HSR
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68776
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68784 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfs: fix a UAF problem in xattr repair
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68784
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68801 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_router: Fix neighbour use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68801
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68803 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: NFSv4 file creation neglects setting ACL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68803
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68811 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: svcrdma: use rc_pageoff for memcpy byte offset
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68811
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68814 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory leak in io_uring's __io_openat_prep() leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68814
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68815 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: ets: Remove drr class from the active list if it changes to strict
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68815
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68816 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: mlx5 firmware tracer vulnerable to arbitrary memory access or denial of service via malformed format strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68816
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71066 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71066
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71083 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service via NULL pointer dereference in drm/ttm
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71085 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71085
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71087 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iavf: fix off-by-one issues in iavf_config_rss_reg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71087
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71088 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via MPTCP race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71088
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-71091 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: team: fix check for port enabled in team_queue_override_port_prio_changed()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71091
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71093 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: e1000: fix OOB in e1000_tbi_should_accept()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71093
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71094 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: asix: validate PHY address before use
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71094
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71097 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (IPv4): Denial of Service due to reference count leak in nexthop objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71098 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ip6_gre: make ip6gre_header() robust
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71098
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71104 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71104
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71108 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: ucsi: Handle incorrect num_connectors capability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71108
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71112 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns3: add VLAN id validation before using
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71112
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71113 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: af_alg - zero initialize memory allocated via sock_kmalloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71113
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71116 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: libceph: make decode_pool() more resilient against corrupted osdmaps
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71116
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71117 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: Remove queue freezing from several sysfs store callbacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71117
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| kernel-headers |
CVE-2025-71120 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in SUNRPC via zero-length gss_token
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71120
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71126 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Deadlock due to MPTCP packet reinjection during fallback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71126
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| kernel-headers |
CVE-2025-71132 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smc91x: fix broken irq-context in PREEMPT_RT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71132
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71137 |
中危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71137
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| libarchive |
CVE-2023-30571 |
中危 |
3.5.3-6.el9_6 |
|
libarchive: Race condition in multi-threaded use of archive_write_disk_header() on posix based systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-30571
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-05-29 20:15 修改: 2025-01-14 17:15
|
| libarchive |
CVE-2025-60753 |
中危 |
3.5.3-6.el9_6 |
|
libarchive: bsdtar hangs and OOMs with zero-length pattern matches
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-60753
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-11-05 16:15 修改: 2025-11-06 19:45
|
| libblkid |
CVE-2025-14104 |
中危 |
2.37.4-21.el9 |
|
util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-12-05 17:16 修改: 2025-12-08 18:26
|
| libcurl-minimal |
CVE-2025-14017 |
中危 |
7.76.1-34.el9 |
|
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14017
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-08 10:15 修改: 2026-01-16 16:15
|
| libcurl-minimal |
CVE-2025-9086 |
中危 |
7.76.1-34.el9 |
|
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| libfdisk |
CVE-2025-14104 |
中危 |
2.37.4-21.el9 |
|
util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-05 17:16 修改: 2025-12-08 18:26
|
| libmount |
CVE-2025-14104 |
中危 |
2.37.4-21.el9 |
|
util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-12-05 17:16 修改: 2025-12-08 18:26
|
| libsmartcols |
CVE-2025-14104 |
中危 |
2.37.4-21.el9 |
|
util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-12-05 17:16 修改: 2025-12-08 18:26
|
| libuuid |
CVE-2025-14104 |
中危 |
2.37.4-21.el9 |
|
util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-12-05 17:16 修改: 2025-12-08 18:26
|
| libxml2 |
CVE-2026-0990 |
中危 |
2.9.13-14.el9_7 |
|
libxml2: libxml2: Denial of Service via uncontrolled recursion in XML catalog processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0990
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-15 15:15 修改: 2026-01-16 15:55
|
| openldap |
CVE-2026-22185 |
中危 |
2.6.8-4.el9 |
|
OpenLDAP: OpenLDAP LMDB: Denial of Service and Information Disclosure via Heap Buffer Underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22185
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-07 21:16 修改: 2026-01-14 18:16
|
| openssh |
CVE-2023-51767 |
中危 |
8.7p1-47.el9_7 |
|
openssh: authentication bypass via row hammer attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51767
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-12-24 07:15 修改: 2025-11-18 22:15
|
| openssh |
CVE-2025-32728 |
中危 |
8.7p1-47.el9_7 |
|
openssh: OpenSSH SSHD Agent Forwarding and X11 Forwarding
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-10 02:15 修改: 2025-05-22 16:51
|
| openssh-clients |
CVE-2023-51767 |
中危 |
8.7p1-47.el9_7 |
|
openssh: authentication bypass via row hammer attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51767
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-12-24 07:15 修改: 2025-11-18 22:15
|
| openssh-clients |
CVE-2025-32728 |
中危 |
8.7p1-47.el9_7 |
|
openssh: OpenSSH SSHD Agent Forwarding and X11 Forwarding
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-32728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-10 02:15 修改: 2025-05-22 16:51
|
| python-unversioned-command |
CVE-2025-12084 |
中危 |
3.9.25-2.el9_7 |
|
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16
|
| python-unversioned-command |
CVE-2025-13836 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| python-unversioned-command |
CVE-2025-13837 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Out-of-memory when loading Plist
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08
|
| python-unversioned-command |
CVE-2025-4516 |
中危 |
3.9.25-2.el9_7 |
|
cpython: python: CPython DecodeError Handling Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15
|
| python-unversioned-command |
CVE-2025-6069 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Python HTMLParser quadratic complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15
|
| python3 |
CVE-2025-12084 |
中危 |
3.9.25-2.el9_7 |
|
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16
|
| python3 |
CVE-2025-13836 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| python3 |
CVE-2025-13837 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Out-of-memory when loading Plist
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08
|
| python3 |
CVE-2025-4516 |
中危 |
3.9.25-2.el9_7 |
|
cpython: python: CPython DecodeError Handling Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15
|
| python3 |
CVE-2025-6069 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Python HTMLParser quadratic complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15
|
| python3-libs |
CVE-2025-12084 |
中危 |
3.9.25-2.el9_7 |
|
cpython: python: cpython: Quadratic algorithm in xml.dom.minidom leads to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-12084
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-03 19:15 修改: 2026-01-14 19:16
|
| python3-libs |
CVE-2025-13836 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| python3-libs |
CVE-2025-13837 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Out-of-memory when loading Plist
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13837
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-01 18:16 修改: 2026-01-15 19:08
|
| python3-libs |
CVE-2025-4516 |
中危 |
3.9.25-2.el9_7 |
|
cpython: python: CPython DecodeError Handling Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-4516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-15 14:15 修改: 2025-06-03 14:15
|
| python3-libs |
CVE-2025-6069 |
中危 |
3.9.25-2.el9_7 |
|
cpython: Python HTMLParser quadratic complexity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-17 14:15 修改: 2025-07-07 18:15
|
| python3-pip-wheel |
CVE-2023-45803 |
中危 |
21.3.1-1.el9 |
|
urllib3: Request body not stripped after redirect from 303 status changes request method to GET
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45803
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-10-17 20:15 修改: 2025-11-03 22:16
|
| python3-pip-wheel |
CVE-2025-50181 |
中危 |
21.3.1-1.el9 |
|
urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-50181
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-19 01:15 修改: 2025-12-22 19:15
|
| python3-pip-wheel |
CVE-2025-50182 |
中危 |
21.3.1-1.el9 |
|
urllib3: urllib3 does not control redirects in browsers and Node.js
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-50182
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-19 02:15 修改: 2025-12-22 19:15
|
| tar |
CVE-2005-2541 |
中危 |
2:1.34-9.el9_7 |
|
tar: does not properly warn the user when extracting setuid or setgid files
漏洞详情: https://avd.aquasec.com/nvd/cve-2005-2541
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2005-08-10 04:00 修改: 2025-04-03 01:03
|
| util-linux |
CVE-2025-14104 |
中危 |
2.37.4-21.el9 |
|
util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-05 17:16 修改: 2025-12-08 18:26
|
| util-linux-core |
CVE-2025-14104 |
中危 |
2.37.4-21.el9 |
|
util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14104
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-05 17:16 修改: 2025-12-08 18:26
|
| wget |
CVE-2021-31879 |
中危 |
1.21.1-8.el9_4 |
|
wget: authorization header disclosure on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-04-29 05:15 修改: 2024-11-21 06:06
|
| wget |
CVE-2024-10524 |
中危 |
1.21.1-8.el9_4 |
|
wget: GNU Wget is vulnerable to an SSRF attack when accessing partially-user-controlled shorthand URLs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10524
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 15:15 修改: 2025-03-21 18:15
|
| binutils |
CVE-2025-66861 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: out-of-bounds read in d_unqualified_name() in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:36
|
| binutils |
CVE-2025-66862 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: heap-based buffer over-read in gnu_special() in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:36
|
| binutils |
CVE-2025-66863 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: BinUtils: Denial of Service via crafted PE file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66863
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:38
|
| binutils |
CVE-2025-66864 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: NULL pointer dereference in d_print_comp_inner() in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66864
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:40
|
| binutils |
CVE-2025-66865 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: stack overflow in d_print_comp_inner() in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66865
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:42
|
| binutils |
CVE-2025-66866 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: BinUtils: Denial of Service via crafted PE file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:43
|
| avahi-libs |
CVE-2017-6519 |
低危 |
0.8-23.el9 |
|
avahi: Multicast DNS responds to unicast queries outside of local network
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-6519
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2017-05-01 01:59 修改: 2025-12-03 22:15
|
| jq |
CVE-2025-9403 |
低危 |
1.6-19.el9 |
|
jq: assertion failure in run_jq_tests() of the file jq_test.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9403
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-25 03:15 修改: 2025-09-12 20:11
|
| binutils |
CVE-2021-3826 |
低危 |
2.35.2-67.el9_7.1 |
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-09-01 21:15 修改: 2024-11-21 06:22
|
| binutils |
CVE-2022-38533 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-08-26 00:15 修改: 2024-11-21 07:16
|
| binutils |
CVE-2022-44840 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: heap-based buffer overflow in find_section_in_set() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:28
|
| binutils |
CVE-2022-47007 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in stab_demangle_v3_arg() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils |
CVE-2022-47008 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils |
CVE-2022-47010 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in pr_function_type() in prdbg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils |
CVE-2022-47011 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in parse_stab_struct_fields() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils |
CVE-2023-1972 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: Illegal memory access when accessing a zer0-lengthverdef table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-05-17 22:15 修改: 2025-01-22 20:15
|
| binutils-gold |
CVE-2021-3826 |
低危 |
2.35.2-67.el9_7.1 |
|
libiberty: Heap/stack buffer overflow in the dlang_lname function in d-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3826
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-09-01 21:15 修改: 2024-11-21 06:22
|
| binutils-gold |
CVE-2022-38533 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: heap-based buffer overflow in bfd_getl32() when called by strip_main() in objcopy.c via a crafted file
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38533
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-08-26 00:15 修改: 2024-11-21 07:16
|
| binutils-gold |
CVE-2022-44840 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: heap-based buffer overflow in find_section_in_set() in readelf.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:28
|
| binutils-gold |
CVE-2022-47007 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in stab_demangle_v3_arg() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47007
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils-gold |
CVE-2022-47008 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in make_tempdir() and make_tempname() in bucomm.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils-gold |
CVE-2022-47010 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in pr_function_type() in prdbg.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils-gold |
CVE-2022-47011 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: memory leak in parse_stab_struct_fields() in stabs.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-47011
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-08-22 19:16 修改: 2024-11-21 07:31
|
| binutils-gold |
CVE-2023-1972 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: Illegal memory access when accessing a zer0-lengthverdef table
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1972
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-05-17 22:15 修改: 2025-01-22 20:15
|
| binutils-gold |
CVE-2024-57360 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: nm: potential segmentation fault when displaying symbols without version info
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57360
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 21:15 修改: 2025-03-18 16:15
|
| binutils-gold |
CVE-2025-11412 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| binutils-gold |
CVE-2025-11413 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| binutils-gold |
CVE-2025-11414 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| binutils-gold |
CVE-2025-11494 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| binutils-gold |
CVE-2025-11495 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11495
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:28
|
| binutils-gold |
CVE-2025-1150 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils ld libbfd.c bfd_malloc memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1150
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 17:15 修改: 2025-03-11 19:01
|
| binutils-gold |
CVE-2025-1151 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils ld xmemdup.c xmemdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 17:15 修改: 2025-03-04 17:16
|
| binutils-gold |
CVE-2025-1152 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| binutils-gold |
CVE-2025-1153 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils format.c bfd_set_format memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1153
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 19:15 修改: 2025-04-04 23:15
|
| binutils-gold |
CVE-2025-11839 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| binutils-gold |
CVE-2025-11840 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| binutils-gold |
CVE-2025-3198 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| binutils-gold |
CVE-2025-66861 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: out-of-bounds read in d_unqualified_name() in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:36
|
| binutils-gold |
CVE-2025-66862 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: heap-based buffer over-read in gnu_special() in cplus-dem.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:36
|
| binutils-gold |
CVE-2025-66863 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: BinUtils: Denial of Service via crafted PE file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66863
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:38
|
| binutils-gold |
CVE-2025-66864 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: NULL pointer dereference in d_print_comp_inner() in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66864
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:40
|
| binutils-gold |
CVE-2025-66865 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: stack overflow in d_print_comp_inner() in cp-demangle.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66865
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:42
|
| binutils-gold |
CVE-2025-66866 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: BinUtils: Denial of Service via crafted PE file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-29 17:15 修改: 2026-01-14 19:43
|
| binutils |
CVE-2024-57360 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: nm: potential segmentation fault when displaying symbols without version info
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57360
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 21:15 修改: 2025-03-18 16:15
|
| cpp |
CVE-2022-27943 |
低危 |
11.5.0-11.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-03-26 13:15 修改: 2024-11-21 06:56
|
| binutils |
CVE-2025-11412 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| cups-libs |
CVE-2021-25317 |
低危 |
1:2.3.3op2-34.el9_7.2 |
|
cups: insecure permissions of /var/log/cups allows for symlink attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-25317
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-05-05 10:15 修改: 2024-11-21 05:54
|
| binutils |
CVE-2025-11413 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| binutils |
CVE-2025-11414 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| curl-minimal |
CVE-2024-11053 |
低危 |
7.76.1-34.el9 |
|
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| curl-minimal |
CVE-2024-7264 |
低危 |
7.76.1-34.el9 |
|
curl: libcurl: ASN.1 date parser overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-07-31 08:15 修改: 2025-11-03 23:17
|
| curl-minimal |
CVE-2024-9681 |
低危 |
7.76.1-34.el9 |
|
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| elfutils-debuginfod-client |
CVE-2024-25260 |
低危 |
0.193-1.el9 |
|
elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-20 18:15 修改: 2025-04-25 20:42
|
| elfutils-debuginfod-client |
CVE-2025-1371 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1371
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:13
|
| kernel-headers |
CVE-2019-16089 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Improper return check in nbd_genl_status function in drivers/block/nbd.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-16089
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2019-09-06 23:15 修改: 2024-11-21 04:30
|
| kernel-headers |
CVE-2020-14304 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool when reading eeprom of device could lead to memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14304
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2020-09-15 20:15 修改: 2024-11-21 05:02
|
| kernel-headers |
CVE-2020-26146 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: reassembling encrypted fragments with non-consecutive packet numbers
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26146
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-05-11 20:15 修改: 2024-11-21 05:19
|
| kernel-headers |
CVE-2020-35501 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35501
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-03-30 16:15 修改: 2024-11-21 05:27
|
| kernel-headers |
CVE-2020-36782 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36782
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-28 09:15 修改: 2024-12-06 18:02
|
| kernel-headers |
CVE-2021-20320 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390 eBPF JIT miscompilation issues fixes
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-20320
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-02-18 18:15 修改: 2024-11-21 05:46
|
| kernel-headers |
CVE-2021-4454 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4454
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-28 18:10
|
| kernel-headers |
CVE-2021-45402 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pointer leak in check_alu_op() of kernel/bpf/verifier.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45402
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-02-11 15:15 修改: 2024-11-21 06:32
|
| kernel-headers |
CVE-2021-46904 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: null-ptr-deref during tty device unregistration
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46904
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46909 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI interrupt mapping cause oops
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46909
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 07:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46910 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kmap_local() doubles the number of per-CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46910
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 07:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46917 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wq reset does not clear WQCFG registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46917
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 07:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46918 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: MSIX permission entry on shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46918
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 07:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46920 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clobbering of SWERR overflow bit on writeback
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46920
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 07:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46923 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/mount_setattr: always cleanup mount_kattr
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46923
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46934 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: validate user data in compat ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46934
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46937 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46937
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-27 10:15 修改: 2024-11-21 06:34
|
| kernel-headers |
CVE-2021-46984 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kyber: fix out of bounds access when preempted
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46984
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-28 09:15 修改: 2024-12-06 15:00
|
| kernel-headers |
CVE-2021-47014 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/sched: act_ct: fix wild memory access when clearing fragments
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47014
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-28 09:15 修改: 2025-01-08 18:08
|
| kernel-headers |
CVE-2021-47020 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soundwire: stream: fix memory leak in stream config error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47020
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-29 23:15 修改: 2024-12-10 17:03
|
| kernel-headers |
CVE-2021-47033 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mt76: mt7615: fix tx skb dma unmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47033
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-28 09:15 修改: 2024-12-12 15:39
|
| kernel-headers |
CVE-2021-47079 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: ideapad-laptop: fix a NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47079
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-01 22:15 修改: 2024-12-09 18:41
|
| kernel-headers |
CVE-2021-47089 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kfence: fix memory leak when cat kfence objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47089
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-04 18:15 修改: 2025-04-04 14:41
|
| kernel-headers |
CVE-2021-47182 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: core: Fix scsi_mode_sense() buffer length handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47182
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-03-21 11:54
|
| kernel-headers |
CVE-2021-47190 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf bpf: Avoid memory leak from perf_env__insert_btf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47190
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-01-07 17:11
|
| kernel-headers |
CVE-2021-47191 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47191
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-01-14 16:40
|
| kernel-headers |
CVE-2021-47196 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/core: Set send and receive CQ before forwarding to the driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47196
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-03-04 15:23
|
| kernel-headers |
CVE-2021-47197 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-03-21 12:03
|
| kernel-headers |
CVE-2021-47199 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: CT, Fix multiple allocations and memleak of mod acts
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47199
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-01-14 16:40
|
| kernel-headers |
CVE-2021-47202 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: Fix NULL pointer dereferences in of_thermal_ functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47202
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-01-14 14:42
|
| kernel-headers |
CVE-2021-47210 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47210
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-03-27 21:17
|
| kernel-headers |
CVE-2021-47215 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: kTLS, Fix crash in RX resync flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-03-27 21:05
|
| kernel-headers |
CVE-2021-47217 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47217
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-10 19:15 修改: 2025-01-14 14:44
|
| kernel-headers |
CVE-2021-47222 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bridge: fix vlan tunnel dst refcnt when egressing
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47222
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-29 19:13
|
| kernel-headers |
CVE-2021-47226 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47226
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-29 19:26
|
| kernel-headers |
CVE-2021-47237 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hamradio: fix memory leak in mkiss_close
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47237
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:05
|
| kernel-headers |
CVE-2021-47241 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: strset: fix message length calculation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47241
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-04 14:30
|
| kernel-headers |
CVE-2021-47250 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ipv4: fix memory leak in netlbl_cipsov4_add_std
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47250
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:00
|
| kernel-headers |
CVE-2021-47261 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/mlx5: Fix initializing CQ fragments buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47261
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-30 15:03
|
| kernel-headers |
CVE-2021-47266 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/ipoib: Fix warning caused by destroying non-initial netns
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47266
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-26 20:41
|
| kernel-headers |
CVE-2021-47272 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47272
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-30 14:55
|
| kernel-headers |
CVE-2021-47313 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47313
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:40
|
| kernel-headers |
CVE-2021-47325 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47325
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-01-13 20:04
|
| kernel-headers |
CVE-2021-47327 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47327
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-04-02 14:33
|
| kernel-headers |
CVE-2021-47349 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mwifiex: bring down link before deleting interface
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47349
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-01-10 18:12
|
| kernel-headers |
CVE-2021-47360 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: binder: make sure fd closes complete
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47360
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-05-12 19:54
|
| kernel-headers |
CVE-2021-47373 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: irqchip/gic-v3-its: Fix potential VPE leak on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47373
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-26 17:57
|
| kernel-headers |
CVE-2021-47380 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: amd_sfh: Fix potential NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47380
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-23 20:48
|
| kernel-headers |
CVE-2021-47398 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/hfi1: Fix kernel pointer leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47398
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-09-19 14:28
|
| kernel-headers |
CVE-2021-47404 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: betop: fix slab-out-of-bounds Write in betop_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47404
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-24 16:05
|
| kernel-headers |
CVE-2021-47420 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdkfd: fix a potential ttm->sg memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47420
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:37
|
| kernel-headers |
CVE-2021-47422 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/nouveau/kms/nv50-: fix file release memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47422
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-30 19:36
|
| kernel-headers |
CVE-2021-47426 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, s390: Fix potential memory leak about jit_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47426
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2024-12-31 20:03
|
| kernel-headers |
CVE-2021-47430 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47430
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 15:15 修改: 2025-09-25 16:06
|
| kernel-headers |
CVE-2021-47438 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47438
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 07:15 修改: 2025-01-07 20:14
|
| kernel-headers |
CVE-2021-47441 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: thermal: Fix out-of-bounds memory accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47441
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 07:15 修改: 2025-04-02 15:12
|
| kernel-headers |
CVE-2021-47455 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ptp: Fix possible memory leak in ptp_clock_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47455
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 07:15 修改: 2025-11-03 18:15
|
| kernel-headers |
CVE-2021-47481 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47481
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 09:15 修改: 2025-09-29 16:41
|
| kernel-headers |
CVE-2021-47483 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regmap: Fix possible double-free in regcache_rbtree_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47483
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 09:15 修改: 2025-01-06 19:52
|
| kernel-headers |
CVE-2021-47490 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/ttm: fix memleak in ttm_transfered_destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47490
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-22 09:15 修改: 2025-01-24 16:15
|
| kernel-headers |
CVE-2021-47499 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47499
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-01-06 20:45
|
| kernel-headers |
CVE-2021-47504 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: ensure task_work gets run as part of cancelations
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47504
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-09-29 16:31
|
| kernel-headers |
CVE-2021-47516 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47517 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: do not perform operations on net devices being unregistered
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47517
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-03-01 02:40
|
| kernel-headers |
CVE-2021-47527 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: core: fix transmit-buffer reset and memleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47527
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-09-24 19:47
|
| kernel-headers |
CVE-2021-47536 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: fix wrong list_del in smc_lgr_cleanup_early
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47536
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:56
|
| kernel-headers |
CVE-2021-47537 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-af: Fix a memleak bug in rvu_mbox_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47537
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47538 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47538
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:55
|
| kernel-headers |
CVE-2021-47539 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47539
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:55
|
| kernel-headers |
CVE-2021-47550 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/amdgpu: fix potential memleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47550
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47558 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: stmmac: Disable Tx queues when reconfiguring the interface
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47558
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-24 15:15 修改: 2025-09-18 15:37
|
| kernel-headers |
CVE-2021-47576 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47576
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47578 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: scsi_debug: Don't call kcalloc() if size arg is zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47578
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47582 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47582
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2025-09-29 17:14
|
| kernel-headers |
CVE-2021-47601 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tee: amdtee: fix an IS_ERR() vs NULL bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47601
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47607 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47607
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47609 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47609
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47613 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: virtio: fix completion handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47613
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47616 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA: Fix use-after-free in rxe_queue_cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47616
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 15:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47617 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47617
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47622 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ufs: Fix a deadlock in the error handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47622
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 06:36
|
| kernel-headers |
CVE-2021-47623 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/fixmap: Fix VM debug warning on unmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47623
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:30
|
| kernel-headers |
CVE-2021-47639 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47639
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-03-24 17:47
|
| kernel-headers |
CVE-2021-47657 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47657
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 06:37 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2021-47671 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47671
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-17 18:15 修改: 2025-04-21 18:40
|
| kernel-headers |
CVE-2022-2905 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: slab-out-of-bound read in bpf
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2905
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-09-09 15:15 修改: 2024-11-21 07:01
|
| kernel-headers |
CVE-2022-3344 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: nested shutdown interception could lead to host crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3344
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-10-25 17:15 修改: 2025-05-07 15:15
|
| kernel-headers |
CVE-2022-3534 |
低危 |
5.14.0-611.24.1.el9_7 |
|
Kernel: use-after-free in btf_dump_name_dups in tools/lib/bpf/btf_dump.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3534
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-10-17 09:15 修改: 2025-11-03 20:15
|
| kernel-headers |
CVE-2022-3606 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: libbpf: NULL pointer dereference in find_prog_by_sec_insn
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3606
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-10-19 09:15 修改: 2025-11-03 20:15
|
| kernel-headers |
CVE-2022-3629 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memory leak in the function vsock_connect of Virtual Socket Protocol
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3629
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-10-21 06:15 修改: 2024-11-21 07:19
|
| kernel-headers |
CVE-2022-3633 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memory leak in the function j1939_session_destroy for j1939 socket
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3633
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-10-21 11:15 修改: 2024-11-21 07:19
|
| kernel-headers |
CVE-2022-3903 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: An invalid pipe direction in the mceusb driver cause the kernel to DOS
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3903
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-11-14 21:15 修改: 2025-04-30 20:15
|
| kernel-headers |
CVE-2022-48628 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: drop messages from MDS when unmounting
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48628
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-02 22:15 修改: 2025-01-13 18:26
|
| kernel-headers |
CVE-2022-48635 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fsdax: Fix infinite loop in dax_iomap_rw()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48635
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-10-29 14:15
|
| kernel-headers |
CVE-2022-48639 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: sched: fix possible refcount leak in tc_new_tfilter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48639
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-01-13 19:58
|
| kernel-headers |
CVE-2022-48640 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: fix NULL deref in bond_rr_gen_slave_id
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48640
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-09-19 14:57
|
| kernel-headers |
CVE-2022-48641 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ebtables: fix memory leak when blob is malformed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48641
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-01-07 16:57
|
| kernel-headers |
CVE-2022-48643 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: fix nft_counters_enabled underflow at nf_tables_addchain()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48643
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2025-09-18 14:06
|
| kernel-headers |
CVE-2022-48657 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: topology: fix possible overflow in amu_fie_setup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48657
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48658 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48658
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48660 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48660
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48662 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/gem: Really move i915_gem_context.link under ref protection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48662
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-28 13:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48673 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Fix possible access to freed memory in link clear
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48673
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48675 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/core: Fix a nested dead lock as part of ODP flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48675
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48689 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: TX zerocopy should not sense pfmemalloc status
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48689
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48690 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Fix DMA mappings leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48690
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 18:15 修改: 2025-09-19 14:55
|
| kernel-headers |
CVE-2022-48691 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clean up hook list when offload flags check fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48691
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48694 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/irdma: Fix drain SQ hang with no completion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48694
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 15:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48697 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet: fix a use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48697
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 16:15 修改: 2025-04-08 15:47
|
| kernel-headers |
CVE-2022-48702 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48702
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 16:15 修改: 2025-03-05 15:13
|
| kernel-headers |
CVE-2022-48704 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: add a force flush to delay work when radeon
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48704
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 18:15 修改: 2025-09-19 14:44
|
| kernel-headers |
CVE-2022-48705 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7921e: fix crash in chip reset fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48705
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-03 18:15 修改: 2025-09-19 14:43
|
| kernel-headers |
CVE-2022-48706 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa: ifcvf: Do proper cleanup if IFCVF init fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48706
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-02-03 16:12
|
| kernel-headers |
CVE-2022-48707 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/region: Fix null pointer dereference for resetting decoder
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48707
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:05
|
| kernel-headers |
CVE-2022-48709 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: switch: fix potential memleak in ice_add_adv_recipe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48709
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:08
|
| kernel-headers |
CVE-2022-48710 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: fix a possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48710
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-31 20:09
|
| kernel-headers |
CVE-2022-48712 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix error handling in ext4_fc_record_modified_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48712
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2025-09-17 17:12
|
| kernel-headers |
CVE-2022-48713 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/intel/pt: Fix crash with stop filters in single-range mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48713
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2025-09-17 17:12
|
| kernel-headers |
CVE-2022-48714 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48714
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2025-09-17 17:12
|
| kernel-headers |
CVE-2022-48720 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: macsec: Fix offload support for NETDEV_UNREGISTER event
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48720
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2025-10-01 13:38
|
| kernel-headers |
CVE-2022-48721 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: Forward wakeup to smc socket waitqueue after fallback
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48721
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 11:15 修改: 2025-10-01 13:39
|
| kernel-headers |
CVE-2022-48724 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48724
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48725 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/siw: Fix refcounting leak in siw_create_qp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48725
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48727 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Avoid consuming a stale esr value when SError occur
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48727
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-10-01 13:40
|
| kernel-headers |
CVE-2022-48728 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/hfi1: Fix AIP early init panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48729 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/hfi1: Fix panic with larger ipoib send_queue_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48729
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48731 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/kmemleak: avoid scanning potential huge holes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48731
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-04-01 18:27
|
| kernel-headers |
CVE-2022-48732 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/nouveau: fix off by one in BIOS boundary checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48732
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48741 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ovl: fix NULL pointer dereference in copy up warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48741
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48745 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Use del_timer_sync in fw reset flow of halting poll
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48745
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-29 17:27
|
| kernel-headers |
CVE-2022-48746 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Fix handling of wrong devices during bond netevent
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48746
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-01-06 21:29
|
| kernel-headers |
CVE-2022-48748 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: bridge: vlan: fix memory leak in __allowed_ingress
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48748
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-03-24 18:17
|
| kernel-headers |
CVE-2022-48752 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-29 17:24
|
| kernel-headers |
CVE-2022-48754 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: phylib: fix potential use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48754
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-03-24 18:17
|
| kernel-headers |
CVE-2022-48757 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: fix information leakage in /proc/net/ptype
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48757
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-17 17:13
|
| kernel-headers |
CVE-2022-48760 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: core: Fix hang in usb_kill_urb by adding memory barriers
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-17 16:49
|
| kernel-headers |
CVE-2022-48761 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: xhci-plat: fix crash when suspend if remote wake enable
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48761
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-29 17:21
|
| kernel-headers |
CVE-2022-48763 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Forcibly leave nested virt when SMM state is toggled
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48763
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-17 16:50
|
| kernel-headers |
CVE-2022-48764 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48764
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-03-24 18:16
|
| kernel-headers |
CVE-2022-48767 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: properly put ceph_string reference after async create attempt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48767
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-29 18:35
|
| kernel-headers |
CVE-2022-48768 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/histogram: Fix a potential memory leak for kstrdup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48768
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2024-11-21 07:33
|
| kernel-headers |
CVE-2022-48769 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48769
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-09-29 18:35
|
| kernel-headers |
CVE-2022-48770 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48770
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-01-06 21:43
|
| kernel-headers |
CVE-2022-48800 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: vmscan: remove deadlock due to throttling failing to make progress
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48800
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48801 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48801
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-09-24 16:54
|
| kernel-headers |
CVE-2022-48806 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48806
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:17
|
| kernel-headers |
CVE-2022-48809 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: fix a memleak when uncloning an skb dst and its metadata
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48809
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2024-11-21 07:34
|
| kernel-headers |
CVE-2022-48812 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: lantiq_gswip: don't use devres for mdiobus
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48812
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:19
|
| kernel-headers |
CVE-2022-48813 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: felix: don't use devres for mdiobus
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48813
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:20
|
| kernel-headers |
CVE-2022-48814 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: seville: register the mdiobus under devres
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48814
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-03 14:20
|
| kernel-headers |
CVE-2022-48815 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: bcm_sf2: don't use devres for mdiobus
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48815
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-06 17:05
|
| kernel-headers |
CVE-2022-48817 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: ar9331: register the mdiobus under devres
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48817
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-06 17:08
|
| kernel-headers |
CVE-2022-48818 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dsa: mv88e6xxx: don't use devres for mdiobus
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48818
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-06 17:09
|
| kernel-headers |
CVE-2022-48823 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qedf: Fix refcount issue when LOGO is received during TMF
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-09-25 19:36
|
| kernel-headers |
CVE-2022-48825 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qedf: Add stag_work to all the vports
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48825
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 12:15 修改: 2025-10-07 19:59
|
| kernel-headers |
CVE-2022-48887 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Remove rcu locks from user resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48887
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-06 14:55
|
| kernel-headers |
CVE-2022-48890 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48890
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-06 15:11
|
| kernel-headers |
CVE-2022-48896 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ixgbe: fix pci device refcount leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48896
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 07:15 修改: 2024-09-11 16:06
|
| kernel-headers |
CVE-2022-48939 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Add schedule points in batch ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48939
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-22 04:15 修改: 2024-08-22 19:02
|
| kernel-headers |
CVE-2022-48944 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched: Fix yet more sched_fork() races
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48944
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-30 11:15 修改: 2024-09-03 14:26
|
| kernel-headers |
CVE-2022-48963 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: wwan: iosm: fix memory leak in ipc_mux_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48963
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:27
|
| kernel-headers |
CVE-2022-48979 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: fix array index out of bound error in DCN32 DML
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48979
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 18:40
|
| kernel-headers |
CVE-2022-49005 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: ops: Fix bounds check for _sx controls
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49005
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-25 14:17
|
| kernel-headers |
CVE-2022-49027 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iavf: Fix error handling in iavf_init_module()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49027
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2024-10-24 03:48
|
| kernel-headers |
CVE-2022-49046 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: dev: check return value when calling dev_set_name()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49046
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-11-03 20:15
|
| kernel-headers |
CVE-2022-49064 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cachefiles: unmark inode in use in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-14 19:04
|
| kernel-headers |
CVE-2022-49065 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: Fix the svc_deferred_event trace class
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49065
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49070 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbdev: Fix unregistering of framebuffers without device
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49070
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49103 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49103
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49107 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49107
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49127 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ref_tracker: implement use-after-free detection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49127
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 16:19
|
| kernel-headers |
CVE-2022-49139 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49139
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49152 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: XArray: Fix xas_create_range() when multi-order entry present
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49152
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-06-19 13:15
|
| kernel-headers |
CVE-2022-49155 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49155
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49157 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Fix premature hw access after PCI error
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49157
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-15 19:41
|
| kernel-headers |
CVE-2022-49177 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwrng: cavium - fix NULL but dereferenced coccicheck error
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49177
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49178 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memstick/mspro_block: fix handling of read-only devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49178
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-09-23 13:43
|
| kernel-headers |
CVE-2022-49206 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49206
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49207 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Fix memleak in sk_psock_queue_msg
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49207
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49209 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49209
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49223 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/port: Hold port reference until decoder release
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49223
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-03-25 15:07
|
| kernel-headers |
CVE-2022-49225 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mt76: mt7921s: fix a possible memory leak in mt7921_load_patch
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49225
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:00 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49235 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ath9k_htc: fix uninit value bugs
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49235
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:15
|
| kernel-headers |
CVE-2022-49287 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: fix reference counting for struct tpm_chip
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49287
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-25 15:24
|
| kernel-headers |
CVE-2022-49319 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/arm-smmu-v3: check return value after calling platform_get_resource()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49319
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49322 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix sleeping function called from invalid context on RT kernel
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49322
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49334 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/huge_memory: Fix xarray node memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49334
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49352 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix warning in ext4_handle_inode_extension
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49352
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:17
|
| kernel-headers |
CVE-2022-49353 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/papr_scm: don't requests stats with '0' sized stats buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49353
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49374 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: check attribute length for bearer name
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49374
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49402 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Clean up hash direct_functions on register failures
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49402
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-21 12:14
|
| kernel-headers |
CVE-2022-49413 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bfq: Update cgroup information before merging bio
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-03-24 19:52
|
| kernel-headers |
CVE-2022-49422 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: idxd: Fix the error handling path in idxd_cdev_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49422
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-22 17:18
|
| kernel-headers |
CVE-2022-49432 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/xics: fix refcount leak in icp_opal_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49432
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-22 17:26
|
| kernel-headers |
CVE-2022-49436 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/papr_scm: Fix leaking nvdimm_events_map elements
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49436
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-22 17:26
|
| kernel-headers |
CVE-2022-49443 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: list: fix a data-race around ep->rdllist
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49443
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49447 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: hisi: Add missing of_node_put after of_find_compatible_node
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49447
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49466 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: scmi: Fix refcount leak in scmi_regulator_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49466
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49476 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mt76: mt7921: fix kernel crash at mt7921_pci_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49476
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49498 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: pcm: Check for null pointer of pointer substream before dereferencing it
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49498
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49516 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: always check VF VSI pointer values
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49531 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: loop: implement ->free_disk
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49532 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49532
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49538 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: jack: Access input_dev under mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49538
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49549 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49549
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49554 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: zsmalloc: fix races between asynchronous zspage free and page migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49554
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-22 17:33
|
| kernel-headers |
CVE-2022-49587 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp: Fix a data-race around sysctl_tcp_notsent_lowat.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49587
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49623 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/xive/spapr: correct bitmap allocation size
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49623
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49633 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: icmp: Fix data-races around sysctl_icmp_echo_enable_probe.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49633
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:16
|
| kernel-headers |
CVE-2022-49648 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/histograms: Fix memory leak problem
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49648
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49653 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: piix4: Fix a memory leak in the EFCH MMIO support
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49653
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-26 07:01 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49746 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49746
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2022-49749 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: designware: use casting of u64 in clock multiplication to avoid overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49749
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2022-49752 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2022-49766 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netlink: Bounds-check struct nlmsgerr creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49766
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:15 修改: 2025-11-06 21:57
|
| kernel-headers |
CVE-2022-49769 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gfs2: Check sb_bsize_shift after reading superblock
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49769
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:15 修改: 2025-11-06 21:46
|
| kernel-headers |
CVE-2022-49772 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49772
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-12-23 14:16
|
| kernel-headers |
CVE-2022-49782 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf: Improve missing SIGTRAP checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49782
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 17:48
|
| kernel-headers |
CVE-2022-49784 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/amd/uncore: Fix memory leak for events array
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49784
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 17:49
|
| kernel-headers |
CVE-2022-49800 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49800
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 19:33
|
| kernel-headers |
CVE-2022-49807 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet: fix a memory leak in nvmet_auth_set_key
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49807
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 19:20
|
| kernel-headers |
CVE-2022-49813 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ena: Fix error handling in ena_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49813
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 18:53
|
| kernel-headers |
CVE-2022-49817 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mhi: Fix memory leak in mhi_net_dellink()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49817
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-07 18:43
|
| kernel-headers |
CVE-2022-49830 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/drv: Fix potential memory leak in drm_dev_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49830
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 19:58
|
| kernel-headers |
CVE-2022-49835 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda: fix potential memleak in 'add_widget_node'
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49835
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:12
|
| kernel-headers |
CVE-2022-49841 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: imx: Add missing .thaw_noirq hook
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49841
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-10 21:14
|
| kernel-headers |
CVE-2022-49848 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: phy: qcom-qmp-combo: fix NULL-deref on runtime resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49848
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49874 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: hyperv: fix possible memory leak in mousevsc_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49874
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49880 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix warning in 'ext4_da_release_space'
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49880
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49888 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: entry: avoid kprobe recursion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49888
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-05-07 13:20
|
| kernel-headers |
CVE-2022-49889 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ring-buffer: Check for NULL cpu_buffer in ring_buffer_wake_waiters()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2022-49891 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: kprobe: Fix memory leak in test_gen_kprobe/kretprobe_cmd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49896 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/pmem: Fix cxl_pmem_region and cxl_memdev leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49896
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49902 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: Fix possible memory leak for rq_wb on add_disk failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49902
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 15:15
|
| kernel-headers |
CVE-2022-49906 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ibmvnic: Free rwi on reset success
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49906
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49907 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mdio: fix undefined behavior in bit shift for __mdiobus_register
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49907
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-11 01:41
|
| kernel-headers |
CVE-2022-49915 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mISDN: fix possible memory leak in mISDN_register_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49915
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-10-01 16:15
|
| kernel-headers |
CVE-2022-49917 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipvs: fix WARNING in ip_vs_app_net_cleanup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49917
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 15:16 修改: 2025-11-12 16:06
|
| kernel-headers |
CVE-2022-49949 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware_loader: Fix memory leak in firmware upload
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49949
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-12-31 00:56
|
| kernel-headers |
CVE-2022-49955 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/rtas: Fix RTAS MSR[HV] handling for Cell
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49955
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-14 18:59
|
| kernel-headers |
CVE-2022-49975 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Don't redirect packets with invalid pkt_len
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49975
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-13 21:28
|
| kernel-headers |
CVE-2022-50012 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/64: Init jump labels before parse_early_param()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-12-23 14:16
|
| kernel-headers |
CVE-2022-50025 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl: Fix a memory leak in an error handling path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50025
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-13 19:28
|
| kernel-headers |
CVE-2022-50045 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pci: Fix get_phb_number() locking
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-13 18:39
|
| kernel-headers |
CVE-2022-50071 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: move subflow cleanup in mptcp_destroy_common()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50071
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-17 18:15
|
| kernel-headers |
CVE-2022-50104 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/xive: Fix refcount leak in xive_get_max_prio
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50104
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 13:29
|
| kernel-headers |
CVE-2022-50108 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mfd: max77620: Fix refcount leak in max77620_initialise_fps
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50108
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 13:29
|
| kernel-headers |
CVE-2022-50134 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/hfi1: fix potential memory leak in setup_base_ctxt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50134
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-18 18:08
|
| kernel-headers |
CVE-2022-50170 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kunit: executor: Fix a memory leak on failure in kunit_filter_tests
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50170
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-28 14:46
|
| kernel-headers |
CVE-2022-50176 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/mcde: Fix refcount leak in mcde_dsi_bind
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50176
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-25 20:22
|
| kernel-headers |
CVE-2022-50197 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: zynq: Fix refcount leak in zynq_get_revision
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50197
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:47
|
| kernel-headers |
CVE-2022-50218 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iio: light: isl29028: Fix the warning in isl29028_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50218
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:59
|
| kernel-headers |
CVE-2022-50230 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: set UXN on swapper page tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50230
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:57
|
| kernel-headers |
CVE-2022-50232 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: set UXN on swapper page tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50232
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:57
|
| kernel-headers |
CVE-2022-50244 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl: fix possible null-ptr-deref in cxl_pci_init_afu|adapter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50244
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-24 19:59
|
| kernel-headers |
CVE-2022-50249 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memory: of: Fix refcount leak bug in of_get_ddr_timings()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50249
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-25 14:40
|
| kernel-headers |
CVE-2022-50250 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: core: fix use_count leakage when handling boot-on
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50250
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-25 14:40
|
| kernel-headers |
CVE-2022-50252 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: igb: Do not free q_vector unless new one was allocated
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50252
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-26 16:25
|
| kernel-headers |
CVE-2022-50253 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in network packet redirection
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50253
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-26 16:26
|
| kernel-headers |
CVE-2022-50259 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to use-after-free in sock_map_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50259
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-25 17:02
|
| kernel-headers |
CVE-2022-50278 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PNP: fix name memory leak in pnp_alloc_dev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50278
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-03 19:17
|
| kernel-headers |
CVE-2022-50285 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm,hugetlb: take hugetlb_lock before decrementing h->resv_huge_pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50285
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 18:54
|
| kernel-headers |
CVE-2022-50286 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50286
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-23 17:15
|
| kernel-headers |
CVE-2022-50304 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mtd: core: fix possible resource leak in init_mtd()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50304
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:31
|
| kernel-headers |
CVE-2022-50308 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: qcom: Add checks for devm_kcalloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50308
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:29
|
| kernel-headers |
CVE-2022-50311 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl: Fix refcount leak in cxl_calc_capp_routing
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50311
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:23
|
| kernel-headers |
CVE-2022-50319 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: coresight: trbe: remove cpuhp instance node before remove cpuhp state
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50319
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:19
|
| kernel-headers |
CVE-2022-50322 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtc: msc313: Fix function prototype mismatch in msc313_rtc_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50322
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 15:12
|
| kernel-headers |
CVE-2022-50331 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wwan_hwsim: fix possible memory leak in wwan_hwsim_dev_new()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50331
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-03 19:36
|
| kernel-headers |
CVE-2022-50332 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: video/aperture: Call sysfb_disable() before removing PCI devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50332
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 13:46
|
| kernel-headers |
CVE-2022-50337 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ocxl: fix pci device refcount leak when calling get_function_0()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50337
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2025-12-04 13:56
|
| kernel-headers |
CVE-2022-50347 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: rtsx_usb_sdmmc: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50347
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50349 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: misc: tifm: fix possible memory leak in tifm_7xx1_switch_media()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50349
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50351 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service in CIFS due to xid leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50351
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50352 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns: fix possible memory leak in hnae_ae_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50352
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50353 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: wmt-sdmmc: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50353
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50354 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdkfd: Fix kfd_process_device_init_vm error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50354
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50358 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: brcmfmac: return error when getting invalid max_flowrings from dongle
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50358
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50365 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: skbuff: Account for tail adjustment during pull operations
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50365
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50387 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hinic: fix the issue of CMDQ memory leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50387
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50395 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: integrity: Fix memory leakage in keyring allocation error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50395
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2022-50423 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50423
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2022-50424 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7921: resource leaks at mt7921_check_offload_capability()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50424
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2022-50428 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix off-by-one errors in fast-commit block filling
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50428
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 15:37
|
| kernel-headers |
CVE-2022-50432 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kernfs: fix use-after-free in __kernfs_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50432
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 15:35
|
| kernel-headers |
CVE-2022-50434 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: fix possible memleak when register 'hctx' failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50434
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:12
|
| kernel-headers |
CVE-2022-50445 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfrm: Reinject transport-mode packets through workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50445
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 19:50
|
| kernel-headers |
CVE-2022-50460 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: Fix xid leak in cifs_flock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50460
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 19:14
|
| kernel-headers |
CVE-2022-50465 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix leaking uninitialized memory in fast-commit journal
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50465
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 19:15
|
| kernel-headers |
CVE-2022-50466 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/binfmt_elf: Fix memory leak in load_elf_binary()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50466
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 19:15
|
| kernel-headers |
CVE-2022-50472 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/mad: Don't call to function that might sleep while in atomic context
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50472
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50473 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: Init completion before kobject_init_and_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50473
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50477 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rtc: class: Fix potential memleak in devm_rtc_allocate_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50477
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50479 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd: fix potential memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50479
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50481 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl: fix possible null-ptr-deref in cxl_guest_init_afu|adapter()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50481
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50482 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Clean up si_domain in the init_dmars() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50482
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50489 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/mipi-dsi: Detach devices when removing the host
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50489
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50497 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: binfmt_misc: fix shift-out-of-bounds in check_special_flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50497
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50500 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50500
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50504 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/rtas: avoid scheduling in rtas_os_term()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50504
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50505 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/amd: Fix pci device refcount leak in ppr_notifier()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50505
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50506 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drbd: only clone bio if we have a backing device
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50506
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2022-50510 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50510
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50512 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix potential memory leak in ext4_fc_record_regions()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50512
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50520 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50520
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50521 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: mxm-wmi: fix memleak in mxm_wmi_call_mx[ds|mx]()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50521
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50527 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix size validation for non-exclusive domains (v4)
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50527
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50528 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdkfd: Fix memory leakage
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50528
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50531 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix an information leak in tipc_topsrv_kern_subscr
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50535 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: Fix potential null-deref in dm_resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50535
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50537 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: raspberrypi: fix possible memory leak in rpi_firmware_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50537
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50550 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-iolatency: Fix memory leak on add_disk() failures
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50550
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50555 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix a null-ptr-deref in tipc_topsrv_accept
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50555
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2022-50561 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iio: fix memory leak in iio_device_register_eventset()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50561
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50562 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: acpi: Call acpi_put_table() to fix memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50562
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50566 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mtd: Fix device name leak when register device failed in add_mtd_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50566
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50575 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50575
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50577 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: IMA memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50577
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50578 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory leak in __class_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50578
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50580 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-throttle: prevent overflow while calculating wait time
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50580
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2022-50622 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (ext4): Memory leak due to improper handling of krealloc failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50622
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2022-50632 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drivers: perf: marvell_cn10k: Fix hotplug callback leak in tad_pmu_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50632
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50646 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: hpsa: Fix possible memory leak in hpsa_init_one()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50646
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50648 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix recursive locking direct_mutex in ftrace_modify_direct_caller
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50648
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50650 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix reference state management for synchronous callbacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50650
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50653 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: atmel-mci: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50653
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50654 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix panic due to wrong pageattr of im->image
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50654
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50655 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ppp: associate skb with a device at tx
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50655
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-23 14:16
|
| kernel-headers |
CVE-2022-50658 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: qcom: fix memory leak in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50658
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50665 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50665
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50667 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50667
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50669 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: misc: ocxl: fix possible name leak in ocxl_file_register_afu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50669
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50679 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: Fix DMA mappings leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50679
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2022-50697 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mrp: introduce active flags to prevent UAF when applicant uninit
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50697
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50698 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50698
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50699 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50699
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50702 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50702
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50703 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50703
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50704 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: gadget: Fix use-after-free during usb config switch
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50704
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50705 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/rw: defer fsnotify calls to task context
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50705
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50706 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/ieee802154: don't warn zero-sized raw_sendmsg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50706
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50712 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: devlink: hold region lock when flushing snapshots
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50712
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50715 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid1: stop mdx_raid1 thread when raid1 array run failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50715
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50718 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix pci device refcount leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50718
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50719 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: line6: fix stack overflow in line6_midi_transmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50719
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50720 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/apic: Don't disable x2APIC if locked
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50720
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50724 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: core: fix resource leak in regulator_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50724
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50728 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/lcs: Fix return type of lcs_start_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50730 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: silence the warning when evicting inode with dioread_nolock
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50730
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50733 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: idmouse: fix an uninit-value in idmouse_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50733
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50738 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost-vdpa: fix an iotlb memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50738
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50742 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: misc: ocxl: fix possible refcount leak in afu_ioctl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50742
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50743 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: erofs: Fix pcluster memleak when its block address is zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50743
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50746 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: erofs: validate the extent length for uncompressed pclusters
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50746
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50748 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipc: mqueue: fix possible memory leak in init_mqueue_fs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50748
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50749 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: acct: fix potential integer overflow in encode_comp_t()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50749
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50750 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50750
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50752 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50755 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: Avoid double brelse() in udf_rename()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50755
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50760 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50761 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/xen: Fix memory leak in xen_init_lock_cpu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50761
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50768 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: smartpqi: Correct device removal for multi-actuator devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50768
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50769 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: mxcmmc: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50769
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50771 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50771
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50773 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50773
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50777 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Kernel: Denial of Service due to reference count leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50777
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50778 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50778
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50781 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50781
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50782 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix bug_on in __es_tree_search caused by bad quota inode
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50782
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2022-50809 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xhci: dbc: Fix memory leak in xhci_alloc_dbc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50809
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50811 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50811
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50820 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50820
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50823 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: tegra: Fix refcount leak in tegra114_clock_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50824 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50824
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50825 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: wusb3801: fix fwnode refcount leak in wusb3801_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50825
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50827 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix memory leak in lpfc_create_port()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50827
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50835 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: add miss release buffer head in fc_do_one_pass()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50835
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50839 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: fix potential buffer head reference count leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50839
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50843 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm clone: Fix UAF in clone_dtr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50843
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50844 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50844
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2026-01-02 15:15
|
| kernel-headers |
CVE-2022-50845 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix inode leak in ext4_xattr_inode_create() on an error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50845
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50846 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: via-sdmmc: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50846
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50850 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ipr: Fix WARNING in ipr_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50850
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50851 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost_vdpa: fix the crash in unmap a large memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50851
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:15 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50855 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: prevent leak of lsm program after failed attach
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50855
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50856 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: Fix xid leak in cifs_ses_add_channel()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50856
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50858 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: alcor: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50858
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50859 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50859
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50862 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: prevent decl_tag from being referenced in func_proto
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50868 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwrng: amd - Fix PCI device refcount leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50868
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50870 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/rtas: avoid device tree lookups in rtas_os_term()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50870
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50873 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50873
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50878 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50878
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50879 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: objtool: Fix SEGFAULT
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50879
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50882 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: uvcvideo: Fix memory leak in uvc_gpio_parse
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50882
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50883 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Prevent decl_tag from being referenced in func_proto arg
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50883
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2026-01-02 15:15
|
| kernel-headers |
CVE-2022-50886 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mmc: toshsd: fix return value check of mmc_add_host()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50886
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50887 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50887
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2022-50889 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm integrity: Fix UAF in dm_integrity_dtr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-0045 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bypassing Spectre-BTI User Space Mitigations
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-04-25 23:15 修改: 2025-02-13 17:15
|
| kernel-headers |
CVE-2023-1513 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1513
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-03-23 21:15 修改: 2025-02-25 20:15
|
| kernel-headers |
CVE-2023-37454 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: use-after-free write in udf_close_lvid
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37454
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-07-06 17:15 修改: 2024-11-21 08:11
|
| kernel-headers |
CVE-2023-47233 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Use after free in brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-47233
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-11-03 21:15 修改: 2025-03-06 16:15
|
| kernel-headers |
CVE-2023-52447 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Defer the free of inner map when necessary
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52447
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52452 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix accesses to uninit stack slots
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52452
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-22 17:15 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52455 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu: Don't reserve 0-length IOVA region
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52455
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-23 15:15 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52462 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: fix check for attempt to corrupt spilled pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52462
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-23 15:15 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52464 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52464
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-23 15:15 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52465 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: null pointer dereference in smb2_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52465
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52467 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: null pointer dereference in of_syscon_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52467
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52468 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: use-after-free in class_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52468
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52470 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: null-ptr-deref in alloc_workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52470
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52473 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NULL pointer dereference in zone registration error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52473
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:27 修改: 2024-11-21 08:39
|
| kernel-headers |
CVE-2023-52478 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52478
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-29 06:15 修改: 2025-01-10 18:27
|
| kernel-headers |
CVE-2023-52481 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: errata: Add Cortex-A520 speculative unprivileged load workaround
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52481
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-29 06:15 修改: 2025-04-04 14:59
|
| kernel-headers |
CVE-2023-52516 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52516
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-02 22:15 修改: 2024-12-11 16:34
|
| kernel-headers |
CVE-2023-52519 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52519
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-02 22:15 修改: 2025-01-13 18:57
|
| kernel-headers |
CVE-2023-52598 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/ptrace: handle setting of fpc register correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52598
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-06 07:15 修改: 2025-02-14 16:40
|
| kernel-headers |
CVE-2023-52623 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: Fix a suspicious RCU usage warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52623
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-26 18:15 修改: 2025-12-31 00:52
|
| kernel-headers |
CVE-2023-52653 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: fix a memleak in gss_import_v2_context
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52653
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2025-04-08 18:42
|
| kernel-headers |
CVE-2023-52675 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52675
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-17 15:15 修改: 2025-03-04 16:53
|
| kernel-headers |
CVE-2023-52700 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix kernel warning when sending SYN message
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52700
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-19 14:36
|
| kernel-headers |
CVE-2023-52704 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52704
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:48
|
| kernel-headers |
CVE-2023-52706 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpio: sim: fix a memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52706
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-06 20:39
|
| kernel-headers |
CVE-2023-52732 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: blocklist the kclient when receiving corrupted snap trace
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52732
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:47
|
| kernel-headers |
CVE-2023-52735 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52735
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 14:51
|
| kernel-headers |
CVE-2023-52736 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda: Do not unset preset when cleaning up codec
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52736
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-23 19:01
|
| kernel-headers |
CVE-2023-52738 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52738
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 14:51
|
| kernel-headers |
CVE-2023-52743 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: Do not use WQ_MEM_RECLAIM flag for workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52743
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:44
|
| kernel-headers |
CVE-2023-52744 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/irdma: Fix potential NULL-ptr-dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52744
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-06 20:40
|
| kernel-headers |
CVE-2023-52747 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/hfi1: Restore allocated resources on failed copyout
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52747
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-23 19:10
|
| kernel-headers |
CVE-2023-52750 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52750
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:43
|
| kernel-headers |
CVE-2023-52764 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52764
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-23 19:52
|
| kernel-headers |
CVE-2023-52778 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: deal with large GSO size
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52778
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:41
|
| kernel-headers |
CVE-2023-52781 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52781
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-25 16:40
|
| kernel-headers |
CVE-2023-52782 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Track xmit submission to PTP WQ after populating metadata map
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52782
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-31 16:02
|
| kernel-headers |
CVE-2023-52792 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/region: Do not try to cleanup after cxl_region_setup_targets() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52792
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-23 20:10
|
| kernel-headers |
CVE-2023-52794 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: intel: powerclamp: fix mismatch in get function for max_idle
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52794
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-03-06 12:57
|
| kernel-headers |
CVE-2023-52795 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vhost-vdpa: fix use after free in vhost_vdpa_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52795
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-10 17:59
|
| kernel-headers |
CVE-2023-52798 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix dfs radar event locking
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52798
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:02
|
| kernel-headers |
CVE-2023-52800 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix htt pktlog locking
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52800
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:02
|
| kernel-headers |
CVE-2023-52801 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52801
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:02
|
| kernel-headers |
CVE-2023-52806 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52806
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-11-21 08:40
|
| kernel-headers |
CVE-2023-52808 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52808
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-14 16:32
|
| kernel-headers |
CVE-2023-52811 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52811
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:00
|
| kernel-headers |
CVE-2023-52815 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu/vkms: fix a possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52815
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-11-21 08:40
|
| kernel-headers |
CVE-2023-52818 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52818
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-30 20:08
|
| kernel-headers |
CVE-2023-52819 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52819
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-04-02 15:00
|
| kernel-headers |
CVE-2023-52828 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Detect IP == ksym.end as part of BPF program
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52828
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-26 16:57
|
| kernel-headers |
CVE-2023-52842 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52842
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-31 19:50
|
| kernel-headers |
CVE-2023-52845 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52845
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-31 16:01
|
| kernel-headers |
CVE-2023-52849 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/mem: Fix shutdown order
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52849
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2024-12-30 20:09
|
| kernel-headers |
CVE-2023-52851 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52851
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-10 17:43
|
| kernel-headers |
CVE-2023-52866 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: uclogic: Fix user-memory-access bug in uclogic_params_ugee_v2_init_event_hooks()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-09-24 00:25
|
| kernel-headers |
CVE-2023-52877 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52877
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-21 16:15 修改: 2025-01-06 20:32
|
| kernel-headers |
CVE-2023-52882 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52882
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 08:40
|
| kernel-headers |
CVE-2023-52883 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52883
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-20 12:15 修改: 2025-03-24 18:10
|
| kernel-headers |
CVE-2023-52884 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: cyapa - add missing input core locking to suspend/resume functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52884
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-21 11:15 修改: 2025-03-24 18:10
|
| kernel-headers |
CVE-2023-52886 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52886
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-16 10:15 修改: 2024-11-21 08:40
|
| kernel-headers |
CVE-2023-52887 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52887
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:16
|
| kernel-headers |
CVE-2023-52926 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/rw: split io_read() into a helper
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52926
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-24 09:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2023-52928 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Skip invalid kfunc call in backtrack_insn
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52928
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-29 17:14
|
| kernel-headers |
CVE-2023-52936 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kernel/irq/irqdomain.c: fix memory leak with using debugfs_lookup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52936
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2023-52937 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HV: hv_balloon: fix memory leak with using debugfs_lookup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52937
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2023-52938 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: ucsi: Don't attempt to resume the ports before they exist
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52938
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2023-52941 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: isotp: split tx timer into transmission and timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52941
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-28 18:24
|
| kernel-headers |
CVE-2023-52942 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52942
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-28 18:24
|
| kernel-headers |
CVE-2023-52981 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Fix request ref counting during error capture & debugfs dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52981
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-28 18:22
|
| kernel-headers |
CVE-2023-52982 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fscache: Use wait_on_bit() to wait for the freeing of relinquished volume
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52982
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-28 18:22
|
| kernel-headers |
CVE-2023-52986 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52986
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-29 17:11
|
| kernel-headers |
CVE-2023-52987 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52987
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-29 17:08
|
| kernel-headers |
CVE-2023-52993 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52993
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2023-52994 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: acpi: Fix suspend with Xen PV
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52994
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2023-53002 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Fix a memory leak with reused mmap_offset
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53002
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2023-53005 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: trace_events_hist: add check for return value of 'create_hist_field'
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53005
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2023-53007 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Make sure trace_printk() can output as soon as it can be used
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53007
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-30 16:24
|
| kernel-headers |
CVE-2023-53011 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: stmmac: enable all safety features by default
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53011
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2023-53012 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: core: call put_device() only after device_register() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-30 16:20
|
| kernel-headers |
CVE-2023-53013 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ptdma: pt_core_execute_cmd() should use spinlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53013
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2023-53015 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: betop: check shape of output reports
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53015
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2023-53017 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_sync: fix memory leak in hci_update_adv_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53017
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2023-53018 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_conn: Fix memory leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53018
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2023-53020 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: l2tp: close all race conditions in l2tp_tunnel_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53020
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2023-53031 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/imc-pmu: Fix use of mutex in IRQs disabled section
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53031
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 17:15 修改: 2025-10-31 18:49
|
| kernel-headers |
CVE-2023-53048 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tcpm: fix warning when handle discover_identity message
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53048
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 18:33
|
| kernel-headers |
CVE-2023-53049 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: ucsi: Fix NULL pointer deref in ucsi_connector_change()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53049
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 18:34
|
| kernel-headers |
CVE-2023-53055 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fscrypt: destroy keyring after security_sb_delete()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53055
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 17:49
|
| kernel-headers |
CVE-2023-53069 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-vf: Add missing free for alloc_percpu
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53069
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 20:51
|
| kernel-headers |
CVE-2023-53074 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53074
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 20:50
|
| kernel-headers |
CVE-2023-53082 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vp_vdpa: fix the crash in hot unplug with vp_vdpa
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 20:42
|
| kernel-headers |
CVE-2023-53091 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: update s_journal_inum if it changes after journal replay
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53091
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 21:04
|
| kernel-headers |
CVE-2023-53093 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Do not let histogram values have some modifiers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53093
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-12 21:01
|
| kernel-headers |
CVE-2023-53115 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix memory leaks in mpi3mr_init_ioc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53115
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:52
|
| kernel-headers |
CVE-2023-53127 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix expander node leak in mpi3mr_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53127
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:40
|
| kernel-headers |
CVE-2023-53128 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix throttle_groups memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53128
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:40
|
| kernel-headers |
CVE-2023-53131 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: SUNRPC: Fix a server shutdown leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53131
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:40
|
| kernel-headers |
CVE-2023-53142 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: copy last block omitted in ice_get_module_eeprom()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53142
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-02 16:15 修改: 2025-11-10 17:38
|
| kernel-headers |
CVE-2023-53150 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Pointer may be dereferenced
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53150
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-25 17:03
|
| kernel-headers |
CVE-2023-53151 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: prevent soft lockup while flush writes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-24 21:00
|
| kernel-headers |
CVE-2023-53153 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: Fix use after free for wext
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53153
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-24 21:01
|
| kernel-headers |
CVE-2023-53165 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: Fix uninitialized array access for some pathnames
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53165
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-24 21:02
|
| kernel-headers |
CVE-2023-53167 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix null pointer dereference in tracing_err_log_open()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53167
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-11-24 21:02
|
| kernel-headers |
CVE-2023-53174 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: core: Fix possible memory leak if device_add() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53174
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 02:58
|
| kernel-headers |
CVE-2023-53179 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53179
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 02:57
|
| kernel-headers |
CVE-2023-53184 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64/sme: Set new vector length before reallocating
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53184
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 19:12
|
| kernel-headers |
CVE-2023-53190 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vxlan: Fix memory leaks in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53190
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 02:42
|
| kernel-headers |
CVE-2023-53193 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53193
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 14:15 修改: 2025-12-02 02:41
|
| kernel-headers |
CVE-2023-53208 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53208
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53211 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver core: location: Free struct acpi_pld_info *pld before return false
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53211
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53215 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/fair: Don't balance task to its current running CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53233 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: fix deadlock triggered by cancel_delayed_work_syn()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53233
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53234 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: watchdog: Fix kmemleak in watchdog_cdev_register
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53234
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53242 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal/drivers/hisi: Drop second sensor hi3660
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53242
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53245 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: storvsc: Fix handling of virtual Fibre Channel timeouts
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53245
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53246 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53246
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-05 11:16
|
| kernel-headers |
CVE-2023-53250 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53250
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53256 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: arm_ffa: Fix FFA device names for logical partitions
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53256
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 15:15 修改: 2026-01-14 18:16
|
| kernel-headers |
CVE-2023-53265 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: ensure that VID header offset + VID header size <= alloc, size
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53265
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53268 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: fsl_mqs: move of_node_put() to the correct location
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53268
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53271 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: Fix unreferenced object reported by kmemleak in ubi_resize_volume()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53271
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53279 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: misc: vmw_balloon: fix memory leak with using debugfs_lookup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53279
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53287 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: cdns3: Put the cdns set active part outside the spin lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53287
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53290 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to file descriptor leak in BPF sample code
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53290
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53291 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53291
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 08:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53304 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_set_rbtree: fix overlap expiration walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53304
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53307 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53307
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53309 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: Fix integer overflow in radeon_cs_parser_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53309
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53313 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: fix wrong setting of max_corr_read_errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53313
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53319 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Handle kvm_arm_init failure correctly in finalize_pkvm
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53319
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53320 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53320
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53332 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53332
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 17:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53338 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: lwt: Fix return values of BPF xmit ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53338
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53341 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: of/fdt: run soc memory setup when early_init_dt_scan_memory fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53341
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53344 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53344
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53351 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/sched: Check scheduler work queue before calling timeout handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53351
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53357 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: check slab-out-of-bounds in md_bitmap_get_counter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53357
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-17 15:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53369 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: dcb: choose correct policy to parse DCB_ATTR_BCN
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53369
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53372 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: fix a potential overflow in sctp_ifwdtsn_skip
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53372
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53375 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Free error logs of tracing instances
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53375
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53378 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/dpt: Treat the DPT BO as a framebuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53378
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53383 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53383
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53387 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ufs: core: Fix device management cmd timeout flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53387
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53391 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53391
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53400 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda: Fix Oops by 9.1 surround channel names
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53400
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2023-53411 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PM: EM: fix memory leak with using debugfs_lookup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53411
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 14:15 修改: 2026-01-14 20:15
|
| kernel-headers |
CVE-2023-53419 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53419
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2023-53426 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: Fix xsk_diag use-after-free error during socket cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53426
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2023-53431 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ses: Don't attach if enclosure has no components
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53431
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-18 16:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2023-53449 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/dasd: Fix potential memleak in dasd_eckd_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53449
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 21:25
|
| kernel-headers |
CVE-2023-53456 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla4xxx: Add length check when parsing nlattrs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53456
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 21:09
|
| kernel-headers |
CVE-2023-53460 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw88: fix memory leak in rtw_usb_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53460
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 21:19
|
| kernel-headers |
CVE-2023-53462 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hsr: Fix uninit-value access in fill_frame_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53462
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 21:32
|
| kernel-headers |
CVE-2023-53467 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: rtw89: fix potential leak in rtw89_append_probe_req_ie()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53467
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 15:53
|
| kernel-headers |
CVE-2023-53473 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: improve error handling from ext4_dirhash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53473
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 17:02
|
| kernel-headers |
CVE-2023-53474 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/MCE/AMD: Use an u64 for bank_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53474
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 16:55
|
| kernel-headers |
CVE-2023-53482 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu: Fix error unwind in iommu_group_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53482
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-20 16:36
|
| kernel-headers |
CVE-2023-53496 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/platform/uv: Use alternate source for socket to node data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53496
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 20:47
|
| kernel-headers |
CVE-2023-53498 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: Fix potential null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53498
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2026-01-16 20:49
|
| kernel-headers |
CVE-2023-53501 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53501
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53505 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: tegra: tegra124-emc: Fix potential memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53505
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53511 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: fix fget leak when fs don't support nowait buffered read
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53511
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53518 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory leak in PM / devfreq can lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53518
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53523 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: gs_usb: fix time stamp counter initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53523
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 12:15 修改: 2025-10-02 19:11
|
| kernel-headers |
CVE-2023-53548 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53548
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53550 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: amd-pstate: fix global sysfs attribute type
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53550
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53557 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fprobe: Release rethook after the ftrace_ops is unregistered
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53557
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53571 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Make intel_get_crtc_new_encoder() less oopsy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53571
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53578 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53578
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53588 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: check for station first in client probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53588
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53593 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: Release folio lock on fscache read hit
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53593
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2026-01-05 11:16
|
| kernel-headers |
CVE-2023-53594 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver core: fix resource leak in device_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53594
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53595 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: mcs: Fix NULL pointer dereferences
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53595
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53602 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix memory leak in WMI firmware stats
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53602
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53603 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Avoid fcport pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53603
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53604 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53604
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53605 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm: amd: display: Fix memory leakage
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53605
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53607 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: ymfpci: Fix BUG_ON in probe function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53607
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53610 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: irqchip: Fix refcount leak in platform_irqchip_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53610
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 16:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2023-53622 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gfs2: Fix possible data races in gfs2_show_options()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53622
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53631 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: dell-sysman: Fix reference leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53631
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53634 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, arm64: Fixed a BTI error on returning to patched function
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53634
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53648 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53648
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53649 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf trace: Really free the evsel->priv area
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53649
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53656 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drivers/perf: hisi: Don't migrate perf to the CPU going to teardown
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53656
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53662 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup}
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53662
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53664 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53664
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53670 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-core: fix dev_pm_qos memleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53670
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53671 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53671
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53674 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: Fix memory leak in devm_clk_notifier_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53674
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53685 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tun: Fix memory leak for detached NAPI queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53685
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53687 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53687
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| kernel-headers |
CVE-2023-53702 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/crypto: use vector instructions only if available for ChaCha20
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53702
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53704 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53704
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53708 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53708
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53709 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ring-buffer: Handle race between rb_move_tail and rb_check_pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53709
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53712 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: 9317/1: kexec: Make smp stop calls asynchronous
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53712
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53715 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53715
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53716 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Network subsystem memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53716
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53718 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ring-buffer: Do not swap cpu_buffer during resize process
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53718
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53719 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: arc_uart: fix of_iomap leak in `arc_serial_probe`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53719
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53728 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: posix-timers: Ensure timer ID search-loop limit is valid
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53730 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53730
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53731 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netlink: fix potential deadlock in netlink_set_err()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53731
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-22 14:15 修改: 2025-10-22 21:12
|
| kernel-headers |
CVE-2023-53743 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Free released resource after coalescing
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53743
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53752 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: deal with integer overflows in kmalloc_reserve()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53754 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53754
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53756 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: VMX: Fix crash due to uninitialized current_vmcs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53756
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53760 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: ufs: core: mcq: Fix &hwq->cq_lock deadlock issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53767 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via memory leak in ath12k Wi-Fi driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53767
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53769 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virt/coco/sev-guest: Double-buffer messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53769
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-08 02:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2023-53781 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smc: Fix use-after-free in tcp_write_timer_handler()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53781
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53790 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Zeroing allocated object from slab in bpf memory allocator
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53790
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53791 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: fix warning for holder mismatch from export_rdev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53791
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53793 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf tool x86: Fix perf_env memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53793
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53798 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: Fix uninitialized number of lanes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53798
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53809 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53809
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53814 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Fix dropping valid root bus resources with .end = zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53814
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53818 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: zynq: Fix refcount leak in zynq_early_slcr_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53818
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 01:16 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53823 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block/rq_qos: protect rq_qos apis with a new lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53826 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53826
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53830 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: think-lmi: Fix memory leak when showing current settings
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53830
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53831 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: read sk->sk_family once in sk_mc_loop()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53831
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53836 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Fix skb refcnt race after locking changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53847 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb-storage: alauda: Fix uninit-value in alauda_check_media()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53847
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53852 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-core: fix memory leak in dhchap_secret_store
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53852
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53858 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53858
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53859 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/idle: mark arch_cpu_idle() noinstr
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53859
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| kernel-headers |
CVE-2023-53866 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: soc-compress: Reposition and add pcm_mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2026-01-05 11:16
|
| kernel-headers |
CVE-2023-53867 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix potential use-after-free bug when trimming caps
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53867
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-53992 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: ocb: don't leave if not joined
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53992
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-53993 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53993
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-53994 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ionic: remove WARN_ON to prevent panic_on_warn
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53994
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-53997 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: of: fix double-free on unregistration
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53997
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-53998 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwrng: virtio - Fix race on data_avail and actual data
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53998
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54006 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: af_unix: Fix data-race around unix_tot_inflight
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54006
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54007 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vmci_host: fix a race condition in vmci_host_poll() causing GPF
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54007
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54008 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio_vdpa: build affinity masks conditionally
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54010 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54011 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix an issue found by KASAN
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54011
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54019 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/psi: use kernfs polling functions for PSI trigger polling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54019
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54021 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: set goal start correctly in ext4_mb_normalize_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54021
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54022 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb-audio: Fix potential memory leaks at error path for UMP open
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54022
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54024 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: Destroy target device if coalesced MMIO unregistration fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54024
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54026 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: opp: Fix use-after-free in lazy_opp_tables after probe deferral
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54026
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54030 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/net: don't overflow multishot recv
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54030
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54031 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54031
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54033 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: fix a memory leak in the LRU and LRU_PERCPU hash maps
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54033
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54035 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: fix underflow in chain reference counter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54035
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54041 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: fix memory leak when removing provided buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54041
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54042 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/64s: Fix VAS mm use after free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54042
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54043 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Do not add the same hwpt to the ioas->hwpt_list twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54043
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54045 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: audit: fix possible soft lockup in __audit_inode_child()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54046 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: essiv - Handle EBUSY correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54046
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54051 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: do not allow gso_size to be set to GSO_BY_FRAGS
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54051
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54056 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kheaders: Use array declaration instead of char
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54057 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54057
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54058 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: arm_ffa: Check if ffa_driver remove is present before executing
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54058
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54060 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Set end correctly when doing batch carry
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54060
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54062 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix invalid free tracking in ext4_xattr_move_to_block()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54062
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54064 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54066 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54066
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54076 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix missed ses refcounting
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54076
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54081 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen: speed up grant-table reclaim
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54081
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54083 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: phy: tegra: xusb: Clear the driver reference in usb-phy dev
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54083
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54086 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Add preempt_count_{sub,add} into btf id deny list
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54086
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54087 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: Fix possible null-ptr-deref in ubi_free_volume()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54087
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54088 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-cgroup: hold queue_lock when removing blkg->q_node
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54088
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54090 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ixgbe: Fix panic during XDP_TX with > 64 CPUs
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54090
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54091 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/client: Fix memory leak in drm_client_target_cloned
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54091
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54093 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: anysee: fix null-ptr-deref in anysee_master_xfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54093
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54095 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/iommu: Fix notifiers being shared by PCI and VIO buses
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54095
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54096 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soundwire: fix enumeration completion
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54096
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54097 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: stm32-pwr: fix of_iomap leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54098 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/gvt: fix gvt debugfs destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54098
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54099 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: Protect reconfiguration of sb read-write from racing writes
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54099
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54100 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qedi: Fix use after free bug in qedi_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54100
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54105 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: isotp: check CAN address family in isotp_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54105
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54107 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-cgroup: dropping parent refcount after pd_free_fn() is done
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54107
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54114 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: nsh: Use correct mac_offset to unwind gso skb in nsh_gso_segment()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54114
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54117 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/dcssblk: fix kernel crash with list_add corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54117
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54123 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: fix memleak for 'conf->bio_split'
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54123
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54128 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs: drop peer group ids under namespace lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54128
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54134 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: autofs: fix memory leak of waitqueues in autofs_catatonic_mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54134
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54135 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: maple_tree: fix potential out-of-bounds access in mas_wr_end_piv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54137 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfio/type1: fix cap_migration information leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54137
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54144 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdkfd: Fix kernel warning during topology setup
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54144
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54145 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54145
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54146 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/kexec: Fix double-free of elf header buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54146
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54152 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: j1939: prevent deadlock by moving j1939_sk_errqueue()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54152
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54153 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: turn quotas off if mount failed after enabling quotas
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54153
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54154 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: core: Fix target_cmd_counter leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54154
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54160 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: arm_sdei: Fix sleep from invalid context BUG
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54160
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2023-54170 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: keys: Fix linking a duplicate key to a keyring's assoc_array
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54170
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54171 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix memory leak of iter->temp when reading trace_pipe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54171
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54172 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54172
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54173 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Disable preemption in bpf_event_output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54173
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54174 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfio: Fix NULL pointer dereference caused by uninitialized group->iommufd
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54174
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54177 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: quota: fix warning in dqgrab()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54177
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54181 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix issue in verifying allow_ptr_leaks
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54181
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54184 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: iscsit: Free cmds before session free
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54184
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54186 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: altmodes/displayport: fix pin_assignment_show
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54186
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54189 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pstore/ram: Add check for kstrdup
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54189
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54190 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: leds: led-core: Fix refcount leak in of_led_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54190
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54194 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54194
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54195 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rxrpc: Fix timeout of a call that hasn't yet been granted a channel
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54195
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54198 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: fix out-of-bounds access in tty_driver_lookup_tty()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54202 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: fix race condition UAF in i915_perf_add_config_ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54202
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54207 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: uclogic: Correct devm device reference for hidinput input_dev name
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54207
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54209 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix blktrace debugfs entries leakage
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54209
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54210 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54210
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54211 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix warning in trace_buffered_event_disable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54211
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54213 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: sisusbvga: Add endpoint checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54213
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| kernel-headers |
CVE-2023-54215 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54218 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54218
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54220 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: 8250: Fix oops for port->pm on uart_change_pm()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54220
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54221 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54221
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54222 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54222
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54223 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: xsk: Fix invalid buffer access for legacy rq
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54223
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54227 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: fix tags leak when shrink nr_hw_queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54227
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54230 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: amba: bus: fix refcount leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54230
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54233 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: avoid a NULL dereference with unsupported widgets
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54233
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54234 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix missing mrioc->evtack_cmds initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54234
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54235 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/DOE: Fix destroy_work_on_stack() race
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54235
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54237 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: fix potential panic dues to unprotected smc_llc_srv_add_link()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54237
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54242 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block, bfq: Fix division by zero error on zero wsum
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54242
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54244 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: EC: Fix oops when removing custom query handlers
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54244
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54245 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54245
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54246 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54246
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54247 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Silence a warning in btf_type_id_size()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54247
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54252 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54252
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54254 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/ttm: Don't leak a resource on eviction error
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54254
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54258 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: fix potential oops in cifs_oplock_break
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54258
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54259 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54259
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54260 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: Fix lost destroy smbd connection when MR allocate failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54260
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54261 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdkfd: Add missing gfx11 MQD manager callbacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54261
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54267 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54267
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54268 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: debugobjects: Don't wake up kswapd from fill_pool()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54268
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54270 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: usb: siano: Fix use after free bugs caused by do_submit_urb
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54270
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54283 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Address KCSAN report on bpf_lru_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54283
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54285 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iomap: Fix possible overflow condition in iomap_write_delalloc_scan
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54285
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54288 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: fortify the spinlock against deadlock by interrupt
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54288
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54289 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qedf: Fix NULL dereference in error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54289
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54291 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vduse: fix NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54291
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54294 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: fix memleak of md thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54294
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54296 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54296
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54299 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: bus: verify partner exists in typec_altmode_attention
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54299
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54301 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: 8250_bcm7271: fix leak in `brcmuart_probe`
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54301
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54303 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Disable preemption in bpf_perf_event_output
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54303
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54305 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: refuse to create ea block when umounted
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54305
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54306 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tls: avoid hanging tasks on the tx_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54306
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54308 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: ymfpci: Create card with device-managed snd_devm_card_new()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54308
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54309 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54309
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54311 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: fix deadlock when converting an inline directory in nojournal mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54311
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54312 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: samples/bpf: Fix buffer overflow in tcp_basertt
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54312
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54313 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ovl: fix null pointer dereference in ovl_get_acl_rcu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54313
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54315 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/powernv/sriov: perform null check on iov before dereferencing iov
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54315
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54316 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: refscale: Fix uninitalized use of wait_queue_head_t
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54316
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54318 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54318
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54320 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54320
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54321 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver core: fix potential null-ptr-deref in device_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54321
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54322 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: set __exception_irq_entry with __irq_entry as a default
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54322
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54323 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/pmem: Fix nvdimm registration races
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54323
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54324 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm: fix a race condition in retrieve_deps
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54324
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-54326 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: misc: pci_endpoint_test: Free IRQs before removing the device
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54326
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:42
|
| kernel-headers |
CVE-2023-7042 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: null pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7042
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-12-21 20:15 修改: 2024-11-21 08:45
|
| kernel-headers |
CVE-2024-0564 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: max page sharing of Kernel Samepage Merging (KSM) may cause memory deduplication
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0564
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-01-30 15:15 修改: 2024-11-25 09:15
|
| kernel-headers |
CVE-2024-23196 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Race condition in snd_hdac_regmap_sync() in sound/hda
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23196
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-05 08:15 修改: 2024-11-21 08:57
|
| kernel-headers |
CVE-2024-24855 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Race condition in lpfc_unregister_fcf_rescan() in scsi/lpfc/lpfc_hbadisc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24855
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-05 08:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-25740 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: memory leak in ubi driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25740
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-12 03:15 修改: 2025-05-07 21:16
|
| kernel-headers |
CVE-2024-26595 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_acl_tcam: Fix NULL pointer dereference in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26595
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-23 15:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-26605 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/ASPM: Fix deadlock when enabling ASPM
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26605
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-26 16:28 修改: 2024-11-21 09:02
|
| kernel-headers |
CVE-2024-26612 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfs, fscache: Prevent Oops in fscache_put_cache()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26612
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-11 18:15 修改: 2025-04-03 15:19
|
| kernel-headers |
CVE-2024-26631 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26631
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-18 11:15 修改: 2025-03-10 15:46
|
| kernel-headers |
CVE-2024-26647 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: Fix late dereference 'dsc' check in 'link_set_dsc_pps_packet()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26647
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-26 18:15 修改: 2025-01-07 20:15
|
| kernel-headers |
CVE-2024-26648 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NULL check in edp_setup_replay()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26648
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-26 18:15 修改: 2025-04-08 19:29
|
| kernel-headers |
CVE-2024-26659 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xhci: handle isoc Babble and Buffer Overrun events properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26659
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-02 07:15 修改: 2025-03-17 15:13
|
| kernel-headers |
CVE-2024-26661 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26661
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-02 07:15 修改: 2025-04-08 19:25
|
| kernel-headers |
CVE-2024-26662 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26662
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-02 07:15 修改: 2025-04-08 19:25
|
| kernel-headers |
CVE-2024-26672 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26672
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-02 07:15 修改: 2025-04-08 19:24
|
| kernel-headers |
CVE-2024-26687 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen/events: close evtchn after mapping cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26687
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-03-17 15:39
|
| kernel-headers |
CVE-2024-26691 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Fix circular locking dependency
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26691
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-02-27 14:42
|
| kernel-headers |
CVE-2024-26695 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26695
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-01-07 17:27
|
| kernel-headers |
CVE-2024-26712 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/kasan: Fix addr error caused by page alignment
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26712
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-04-08 15:30
|
| kernel-headers |
CVE-2024-26714 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: interconnect: qcom: sc8180x: Mark CO0 BCM keepalive
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26714
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-03-17 15:36
|
| kernel-headers |
CVE-2024-26715 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26715
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-01-07 20:25
|
| kernel-headers |
CVE-2024-26721 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26721
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 15:15 修改: 2025-03-17 16:01
|
| kernel-headers |
CVE-2024-26742 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: smartpqi: Fix disable_managed_interrupts
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26742
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-03-17 16:04
|
| kernel-headers |
CVE-2024-26751 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: ep93xx: Add terminator to gpiod_lookup_table
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26751
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-03-17 16:57
|
| kernel-headers |
CVE-2024-26758 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: Don't ignore suspended array in md_check_recovery()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26758
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-04-04 14:30
|
| kernel-headers |
CVE-2024-26760 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: pscsi: Fix bio_put() for error case
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26760
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-03-03 17:34
|
| kernel-headers |
CVE-2024-26769 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet-fc: avoid deadlock on delete association path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26769
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-04-04 14:17
|
| kernel-headers |
CVE-2024-26775 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: aoe: avoid potential deadlock at set_capacity
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26775
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-07-17 17:15
|
| kernel-headers |
CVE-2024-26776 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26776
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-03 17:15 修改: 2025-02-27 14:37
|
| kernel-headers |
CVE-2024-26786 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Fix iopt_access_list_id overwrite bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26786
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-04 09:15 修改: 2025-04-04 14:29
|
| kernel-headers |
CVE-2024-26818 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tools/rtla: Fix clang warning about mount_point var size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26818
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 10:15 修改: 2025-03-27 21:07
|
| kernel-headers |
CVE-2024-26820 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26820
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 10:15 修改: 2025-03-27 21:08
|
| kernel-headers |
CVE-2024-26828 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: fix underflow in parse_server_interfaces()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26828
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 10:15 修改: 2025-04-08 19:16
|
| kernel-headers |
CVE-2024-26844 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: Fix WARNING in _copy_from_iter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26844
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 10:15 修改: 2025-04-02 13:17
|
| kernel-headers |
CVE-2024-26845 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: core: Add TMF to tmr_list handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26845
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 10:15 修改: 2026-01-05 11:16
|
| kernel-headers |
CVE-2024-26854 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix uninitialized dplls mutex usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26854
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-03-21 15:03
|
| kernel-headers |
CVE-2024-26857 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: geneve: make sure to pull inner header in geneve_rx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26857
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-03-21 15:03
|
| kernel-headers |
CVE-2024-26859 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/bnx2x: Prevent access to a freed page in page_pool
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26859
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-03-04 15:44
|
| kernel-headers |
CVE-2024-26862 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: packet: annotate data-races around ignore_outgoing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-03-04 15:47
|
| kernel-headers |
CVE-2024-26883 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix stackmap overflow check on 32-bit arches
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26883
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-03-07 20:29
|
| kernel-headers |
CVE-2024-26890 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btrtl: fix out of bounds memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26890
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-03-21 14:39
|
| kernel-headers |
CVE-2024-26891 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2025-05-07 17:42
|
| kernel-headers |
CVE-2024-26900 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: fix kmemleak of rdev->serial
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26900
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 11:15 修改: 2024-11-21 09:03
|
| kernel-headers |
CVE-2024-26915 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26915
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-17 16:15 修改: 2025-04-08 18:56
|
| kernel-headers |
CVE-2024-26926 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: binder: check offset alignment in binder_get_object()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26926
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-04-25 06:15 修改: 2025-12-23 18:53
|
| kernel-headers |
CVE-2024-26945 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: iaa - Fix nr_cpus < nr_iaa case
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26945
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 06:15 修改: 2025-03-20 21:26
|
| kernel-headers |
CVE-2024-26950 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wireguard: netlink: access device through ctx instead of peer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26950
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 06:15 修改: 2025-03-20 21:26
|
| kernel-headers |
CVE-2024-27059 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27059
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2025-01-14 14:36
|
| kernel-headers |
CVE-2024-27073 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: ttpci: fix two memleaks in budget_av_attach
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27073
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-01 13:15 修改: 2025-04-08 18:54
|
| kernel-headers |
CVE-2024-27393 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen-netfront: Add missing skb_mark_for_recycle
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27393
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-14 15:12 修改: 2025-04-08 19:42
|
| kernel-headers |
CVE-2024-27398 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27398
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-14 15:12 修改: 2024-11-30 08:15
|
| kernel-headers |
CVE-2024-35790 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35790
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-17 13:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-35834 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: recycle buffer in case Rx queue was full
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35834
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-17 14:15 修改: 2025-09-19 16:21
|
| kernel-headers |
CVE-2024-35836 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dpll: fix pin dump crash for rebound module
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35836
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-17 14:15 修改: 2025-09-19 16:40
|
| kernel-headers |
CVE-2024-35859 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix module reference leakage from bdev_open_by_dev error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35859
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-17 15:15 修改: 2025-04-07 18:57
|
| kernel-headers |
CVE-2024-35860 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: support deferring bpf_link dealloc to after RCU grace period
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35860
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2025-09-26 16:03
|
| kernel-headers |
CVE-2024-35865 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35865
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2025-04-07 18:57
|
| kernel-headers |
CVE-2024-35879 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: of: dynamic: Synchronize of_changeset_destroy() with the devlink removals
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35879
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2025-12-23 19:29
|
| kernel-headers |
CVE-2024-35901 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mana: Fix Rx DMA datasize and skb_over_panic
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35901
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2025-09-23 13:35
|
| kernel-headers |
CVE-2024-35903 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/bpf: Fix IP after emitting call depth accounting
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35903
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2025-09-24 21:06
|
| kernel-headers |
CVE-2024-35917 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/bpf: Fix bpf_plt pointer arithmetic
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35917
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 09:15 修改: 2025-09-23 15:26
|
| kernel-headers |
CVE-2024-35922 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbmon: prevent division by zero in fb_videomode_from_videomode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35922
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 11:15 修改: 2024-12-30 19:27
|
| kernel-headers |
CVE-2024-35945 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: phy_device: Prevent nullptr exceptions on ISR
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35945
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-19 11:15 修改: 2025-01-31 15:01
|
| kernel-headers |
CVE-2024-35973 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: geneve: fix header validation in geneve[6]_xmit_skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35973
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2025-04-04 14:33
|
| kernel-headers |
CVE-2024-35974 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix q->blkg_list corruption during disk rebind
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2025-12-23 17:15
|
| kernel-headers |
CVE-2024-35981 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: virtio_net: Do not send RSS key if it is not supported
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35981
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2025-01-16 17:22
|
| kernel-headers |
CVE-2024-36004 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36004
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2025-12-17 03:34
|
| kernel-headers |
CVE-2024-36007 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36007
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2025-12-17 03:33
|
| kernel-headers |
CVE-2024-36008 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv4: check for NULL idev in ip_route_use_hint()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-20 10:15 修改: 2024-11-21 09:21
|
| kernel-headers |
CVE-2024-36012 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: msft: fix slab-use-after-free in msft_do_close()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-23 07:15 修改: 2025-01-06 22:33
|
| kernel-headers |
CVE-2024-36030 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-af: fix the double free in rvu_npc_freemem()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36030
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-04-01 18:33
|
| kernel-headers |
CVE-2024-36031 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: keys: Fix overwrite of key expiration on instantiation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36031
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-36489 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tls: fix missing memory barrier in tls_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36489
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-21 11:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36893 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tcpm: Check for port partner validity before consuming it
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36893
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36898 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpiolib: cdev: fix uninitialised kfifo
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36898
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-09-18 14:48
|
| kernel-headers |
CVE-2024-36906 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: 9381/1: kasan: clear stale stack poison
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36906
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-09-17 22:14
|
| kernel-headers |
CVE-2024-36909 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36909
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-09-30 17:54
|
| kernel-headers |
CVE-2024-36910 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: uio_hv_generic: Don't free decrypted memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36910
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-04-01 18:35
|
| kernel-headers |
CVE-2024-36911 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hv_netvsc: Don't free decrypted memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36911
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-09-30 17:57
|
| kernel-headers |
CVE-2024-36918 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Check bloom filter map value size
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36918
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-09-17 22:18
|
| kernel-headers |
CVE-2024-36919 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36919
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36920 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36920
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-10-01 13:53
|
| kernel-headers |
CVE-2024-36932 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36932
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36937 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xdp: use flags field to disambiguate broadcast redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36937
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-09-17 22:19
|
| kernel-headers |
CVE-2024-36938 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36938
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2024-11-21 09:22
|
| kernel-headers |
CVE-2024-36949 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: amd/amdkfd: sync all devices to wait all processes being evicted
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36949
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-10-01 14:17
|
| kernel-headers |
CVE-2024-36954 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tipc: fix a possible memleak in tipc_buf_append
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36954
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-01-14 16:27
|
| kernel-headers |
CVE-2024-36955 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36955
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-05-30 16:15 修改: 2025-04-01 18:35
|
| kernel-headers |
CVE-2024-36962 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36962
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-03 08:15 修改: 2025-10-01 14:36
|
| kernel-headers |
CVE-2024-38384 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-cgroup: fix list corruption from reorder of WRITE ->lqueued
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38384
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-24 14:15 修改: 2025-03-24 17:29
|
| kernel-headers |
CVE-2024-38388 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38388
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-21 11:15 修改: 2025-04-01 18:28
|
| kernel-headers |
CVE-2024-38566 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix verifier assumptions about socket->sk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38566
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-09-17 21:04
|
| kernel-headers |
CVE-2024-38573 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cppc_cpufreq: Fix possible null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38573
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-04-01 18:24
|
| kernel-headers |
CVE-2024-38588 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix possible use-after-free issue in ftrace_location()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38588
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-12-23 15:03
|
| kernel-headers |
CVE-2024-38594 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: stmmac: move the EST lock to struct stmmac_priv
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38594
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-10-31 16:29
|
| kernel-headers |
CVE-2024-38600 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: Fix deadlocks with kctl removals at disconnection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38600
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2024-11-21 09:26
|
| kernel-headers |
CVE-2024-38605 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: core: Fix NULL module pointer assignment at card init
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38605
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-04-01 18:26
|
| kernel-headers |
CVE-2024-38607 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: macintosh/via-macii: Fix "BUG: sleeping function called from invalid context"
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38607
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-19 14:15 修改: 2025-10-03 15:24
|
| kernel-headers |
CVE-2024-38627 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: stm class: Fix a double free in stm_register_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38627
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-21 11:15 修改: 2025-11-04 18:16
|
| kernel-headers |
CVE-2024-39291 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39291
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-24 14:15 修改: 2025-05-30 19:31
|
| kernel-headers |
CVE-2024-39468 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix deadlock in smb2_find_smb_tcon()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39468
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-06-25 15:15 修改: 2024-11-21 09:27
|
| kernel-headers |
CVE-2024-39473 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39473
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-05 07:15 修改: 2024-11-21 09:27
|
| kernel-headers |
CVE-2024-39480 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kdb: Fix buffer overflow during tab-complete
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39480
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-05 07:15 修改: 2024-11-21 09:27
|
| kernel-headers |
CVE-2024-39483 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39483
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-05 07:15 修改: 2024-11-21 09:27
|
| kernel-headers |
CVE-2024-39498 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39498
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2024-11-21 09:27
|
| kernel-headers |
CVE-2024-39509 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: core: remove unnecessary WARN_ON() in implement()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39509
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40908 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Set run context for rawtp test_run callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40908
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40964 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40964
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2024-11-21 09:31
|
| kernel-headers |
CVE-2024-40992 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix responder length checking for UD request packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40992
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-10-07 20:07
|
| kernel-headers |
CVE-2024-40994 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ptp: fix integer overflow in max_vclocks_store
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40994
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-40997 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40997
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2024-11-21 09:32
|
| kernel-headers |
CVE-2024-40999 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ena: Add validation for completion descriptors consistency
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40999
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-10-07 20:07
|
| kernel-headers |
CVE-2024-41000 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block/ioctl: prefer different overflow check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41000
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2026-01-14 16:22
|
| kernel-headers |
CVE-2024-41001 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/sqpoll: work around a potential audit memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41001
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41003 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix reg_set_min_max corruption of fake_reg
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41003
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-09-25 19:39
|
| kernel-headers |
CVE-2024-41004 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Build event generation tests only as modules
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41004
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41012 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: filelock: Remove locks reliably when fcntl/close race is detected
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-23 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41047 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i40e: Fix XDP program unloading while removing the driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41047
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41063 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41063
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41066 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ibmvnic: Add tx check to prevent skb leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41066
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41068 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/sclp: Fix sclp_init() cleanup on failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41068
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2026-01-05 11:16
|
| kernel-headers |
CVE-2024-41072 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41072
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-41084 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/region: Avoid null pointer dereference in region lookup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41084
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2024-11-21 09:32
|
| kernel-headers |
CVE-2024-41085 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41085
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2024-11-21 09:32
|
| kernel-headers |
CVE-2024-41094 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/fbdev-dma: Only set smem_start is enable per module option
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41094
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2024-11-21 09:32
|
| kernel-headers |
CVE-2024-41098 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ata: libata-core: Fix null pointer dereference on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41098
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42063 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42063
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42067 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42067
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-01-24 16:15
|
| kernel-headers |
CVE-2024-42068 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42068
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42071 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ionic: use dev_consume_skb_any outside of napi
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42071
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2024-11-21 09:33
|
| kernel-headers |
CVE-2024-42073 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42073
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42078 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: initialise nfsd_info.mutex early.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2024-11-21 09:33
|
| kernel-headers |
CVE-2024-42080 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/restrack: Fix potential invalid address access
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42080
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42085 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42085
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 17:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42097 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: emux: improve patch ioctl data validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 18:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42098 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: ecdh - explicitly zeroize private_key
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42098
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-29 18:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42109 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nf_tables: unconditionally flush pending work before notifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42109
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42126 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42126
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42129 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: leds: mlxreg: Use devm_mutex_init() for mutex initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42129
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-42136 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cdrom: rearrange last_media_change check to avoid unintentional overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42136
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42138 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42138
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42151 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2024-12-09 23:09
|
| kernel-headers |
CVE-2024-42230 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries: Fix scv instruction crash with kexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42230
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-07-30 08:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42237 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: cs_dsp: Validate payload length before processing block
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42237
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42243 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42243
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2024-08-08 14:53
|
| kernel-headers |
CVE-2024-42244 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: serial: mos7840: fix crash on resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42244
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-07 16:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42253 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42253
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-08 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42258 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42258
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-12 15:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-42287 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Complete command early within lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42287
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 09:15 修改: 2025-11-03 22:17
|
| kernel-headers |
CVE-2024-43098 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43098
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-43817 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: missing check virtio
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43817
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43840 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-17 10:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-43863 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Fix a deadlock in dma buf fence polling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43863
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-21 00:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43890 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix overflow in get_free_elt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43890
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43893 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: core: check uartclk for zero to avoid divide by zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43893
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-43894 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/client: fix null pointer dereference in drm_client_modeset_probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43894
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 11:15 修改: 2025-11-03 22:18
|
| kernel-headers |
CVE-2024-44947 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fuse: Initialize beyond-EOF page contents before setting uptodate
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44947
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-02 18:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45012 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nouveau/firmware: use dma non-coherent allocator
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:35
|
| kernel-headers |
CVE-2024-45017 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix IPsec RoCE MPV trace call
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45017
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:36
|
| kernel-headers |
CVE-2024-45019 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Take state lock during tx timeout reporter
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45019
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-45027 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: xhci: Check for xhci->interrupters being allocated in xhci_mem_clearup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45027
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-05-09 08:15
|
| kernel-headers |
CVE-2024-45029 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i2c: tegra: Do not mark ACPI devices as irq safe
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45029
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46672 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46672
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-11 16:15 修改: 2024-09-13 16:29
|
| kernel-headers |
CVE-2024-46681 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pktgen: use cpus_read_lock() in pg_net_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46681
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2024-09-19 18:10
|
| kernel-headers |
CVE-2024-46692 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: qcom: scm: Mark get_wq_ctx() as atomic call
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46692
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:52
|
| kernel-headers |
CVE-2024-46698 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: video/aperture: optionally match the device in sysfb_disable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46698
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 06:15 修改: 2024-09-13 16:53
|
| kernel-headers |
CVE-2024-46706 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tty: serial: fsl_lpuart: mark last busy before uart_add_one_port
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46706
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 07:15 修改: 2024-09-19 17:51
|
| kernel-headers |
CVE-2024-46707 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46707
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46709 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Fix prime with external buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46709
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 07:15 修改: 2024-09-19 13:26
|
| kernel-headers |
CVE-2024-46710 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/vmwgfx: Prevent unmapping active read buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46710
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-13 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46720 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: fix dereference after null check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46720
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 07:15 修改: 2025-11-03 23:15
|
| kernel-headers |
CVE-2024-46765 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: protect XDP configuration with a mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46765
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-09-26 13:24
|
| kernel-headers |
CVE-2024-46774 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46774
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-46784 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46784
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46788 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/osnoise: Use a cpumask to know what threads are kthreads
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46788
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-11-22 16:59
|
| kernel-headers |
CVE-2024-46794 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/tdx: Fix data leak in mmio_read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46794
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-46797 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/qspinlock: Fix deadlock in MCS queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46797
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-18 08:15 修改: 2024-09-29 15:15
|
| kernel-headers |
CVE-2024-46820 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46820
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:34
|
| kernel-headers |
CVE-2024-46823 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kunit/overflow: Fix UB in overflow_allocation_test
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46823
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2026-01-05 11:17
|
| kernel-headers |
CVE-2024-46825 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46825
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:24
|
| kernel-headers |
CVE-2024-46845 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/timerlat: Only clear timer if a kthread exists
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46845
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:18
|
| kernel-headers |
CVE-2024-46860 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46860
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-02 14:04
|
| kernel-headers |
CVE-2024-46861 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usbnet: ipheth: do not stop RX on failing RX callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:36
|
| kernel-headers |
CVE-2024-46862 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: soc-acpi-intel-mtl-match: add missing empty item
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46862
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:34
|
| kernel-headers |
CVE-2024-46864 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/hyperv: fix kexec crash due to VP assist page corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46864
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-09-27 13:15 修改: 2024-10-03 15:29
|
| kernel-headers |
CVE-2024-47143 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dma-debug: fix a possible deadlock on radix_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47143
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-47671 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: usbtmc: prevent kernel-usb-infoleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47671
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-09 15:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47674 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: avoid leaving partial pfn mappings around in error case
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47674
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-15 11:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47702 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fail verification for sign-extension of packet data/data_end/data_meta
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47702
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2024-10-24 13:30
|
| kernel-headers |
CVE-2024-47715 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: mt7915: fix oops on non-dbdc mt7986
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47715
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 12:15 修改: 2024-10-24 14:35
|
| kernel-headers |
CVE-2024-47728 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47734 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47734
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-47794 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Prevent tailcall infinite loop caused by freplace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47794
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-09-23 16:20
|
| kernel-headers |
CVE-2024-47809 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dlm: fix possible lkb_resource null dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47809
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-49861 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix helper writes to read-only maps
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49861
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 13:15 修改: 2025-11-03 21:16
|
| kernel-headers |
CVE-2024-49866 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/timerlat: Fix a race during cpuhp processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49875 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfsd: map the EBADMSG to nfserr_io to avoid warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49875
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-49977 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: stmmac: Fix zero-division error when disabling tc cbs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49977
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50001 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Fix error path in multi-packet WQE transmit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50001
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50044 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50044
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-21 20:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50082 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-10-29 01:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50093 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: thermal: intel: int340x: processor: Fix warning during module unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50093
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 17:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50101 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50101
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50107 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50107
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-10-01 21:15
|
| kernel-headers |
CVE-2024-50120 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: Handle kstrdup failures for passwords
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50120
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2024-11-08 18:04
|
| kernel-headers |
CVE-2024-50130 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: bpf: must hold reference on net namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50130
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-03-06 17:15
|
| kernel-headers |
CVE-2024-50138 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Use raw_spinlock_t in ringbuf
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50138
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-05 18:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50163 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Make sure internal and UAPI bpf_redirect flags don't overlap
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50163
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-07 10:15 修改: 2025-11-03 23:16
|
| kernel-headers |
CVE-2024-50194 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: probes: Fix uprobes for big-endian kernels
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50194
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50201 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: Fix encoder->possible_clones
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50201
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50211 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udf: refactor inode_bmap() to handle error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50211
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-08 06:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-50252 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50252
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-09 11:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-50280 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm cache: fix flushing uninitialized delayed_work on cache_ctr error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50280
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 02:16 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53047 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: init: protect sched with rcu_read_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53047
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53051 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53051
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53064 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: fix idpf_vc_core_init error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53064
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53072 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86/amd/pmc: Detect when STB is not available
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53072
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-19 18:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53094 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53094
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-21 19:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53097 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: krealloc: Fix MTE false alarm in __do_krealloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-11-25 22:15 修改: 2025-11-03 23:17
|
| kernel-headers |
CVE-2024-53125 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: sync_linked_regs() must preserve subreg_def
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53125
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-04 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53151 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: svcrdma: Address an integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-24 12:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53157 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53157
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-24 12:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53161 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: EDAC/bluefield: Fix potential integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53161
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-24 12:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53172 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ubi: fastmap: Fix duplicate slab cache names while attaching
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53172
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53175 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipc: fix memleak if msg_init_ns failed in create_ipc_ns
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53175
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53180 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: pcm: Add sanity NULL check for the default mmap fault handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53180
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53189 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53189
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-08 14:06
|
| kernel-headers |
CVE-2024-53198 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xen: Fix the issue of resource not being properly released in xenbus_dev_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53202 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware_loader: Fix possible resource leak in fw_log_firmware_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53202
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-53210 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53210
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53214 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfio/pci: Properly hide first-in-list PCIe extended capability
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53214
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53215 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53215
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53217 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: NFSD: Prevent NULL dereference in nfsd4_process_cb_update()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53217
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53225 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53225
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-53230 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53230
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53231 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53231
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-53238 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btmtk: adjust the position to init iso data anchor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53238
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-53685 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: give up on paths longer than PATH_MAX
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53685
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-55881 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Play nice with protected guests in complete_hypercall_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-55881
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56372 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tun: fix tun_napi_alloc_frags()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56372
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-09-23 14:48
|
| kernel-headers |
CVE-2024-56531 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56532 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: us122l: Use snd_card_free_when_closed() at disconnection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56532
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56533 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usx2y: Use snd_card_free_when_closed() at disconnection
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56533
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56545 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: hyperv: streamline driver probe to avoid devres issues
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56545
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-10-08 13:48
|
| kernel-headers |
CVE-2024-56549 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cachefiles: Fix NULL pointer dereference in object->file
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56549
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 14:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-56568 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/arm-smmu: Defer probe of clients after smmu device bound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56568
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56583 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/deadline: Fix warning in migrate_enable for boosted tasks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56583
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-07 17:24
|
| kernel-headers |
CVE-2024-56584 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/tctx: work around xa_store() allocation error issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56584
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:17
|
| kernel-headers |
CVE-2024-56587 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: leds: class: Protect brightness_show() with led_cdev->led_access mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56587
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56588 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: hisi_sas: Create all dump files during debugfs initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56588
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-01-09 16:16
|
| kernel-headers |
CVE-2024-56592 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Call free_htab_elem() after htab_unlock_bucket()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56592
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-08 13:38
|
| kernel-headers |
CVE-2024-56593 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56593
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56594 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/amdgpu: set the right AMDGPU sg segment limitation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56594
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56613 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/numa: fix memory leak due to the overwritten vma->numab_state
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56613
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56617 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56617
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56624 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd: Fix out_fput in iommufd_fault_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56624
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-09-26 16:05
|
| kernel-headers |
CVE-2024-56625 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: can: dev: can_set_termination(): allow sleeping GPIOs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56625
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56629 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: wacom: fix when get product name maybe null pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56629
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56632 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-tcp: fix the memleak while create new ctrl failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56632
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56641 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: initialize close_work early to avoid warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56641
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-06 17:38
|
| kernel-headers |
CVE-2024-56657 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: control: Avoid WARN() for symlink errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56657
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56659 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: lapb: increase LAPB_HEADER_LEN
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56659
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56668 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Fix qi_batch NULL pointer with nested parent domain
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56668
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56669 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Remove cache tags before disabling ATS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56669
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-27 15:15 修改: 2025-02-11 16:15
|
| kernel-headers |
CVE-2024-56681 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: bcm - add error check in the ahash_hmac_init function
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56681
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56696 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: core: Fix possible NULL dereference caused by kunit_kzalloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56696
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56698 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: gadget: Fix looping of queued SG entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56698
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56701 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56701
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56702 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Mark raw_tp arguments with PTR_MAYBE_NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56702
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56707 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56707
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56708 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: EDAC/igen6: Avoid segmentation fault on module unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56708
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-28 10:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56710 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ceph: fix memory leak in ceph_direct_read_write()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56710
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 09:15 修改: 2025-04-17 21:15
|
| kernel-headers |
CVE-2024-56712 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: udmabuf: fix memory leak on last export_udmabuf() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56712
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 09:15 修改: 2025-04-17 21:15
|
| kernel-headers |
CVE-2024-56714 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ionic: no double destroy workqueue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56714
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 09:15 修改: 2025-10-15 17:42
|
| kernel-headers |
CVE-2024-56715 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ionic: Fix netdev notifier unregister on failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56715
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 09:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56720 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf, sockmap: Several fixes to bpf_msg_pop_data
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56720
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56728 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56742 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfio/mlx5: Fix an unwind issue in mlx5vf_add_migration_pages()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56742
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-04-17 21:15
|
| kernel-headers |
CVE-2024-56745 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Fix reset_method_store() memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56745
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56747 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56747
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56748 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56748
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56752 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/nouveau/gr/gf100: Fix missing unlock in gf100_gr_chan_new()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56756 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-pci: fix freeing of the HMB descriptor table
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56756
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-12-29 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-56773 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: kunit: Fix potential null dereference in kunit_device_driver_test()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56773
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-08 18:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56782 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56782
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-08 18:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-56787 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: soc: imx8m: Probe the SoC driver as platform driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56787
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-08 18:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57804 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57804
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-10-17 15:08
|
| kernel-headers |
CVE-2024-57807 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: megaraid_sas: Fix for a potential deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57807
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 13:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57838 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/entry: Mark IRQ entries to fix stack depot warnings
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57838
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 14:15 修改: 2026-01-05 11:17
|
| kernel-headers |
CVE-2024-57874 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57874
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 15:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57878 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57878
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-11 15:15 修改: 2025-10-01 20:17
|
| kernel-headers |
CVE-2024-57883 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: hugetlb: independent PMD page table shared count
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57883
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-15 13:15 修改: 2025-11-03 18:15
|
| kernel-headers |
CVE-2024-57914 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tcpci: fix NULL pointer issue on shared irq case
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57914
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 12:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-57917 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: topology: Keep the cpumask unchanged when printing cpumap
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57917
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 12:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2024-57933 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gve: guard XSK operations on the existence of queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57933
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 12:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-57936 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Fix max SGEs for the Work Request
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57936
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-21 12:15 修改: 2025-10-15 13:50
|
| kernel-headers |
CVE-2024-57952 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Revert "libfs: fix infinite directory reads for offset dir"
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57952
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-12 14:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-57973 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rdma/cxgb4: Prevent potential integer overflow on 32bit
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57973
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-57993 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57993
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:16
|
| kernel-headers |
CVE-2024-57994 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57994
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-23 17:53
|
| kernel-headers |
CVE-2024-57999 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57999
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-23 17:49
|
| kernel-headers |
CVE-2024-58012 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58012
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2024-58068 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58068
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58070 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58070
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-58074 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/i915: Grab intel_display from the encoder to avoid potential oopsies
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58074
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-31 18:56
|
| kernel-headers |
CVE-2024-58077 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58077
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58078 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: misc: misc_minor_alloc to use ida for all dynamic/misc dynamic minors
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-10-31 16:31
|
| kernel-headers |
CVE-2024-58079 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: media: uvcvideo: Fix crash during unbind if gpio unit is in use
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58079
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2024-58084 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: firmware: qcom: scm: Fix missing read barrier in qcom_scm_get_tzmem_pool()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58084
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2024-58090 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sched/core: Prevent rescheduling when interrupts are disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58090
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21632 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/fpu: Ensure shadow stack is active before "getting" registers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21632
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-09-24 16:36
|
| kernel-headers |
CVE-2025-21634 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cgroup/cpuset: remove kernfs active break
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21634
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21636 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21636
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2025-21637 |
低危 |
5.14.0-611.24.1.el9_7 |
|
In the Linux kernel, the following vulnerability has been resolved: s ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21637
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2025-21638 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: sysctl: auth_enable: avoid using current->nsproxy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21638
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2025-21639 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: sysctl: rto_min/max: avoid using current->nsproxy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21639
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 21:18
|
| kernel-headers |
CVE-2025-21640 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21640
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21644 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Fix tlb invalidation when wedging
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21644
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21645 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21645
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21651 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns3: don't auto enable misc vector
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21651
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-19 11:15 修改: 2025-10-16 19:22
|
| kernel-headers |
CVE-2025-21690 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21690
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 16:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21694 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/proc: fix softlockup in __read_vmcore (part 2)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21694
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-12 14:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21701 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: avoid race between device unregistration and ethnl ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21701
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-13 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21705 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: handle fastopen disconnect correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21705
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21708 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: rtl8150: enable basic endpoint checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21708
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21712 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/md-bitmap: Synchronize bitmap_get_stats() with bitmap lifetime
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21712
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21713 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/pseries/iommu: Don't unset window if it was never set
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21713
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21716 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vxlan: Fix uninit-value in vxlan_vnifilter_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21716
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21719 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipmr: do not call mr_mfc_uses_dev() for unres entries
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21719
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21723 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: mpi3mr: Fix possible crash when setting up bsg fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21723
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 02:15 修改: 2025-10-01 21:16
|
| kernel-headers |
CVE-2025-21744 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21744
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21750 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: brcmfmac: Check the return value of of_property_read_string_index()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21750
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21766 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipv4: use RCU protection in __ip_rt_update_pmtu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21766
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21770 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu: Fix potential memory leak in iopf_queue_remove_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21770
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21776 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: USB: hub: Ignore non-compliant devices with too many configs or interfaces
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21776
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21779 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21779
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21783 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpiolib: Fix crash on error in gpiochip_get_ngpios()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21783
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 03:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21806 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: let net.core.dev_weight always be non-zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21806
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21807 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix queue freeze vs limits lock order in sysfs store methods
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21807
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-10-28 02:57
|
| kernel-headers |
CVE-2025-21810 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: driver core: class: Fix wild pointer dereferences in API class_dev_iter_next()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21810
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-27 20:16 修改: 2025-10-28 02:55
|
| kernel-headers |
CVE-2025-21825 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21825
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-30 18:49
|
| kernel-headers |
CVE-2025-21827 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: mediatek: Add locks for usb_driver_claim_interface()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21827
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 16:15 修改: 2025-10-31 16:18
|
| kernel-headers |
CVE-2025-21829 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21829
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21830 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: landlock: Handle weird files
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21830
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21831 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21831
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-10-29 20:58
|
| kernel-headers |
CVE-2025-21832 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: don't revert iter for -EIOCBQUEUED
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21832
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-11-03 21:19
|
| kernel-headers |
CVE-2025-21833 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21833
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-06 17:15 修改: 2025-11-02 14:15
|
| kernel-headers |
CVE-2025-21847 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21847
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21851 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix softlockup in arena_map_free on 64k page kernel
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21851
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21866 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21866
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-12 10:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21869 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/code-patching: Disable KASAN report during patching via temporary mm
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21869
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 14:15 修改: 2025-10-29 21:08
|
| kernel-headers |
CVE-2025-21872 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: efi: Don't map the entire mokvar table to determine its size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21872
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21875 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: always handle address removal under msk socket lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21875
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21876 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/vt-d: Fix suspicious RCU usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21876
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-30 16:00
|
| kernel-headers |
CVE-2025-21877 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usbnet: gl620a: fix endpoint checking in genelink_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21877
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21880 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/userptr: fix EFAULT handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21880
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-30 15:44
|
| kernel-headers |
CVE-2025-21881 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: uprobes: Reject the shared zeropage in uprobe_write_opcode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21881
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21884 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: better track kernel sockets lifetime
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21884
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:49
|
| kernel-headers |
CVE-2025-21886 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/mlx5: Fix implicit ODP hang on parent deregistration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21886
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:53
|
| kernel-headers |
CVE-2025-21889 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/core: Add RCU read lock protection to perf_iterate_ctx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21889
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:55
|
| kernel-headers |
CVE-2025-21890 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: fix checksums set in idpf_rx_rsc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21890
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:51
|
| kernel-headers |
CVE-2025-21891 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipvlan: ensure network headers are in skb linear part
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21891
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21895 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21895
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-31 18:50
|
| kernel-headers |
CVE-2025-21898 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Avoid potential division by zero in function_stat_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21898
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21901 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/bnxt_re: Add sanity checks on rdev validity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21901
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21906 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: clean up ROC on failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21906
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-31 17:57
|
| kernel-headers |
CVE-2025-21907 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm: memory-failure: update ttu flag inside unmap_poisoned_folio
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21907
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-31 17:59
|
| kernel-headers |
CVE-2025-21909 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: nl80211: reject cooked mode if it is set along with other flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21909
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21910 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: regulatory: improve invalid hints checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21910
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21916 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: atm: cxacru: fix a flaw in existing endpoint checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21916
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21918 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: ucsi: Fix NULL pointer access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21918
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21921 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: ethtool: netlink: Allow NULL nlattrs when getting a phy_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21921
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-31 18:08
|
| kernel-headers |
CVE-2025-21922 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ppp: Fix KMSAN uninit-value warning with bpf
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21922
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21924 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21924
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21930 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: mvm: don't try to talk to a dead firmware
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21930
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-01 20:18
|
| kernel-headers |
CVE-2025-21937 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21937
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21953 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: mana: cleanup mana struct after debugfs_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21953
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-01 18:15
|
| kernel-headers |
CVE-2025-21970 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5: Bridge, fix the crash caused by LAG state check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21970
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21976 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fbdev: hyperv_fb: Allow graceful removal of framebuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21976
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-10-30 21:00
|
| kernel-headers |
CVE-2025-21978 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21978
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21981 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix memory leak in aRFS after reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21981
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21986 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: switchdev: Convert blocking notification chain to a raw one
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21986
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-21992 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: HID: ignore non-functional sensor in HP 5MP Camera
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21992
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-02 13:15 修改: 2026-01-02 16:15
|
| kernel-headers |
CVE-2025-21995 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/sched: Fix fence reference count leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21995
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-03 08:15 修改: 2025-10-01 19:15
|
| kernel-headers |
CVE-2025-21996 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21996
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22008 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: check that dummy regulator has been probed before using it
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22008
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-08 09:15 修改: 2026-01-02 16:15
|
| kernel-headers |
CVE-2025-22009 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: dummy: force synchronous probing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22009
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-08 09:15 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2025-22031 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/bwctrl: Fix NULL pointer dereference on bus number exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22031
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2025-22045 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| kernel-headers |
CVE-2025-22105 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bonding: check xdp prog when set bond mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22105
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-22117 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22117
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:35
|
| kernel-headers |
CVE-2025-22128 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22128
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:25
|
| kernel-headers |
CVE-2025-23144 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23144
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-06 17:39
|
| kernel-headers |
CVE-2025-23147 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: i3c: Add NULL pointer check in i3c_master_queue_ibi()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23147
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 18:04
|
| kernel-headers |
CVE-2025-23149 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tpm: do not start chip while suspended
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23149
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-06 16:28
|
| kernel-headers |
CVE-2025-23151 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bus: mhi: host: Fix race between unprepare and queue_buf
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 17:58
|
| kernel-headers |
CVE-2025-23154 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/net: fix io_req_post_cqe abuse by send bundle
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23154
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 15:26
|
| kernel-headers |
CVE-2025-23162 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/vf: Don't try to trigger a full GT reset if VF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23162
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 15:32
|
| kernel-headers |
CVE-2025-37743 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: Avoid memory leak while enabling statistics
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37743
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 16:05
|
| kernel-headers |
CVE-2025-37744 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath12k: fix memory leak in ath12k_pci_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37744
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-05 16:05
|
| kernel-headers |
CVE-2025-37756 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: tls: explicitly disallow disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37756
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 13:15 修改: 2025-11-04 18:01
|
| kernel-headers |
CVE-2025-37788 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37788
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-11-06 17:23
|
| kernel-headers |
CVE-2025-37792 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btrtl: Prevent potential NULL dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37792
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-11-04 18:21
|
| kernel-headers |
CVE-2025-37793 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37793
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-10-31 20:05
|
| kernel-headers |
CVE-2025-37794 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: Purge vif txq in ieee80211_do_stop()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37794
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-01 14:15 修改: 2025-11-03 20:18
|
| kernel-headers |
CVE-2025-37801 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: spi-imx: Add check for spi_imx_setupxfer()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37801
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-03 20:18
|
| kernel-headers |
CVE-2025-37805 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sound/virtio: Fix cancel_sync warnings on uninitialized work_structs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37805
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-08 07:15 修改: 2025-11-03 20:18
|
| kernel-headers |
CVE-2025-37837 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/tegra241-cmdqv: Fix warnings due to dmam_free_coherent()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37837
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-09 07:16 修改: 2025-11-14 20:00
|
| kernel-headers |
CVE-2025-37895 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix error handling path in bnxt_init_chip()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37895
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-18 13:42
|
| kernel-headers |
CVE-2025-37907 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: accel/ivpu: Fix locking order in ivpu_job_submit
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37907
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-17 15:02
|
| kernel-headers |
CVE-2025-37911 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bnxt_en: Fix out-of-bound memcpy() during ethtool -w
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37911
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-17 14:50
|
| kernel-headers |
CVE-2025-37920 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: Fix race condition in AF_XDP generic RX path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37920
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-10 21:11
|
| kernel-headers |
CVE-2025-37928 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: dm-bufio: don't schedule in atomic context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37928
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-10 20:32
|
| kernel-headers |
CVE-2025-37932 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sch_htb: make htb_qlen_notify() idempotent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37932
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-19 17:34
|
| kernel-headers |
CVE-2025-37936 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37936
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-19 17:35
|
| kernel-headers |
CVE-2025-37938 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Verify event formats that have "%*p.."
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37938
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-12-19 17:44
|
| kernel-headers |
CVE-2025-37945 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37945
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 16:15 修改: 2025-11-17 12:57
|
| kernel-headers |
CVE-2025-37980 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix resource leak in blk_register_queue() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37980
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 17:15 修改: 2025-11-14 17:00
|
| kernel-headers |
CVE-2025-37981 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: smartpqi: Use is_kdump_kernel() to check for kdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37981
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 17:15 修改: 2025-11-14 17:00
|
| kernel-headers |
CVE-2025-37984 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37984
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-05-20 18:15 修改: 2025-11-14 17:00
|
| kernel-headers |
CVE-2025-38009 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mt76: disable napi on driver removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38009
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:55
|
| kernel-headers |
CVE-2025-38010 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-17 12:56
|
| kernel-headers |
CVE-2025-38016 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory corruption via unplugging HID devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38016
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 19:01
|
| kernel-headers |
CVE-2025-38020 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Disable MACsec offload for uplink representor profile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38020
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-17 19:48
|
| kernel-headers |
CVE-2025-38037 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vxlan: Annotate FDB data races
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38037
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-12-18 21:36
|
| kernel-headers |
CVE-2025-38039 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38039
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:08
|
| kernel-headers |
CVE-2025-38045 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: iwlwifi: fix debug actions order
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38045
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:07
|
| kernel-headers |
CVE-2025-38049 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/resctrl: Fix allocation of cleanest CLOSID on platforms with no monitors
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38049
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 07:15 修改: 2025-10-01 17:15
|
| kernel-headers |
CVE-2025-38096 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux Kernel: Denial of Service in iwlwifi due to improper firmware error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38096
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:53
|
| kernel-headers |
CVE-2025-38097 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: espintcp: remove encap socket caching to avoid reference leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38097
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-16 17:16
|
| kernel-headers |
CVE-2025-38148 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: phy: mscc: Fix memory leak when using one step timestamping
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38148
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 21:06
|
| kernel-headers |
CVE-2025-38168 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Local denial of service in arm-ni due to improper PMU unregistration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38168
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-11-20 19:29
|
| kernel-headers |
CVE-2025-38170 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arm64/fpsimd: Discard stale CPU state when handling SME traps
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38170
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-03 09:15 修改: 2025-12-18 20:53
|
| kernel-headers |
CVE-2025-38193 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net_sched: sch_sfq: reject invalid perturb period
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38193
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:25
|
| kernel-headers |
CVE-2025-38202 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38202
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:23
|
| kernel-headers |
CVE-2025-38239 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: megaraid_sas: Fix invalid node index
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38239
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-09 11:15 修改: 2025-12-18 17:15
|
| kernel-headers |
CVE-2025-38268 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: typec: tcpm: move tcpm_queue_vdm_unlocked to asynchronous work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38268
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-20 16:39
|
| kernel-headers |
CVE-2025-38278 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: octeontx2-pf: QOS: Refactor TC_HTB_LEAF_DEL_LAST callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38278
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-11-19 22:03
|
| kernel-headers |
CVE-2025-38279 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Do not include stack ptr register in precision backtracking bookkeeping
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38279
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 08:15 修改: 2025-07-10 15:15
|
| kernel-headers |
CVE-2025-38345 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPICA: fix acpi operand cache leak in dswstate.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38345
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-10 09:15 修改: 2025-12-16 17:46
|
| kernel-headers |
CVE-2025-38385 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38385
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-16 20:12
|
| kernel-headers |
CVE-2025-38400 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38400
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-12-23 19:23
|
| kernel-headers |
CVE-2025-38402 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: idpf: return 0 size for RSS key if not supported
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38402
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 13:15 修改: 2025-11-19 18:18
|
| kernel-headers |
CVE-2025-38405 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvmet: fix memory leak of bio integrity
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38405
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 14:15 修改: 2025-11-19 18:18
|
| kernel-headers |
CVE-2025-38460 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: atm: clip: Fix potential null-ptr-deref in to_atmarpd().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38460
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-25 16:15 修改: 2025-12-22 21:50
|
| kernel-headers |
CVE-2025-38489 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38489
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-07-28 12:15 修改: 2025-11-19 17:45
|
| kernel-headers |
CVE-2025-38502 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix oob access in cgroup local storage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38502
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 10:15 修改: 2026-01-07 16:32
|
| kernel-headers |
CVE-2025-38505 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mwifiex: discard erroneous disassoc frames on STA interface
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38505
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 11:15 修改: 2025-11-19 17:21
|
| kernel-headers |
CVE-2025-38521 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/imagination: Fix kernel crash when hard resetting the GPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38521
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 11:15 修改: 2025-08-18 20:16
|
| kernel-headers |
CVE-2025-38528 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in BPF due to format string vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38528
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2026-01-07 19:21
|
| kernel-headers |
CVE-2025-38535 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38535
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2026-01-07 18:56
|
| kernel-headers |
CVE-2025-38546 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Memory leak in ATM clip module can lead to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38546
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-16 12:15 修改: 2026-01-07 18:33
|
| kernel-headers |
CVE-2025-38563 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in perf subsystem due to VMA split
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38563
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-08 21:03
|
| kernel-headers |
CVE-2025-38565 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/core: Exit early on perf_mmap() fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38565
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-08 21:07
|
| kernel-headers |
CVE-2025-38576 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/eeh: Make EEH driver device hotplug safe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38576
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-09 14:15
|
| kernel-headers |
CVE-2025-38581 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: ccp - Fix crash when rebind ccp device for ccp.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38581
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-09 13:55
|
| kernel-headers |
CVE-2025-38586 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in ARM64 BPF JIT due to improper frame pointer initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38586
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-26 17:58
|
| kernel-headers |
CVE-2025-38591 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in BPF due to improper context access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38591
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2025-11-26 17:58
|
| kernel-headers |
CVE-2025-38608 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel kTLS: Denial of Service from uninitialized data transmission
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38608
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-19 17:15 修改: 2026-01-07 18:33
|
| kernel-headers |
CVE-2025-38621 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: make rdev_addable usable for rcu mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38621
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 17:46
|
| kernel-headers |
CVE-2025-38623 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: pnv_php: Fix surprise plug detection and recovery
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38623
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 16:38
|
| kernel-headers |
CVE-2025-38624 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI: pnv_php: Clean up allocated IRQs on unplug
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38624
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-07 16:37
|
| kernel-headers |
CVE-2025-38636 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: rv: Use strings in da monitors tracepoints
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38636
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 17:12
|
| kernel-headers |
CVE-2025-38640 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in BPF netfilter due to improper migration handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38640
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-11-26 16:36
|
| kernel-headers |
CVE-2025-38643 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38643
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2025-12-01 19:14
|
| kernel-headers |
CVE-2025-38671 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (i2c: qup): Denial of Service via improper I2C client timeout handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38671
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-08-22 16:15 修改: 2026-01-08 22:30
|
| kernel-headers |
CVE-2025-38721 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: ctnetlink: fix refcount leak on table dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38721
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-09 15:57
|
| kernel-headers |
CVE-2025-38728 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb3: fix for slab out of bounds on mount to ksmbd
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38728
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-04 16:15 修改: 2026-01-08 17:31
|
| kernel-headers |
CVE-2025-38733 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to incorrect lowcore memory mapping
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38733
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2025-11-25 21:59
|
| kernel-headers |
CVE-2025-39676 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla4xxx: Prevent a potential error pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39676
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-07 21:50
|
| kernel-headers |
CVE-2025-39681 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39681
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-08 15:33
|
| kernel-headers |
CVE-2025-39701 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPI: pfr_update: Fix the driver update version check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39701
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-08 16:04
|
| kernel-headers |
CVE-2025-39721 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: qat - flush misc workqueue during device shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39721
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2025-11-25 17:45
|
| kernel-headers |
CVE-2025-39724 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: serial: 8250: fix panic due to PSLVERR
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39724
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-05 18:15 修改: 2026-01-12 15:53
|
| kernel-headers |
CVE-2025-39736 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39736
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-09 14:59
|
| kernel-headers |
CVE-2025-39737 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39737
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-39745 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in rcutorture due to incorrect preempt_count handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39745
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 21:09
|
| kernel-headers |
CVE-2025-39748 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Forget ranges when refining tnum after JSET
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39748
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 21:11
|
| kernel-headers |
CVE-2025-39752 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ARM: rockchip: fix kernel hang during smp initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-09 18:53
|
| kernel-headers |
CVE-2025-39753 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel (gfs2): Denial of Service due to missing migrate_folio implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39753
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-02 16:16
|
| kernel-headers |
CVE-2025-39772 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/hisilicon/hibmc: fix the hibmc loaded failed bug
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39772
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-16 20:11
|
| kernel-headers |
CVE-2025-39776 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/debug_vm_pgtable: clear page table entries at destroy_args()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39776
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2026-01-16 20:12
|
| kernel-headers |
CVE-2025-39784 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: PCI link speed calculation DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39784
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-11 17:15 修改: 2025-11-25 18:49
|
| kernel-headers |
CVE-2025-39795 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: avoid possible overflow for chunk_sectors check in blk_stack_limits()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39795
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-12 16:15 修改: 2026-01-16 20:00
|
| kernel-headers |
CVE-2025-39801 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: dwc3: Remove WARN_ON for device endpoint command timeouts
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39801
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-15 13:15 修改: 2025-11-03 18:16
|
| kernel-headers |
CVE-2025-39811 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/vm: Clear the scratch_pt pointer on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39811
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:15 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39813 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39813
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:08
|
| kernel-headers |
CVE-2025-39829 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: trace/fgraph: Fix the warning caused by missing unregister notifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39829
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 13:16 修改: 2026-01-14 19:16
|
| kernel-headers |
CVE-2025-39835 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xfs: do not propagate ENODATA disk errors into xattr code
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39835
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-16 14:15 修改: 2026-01-16 20:30
|
| kernel-headers |
CVE-2025-39865 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tee: fix NULL pointer dereference in tee_shm_put
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39865
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-19 16:15 修改: 2026-01-20 20:41
|
| kernel-headers |
CVE-2025-39886 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Tell memcg to use allow_spinning=false path in bpf_timer_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39886
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-23 06:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39887 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/osnoise: Fix null-ptr-deref in bitmap_parselist()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39887
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-23 06:15 修改: 2026-01-14 20:16
|
| kernel-headers |
CVE-2025-39913 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39913
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:48
|
| kernel-headers |
CVE-2025-39916 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39916
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:51
|
| kernel-headers |
CVE-2025-39929 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39929
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39937 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39937
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39953 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cgroup: split cgroup_destroy_wq into 3 workqueues
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39953
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| kernel-headers |
CVE-2025-39956 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: igc: don't fail igc_probe() on LED setup error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39956
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-09 10:15 修改: 2025-10-09 15:50
|
| kernel-headers |
CVE-2025-39957 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: increase scan_ies_len for S1G
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39957
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-09 10:15 修改: 2026-01-02 16:16
|
| kernel-headers |
CVE-2025-39958 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu/s390: Make attach succeed when the device was surprise removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39958
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-09 10:15 修改: 2025-10-09 15:50
|
| kernel-headers |
CVE-2025-39959 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: amd: acp: Fix incorrect retrival of acp_chip_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39959
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-09 10:15 修改: 2025-10-09 15:50
|
| kernel-headers |
CVE-2025-39963 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: fix incorrect io_kiocb reference in io_link_skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39963
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-09 13:15 修改: 2025-10-09 15:50
|
| kernel-headers |
CVE-2025-39974 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing/osnoise: Fix slab-out-of-bounds in _parse_integer_limit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39974
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| kernel-headers |
CVE-2025-39990 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Check the helper function is valid in get_helper_proto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39990
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| kernel-headers |
CVE-2025-39991 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39991
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| kernel-headers |
CVE-2025-40010 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: afs: Fix potential null pointer dereference in afs_put_server
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40010
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| kernel-headers |
CVE-2025-40021 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: dynevent: Add a missing lockdown check on dynevent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40021
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-24 13:15 修改: 2025-10-27 13:20
|
| kernel-headers |
CVE-2025-40035 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40035
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40042 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40042
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40049 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Squashfs: fix uninit-value in squashfs_get_parent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40049
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40057 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ptp: Add a upper bound on max_vclocks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40057
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| kernel-headers |
CVE-2025-40086 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40086
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40099 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: parse_dfs_referrals: prevent oob on malformed input
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40099
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40103 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: Fix refcount leak for cifs_sb_tlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40103
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40105 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: vfs: Don't leak disconnected dentries on umount
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40105
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| kernel-headers |
CVE-2025-40123 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Enforce expected_attach_type for tailcall compatibility
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40123
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40125 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40125
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40157 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of service in i10nm_edac driver due to disabled memory controller
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40157
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40159 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: xsk: Harden userspace-supplied xdp_desc validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40159
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40162 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40162
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40164 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usbnet: Fix using smp_processor_id() in preemptible code warnings
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40164
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2026-01-08 10:15
|
| kernel-headers |
CVE-2025-40169 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Reject negative offsets for ALU ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40169
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| kernel-headers |
CVE-2025-40183 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40183
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40198 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40200 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Squashfs: reject negative file sizes in squashfs_read_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40200
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| kernel-headers |
CVE-2025-40219 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40219
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| kernel-headers |
CVE-2025-40253 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/ctcm: Fix double-kfree
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40253
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| kernel-headers |
CVE-2025-40267 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring/rw: ensure allocated iovec gets cleared for early failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40267
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40268 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: client: fix memory leak in smb3_fs_context_parse_param
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40268
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40275 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40275
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| kernel-headers |
CVE-2025-40325 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid10: wait barrier before returning discard request with REQ_NOWAIT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40325
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 07:15 修改: 2026-01-08 10:15
|
| kernel-headers |
CVE-2025-40341 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: futex: Don't leak robust_list pointer on exec race
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40341
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| kernel-headers |
CVE-2025-40346 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40346
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40355 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: sysfs: check visibility before changing group attribute ownership
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40355
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40357 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/smc: fix general protection fault in __smc_diag_dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40357
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40359 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/intel: Fix KASAN global-out-of-bounds warning
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40359
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40360 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel drm/sysfb: Denial of service via NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40360
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-40364 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: io_uring: fix io_req_prep_async with provided buffers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40364
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-18 14:15 修改: 2025-11-17 14:06
|
| kernel-headers |
CVE-2025-68170 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: Do not kfree() devres managed rdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68170
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68171 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: x86/fpu: Ensure XFD state on signal delivery
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68171
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68173 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ftrace: Fix softlockup in ftrace_module_enable
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68173
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68178 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: blk-cgroup: fix possible deadlock while configuring policy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68178
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68181 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/radeon: Remove calls to drm_put_dev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68181
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68183 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68183
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68193 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/guc: Add devm release action to safely tear down CT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68193
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68198 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crash: fix crashkernel resource shrink
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68200 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Add bpf_prog_run_data_pointers()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68200
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68204 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: pmdomain: arm: scmi: Fix genpd leak on provider registration failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68204
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68206 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: netfilter: nft_ct: add seqadj extension for natted connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68206
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2026-01-08 10:15
|
| kernel-headers |
CVE-2025-68207 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/guc: Synchronize Dead CT worker with unbind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68207
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68214 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to NULL function pointer race in timer shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68214
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68218 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nvme-multipath: fix lockdep WARN due to partition scan work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68218
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68219 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cifs: fix memory leak in smb3_fs_context_parse_param error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68219
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68227 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: mptcp: Fix proto fallback detection with BPF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68227
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68228 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/plane: Fix create_in_format_blob() return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68228
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68233 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/tegra: Add call to put_pid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68233
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68264 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: refresh inline data size before write operations
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68264
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68281 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68281
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68288 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: usb: storage: Fix memory leak in USB bulk transport
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68288
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68295 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: smb: client: fix memory leak in cifs_construct_tcon()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68295
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68298 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68298
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68300 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fs/namespace: fix reference leak in grab_requested_mnt_ns
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68300
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68306 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso interface
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68306
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68308 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service in kvaser_usb CAN driver due to infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68308
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68317 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service via improper handling of io_uring notification contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68317
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68321 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel: Denial of Service due to page allocation failures
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68321
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| kernel-headers |
CVE-2025-68326 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/guc: Fix stack_depot usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68326
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| kernel-headers |
CVE-2025-68334 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: platform/x86/amd/pmc: Add support for Van Gogh SoC
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68334
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| kernel-headers |
CVE-2025-68336 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: locking/spinlock/debug: Fix data-race in do_raw_write_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68336
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-22 17:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68337 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68337
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-22 17:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68345 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Linux kernel ALSA: Denial of Service due to NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68345
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68348 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix memory leak in __blkdev_issue_zero_pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68348
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68354 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68354
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68357 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iomap: allocate s_dio_done_wq for async reads as well
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68357
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2026-01-08 10:15
|
| kernel-headers |
CVE-2025-68363 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Check skb->transport_header is set in bpf_skb_check_mtu
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68363
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:15 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68366 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: nbd: defer config unlock in nbd_genl_connect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68366
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68371 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: smartpqi: Fix device resources accessed after device removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68371
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68373 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: avoid repeated calls to del_gendisk
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68373
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68374 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md: fix rcu protection in md_wakeup_thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68374
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68378 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix stackmap overflow check in __bpf_get_stackid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68378
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68724 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68724
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68725 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Do not let BPF test infra emit invalid GSO types to stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68725
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68732 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: gpu: host1x: Fix race in syncpt alloc/free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68732
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68736 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: landlock: Fix handling of disconnected directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68736
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| kernel-headers |
CVE-2025-68740 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ima: Handle error code returned by ima_filter_rule_match()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68740
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68741 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: qla2xxx: Fix improper freeing of purex item
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68741
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68742 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Fix invalid prog->stats access when update_effective_progs fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68742
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68744 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: bpf: Free special fields when update [lru_,]percpu_hash maps
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68744
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2026-01-11 17:15
|
| kernel-headers |
CVE-2025-68746 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: spi: tegra210-quad: Fix timeout handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68746
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-12-24 13:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68751 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: s390/fpu: Fix false-positive kmsan report in fpu_vstl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68751
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-05 10:15 修改: 2026-01-08 18:09
|
| kernel-headers |
CVE-2025-68758 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: backlight: led-bl: Add devlink to supplier LEDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68758
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-05 10:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68775 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net/handshake: duplicate handshake cancellations leak socket
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68775
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68782 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: target: Reset t_task_cdb pointer in error case
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68782
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68783 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ALSA: usb-mixer: us16x08: validate meter packet indices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68783
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68785 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: net: openvswitch: fix middle attribute validation in push_nsh() action
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68785
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68788 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: fsnotify: do not generate ACCESS/MODIFY events on child for special files
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68788
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68789 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (ibmpex) fix use-after-free in high/low store
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68789
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68794 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iomap: adjust read range correctly for non-block-aligned positions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68794
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68795 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ethtool: Avoid overflowing userspace buffer on stats query
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68795
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68798 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: perf/x86/amd: Check event before enable to avoid GPF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68798
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68802 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe: Limit num_syncs to prevent oversized allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68802
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68807 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: block: fix race between wbt_enable_default and IO submission
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68807
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-68813 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ipvs: fix ipv4 null-ptr-deref in route error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68813
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68818 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68818
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68820 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ext4: xattr: fix null pointer deref in ext4_raw_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68820
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-68822 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Input: alps - fix use-after-free bugs caused by dev3_register_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68822
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-71076 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/oa: Limit num_syncs to prevent oversized allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71076
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-71078 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/64s/slb: Fix SLB multihit issue during SLB preload
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71078
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71082 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: Bluetooth: btusb: revert use of devm_kzalloc in btusb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71082
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71089 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommu: disable SVA when CONFIG_X86 is set
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71089
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-71096 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71096
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71099 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71099
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| kernel-headers |
CVE-2025-71111 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71111
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71118 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: ACPICA: Avoid walking the Namespace if start_node is NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71118
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71119 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: powerpc/kexec: Enable SMT before waking offline CPUs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71119
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| kernel-headers |
CVE-2025-71122 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71122
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| kernel-headers |
CVE-2025-71125 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: tracing: Do not register unsupported perf events
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71125
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71127 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: wifi: mac80211: Discard Beacon frames to non-broadcast address
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71127
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71131 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71131
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71133 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: RDMA/irdma: avoid invalid read in irdma_net_event
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71133
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| kernel-headers |
CVE-2025-71135 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71135
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| kernel-headers |
CVE-2025-71142 |
低危 |
5.14.0-611.24.1.el9_7 |
|
kernel: cpuset: fix warning when disabling remote partition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71142
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| elfutils-debuginfod-client |
CVE-2025-1376 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip elf_strptr.c elf_strptr denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1376
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:21
|
| elfutils-debuginfod-client |
CVE-2025-1377 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip strip.c gelf_getsymshndx denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1377
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:26
|
| libarchive |
CVE-2025-1632 |
低危 |
3.5.3-6.el9_6 |
|
libarchive: null pointer dereference in bsdunzip.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1632
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-02-24 14:15 修改: 2025-03-25 15:41
|
| libarchive |
CVE-2025-5915 |
低危 |
3.5.3-6.el9_6 |
|
libarchive: Heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5915
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-06-09 20:15 修改: 2026-01-08 04:15
|
| libarchive |
CVE-2025-5916 |
低危 |
3.5.3-6.el9_6 |
|
libarchive: Integer overflow while reading warc files at archive_read_support_format_warc.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5916
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-06-09 20:15 修改: 2025-12-12 01:15
|
| libarchive |
CVE-2025-5917 |
低危 |
3.5.3-6.el9_6 |
|
libarchive: Off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5917
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-06-09 20:15 修改: 2025-12-12 01:15
|
| libarchive |
CVE-2025-5918 |
低危 |
3.5.3-6.el9_6 |
|
libarchive: Reading past EOF may be triggered for piped file streams
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5918
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-06-09 20:15 修改: 2025-08-15 18:35
|
| elfutils-default-yama-scope |
CVE-2024-25260 |
低危 |
0.193-1.el9 |
|
elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-20 18:15 修改: 2025-04-25 20:42
|
| elfutils-default-yama-scope |
CVE-2025-1371 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1371
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:13
|
| elfutils-default-yama-scope |
CVE-2025-1376 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip elf_strptr.c elf_strptr denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1376
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:21
|
| libcurl-minimal |
CVE-2024-11053 |
低危 |
7.76.1-34.el9 |
|
curl: curl netrc password leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-11053
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-12-11 08:15 修改: 2025-11-03 21:16
|
| libcurl-minimal |
CVE-2024-7264 |
低危 |
7.76.1-34.el9 |
|
curl: libcurl: ASN.1 date parser overread
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7264
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-07-31 08:15 修改: 2025-11-03 23:17
|
| libcurl-minimal |
CVE-2024-9681 |
低危 |
7.76.1-34.el9 |
|
curl: HSTS subdomain overwrites parent cache entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-9681
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-11-06 08:15 修改: 2025-11-03 21:18
|
| elfutils-default-yama-scope |
CVE-2025-1377 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip strip.c gelf_getsymshndx denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1377
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:26
|
| libgcc |
CVE-2022-27943 |
低危 |
11.5.0-11.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2022-03-26 13:15 修改: 2024-11-21 06:56
|
| libgomp |
CVE-2022-27943 |
低危 |
11.5.0-11.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2022-03-26 13:15 修改: 2024-11-21 06:56
|
| elfutils-libelf |
CVE-2024-25260 |
低危 |
0.193-1.el9 |
|
elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-20 18:15 修改: 2025-04-25 20:42
|
| libpkgconf |
CVE-2023-24056 |
低危 |
1.7.3-10.el9 |
|
pkgconf: unbounded string expansion due to incorrect checks may result in buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-01-22 04:15 修改: 2025-04-02 16:15
|
| elfutils-libelf |
CVE-2025-1371 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1371
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:13
|
| libstdc++ |
CVE-2022-27943 |
低危 |
11.5.0-11.el9 |
|
binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-27943
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2022-03-26 13:15 修改: 2024-11-21 06:56
|
| libtasn1 |
CVE-2025-13151 |
低危 |
4.16.0-9.el9 |
|
libtasn1: libtasn1: Denial of Service via stack-based buffer overflow in asn1_expend_octet_string
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13151
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-07 22:15 修改: 2026-01-20 18:16
|
| elfutils-libelf |
CVE-2025-1376 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip elf_strptr.c elf_strptr denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1376
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:21
|
| elfutils-libelf |
CVE-2025-1377 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip strip.c gelf_getsymshndx denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1377
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:26
|
| libxml2 |
CVE-2023-45322 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: use-after-free in xmlUnlinkNode() in tree.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45322
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-10-06 22:15 修改: 2025-11-03 21:16
|
| libxml2 |
CVE-2024-34459 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: buffer over-read in xmlHTMLPrintFileContext in xmllint.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34459
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-05-14 15:39 修改: 2025-11-04 22:16
|
| libxml2 |
CVE-2025-27113 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: NULL Pointer Dereference in libxml2 xmlPatMatch
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-27113
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-02-18 23:15 修改: 2025-11-03 22:18
|
| libxml2 |
CVE-2025-6170 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: Stack Buffer Overflow in xmllint Interactive Shell Command Handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6170
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-06-16 16:15 修改: 2025-11-03 20:19
|
| libxml2 |
CVE-2026-0989 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: Unbounded RelaxNG Include Recursion Leading to Stack Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0989
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-15 15:15 修改: 2026-01-16 15:55
|
| libxml2 |
CVE-2026-0992 |
低危 |
2.9.13-14.el9_7 |
|
libxml2: libxml2: Denial of Service via crafted XML catalogs
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0992
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-15 15:15 修改: 2026-01-16 15:55
|
| ncurses |
CVE-2023-50495 |
低危 |
6.2-12.20210508.el9 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| ncurses-base |
CVE-2023-50495 |
低危 |
6.2-12.20210508.el9 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| ncurses-libs |
CVE-2023-50495 |
低危 |
6.2-12.20210508.el9 |
|
ncurses: segmentation fault via _nc_wrap_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-50495
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-12-12 15:15 修改: 2025-11-04 19:16
|
| nspr |
CVE-2020-12413 |
低危 |
4.36.0-4.el9_4 |
|
nss: Information exposure when DH secret are reused across multiple TLS connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-02-16 22:15 修改: 2025-03-19 16:15
|
| nspr |
CVE-2024-7531 |
低危 |
4.36.0-4.el9_4 |
|
mozilla: nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-06 13:15 修改: 2025-03-19 16:15
|
| nss |
CVE-2020-12413 |
低危 |
3.112.0-4.el9_4 |
|
nss: Information exposure when DH secret are reused across multiple TLS connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-02-16 22:15 修改: 2025-03-19 16:15
|
| nss |
CVE-2024-7531 |
低危 |
3.112.0-4.el9_4 |
|
mozilla: nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-06 13:15 修改: 2025-03-19 16:15
|
| nss-softokn |
CVE-2020-12413 |
低危 |
3.112.0-4.el9_4 |
|
nss: Information exposure when DH secret are reused across multiple TLS connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-02-16 22:15 修改: 2025-03-19 16:15
|
| nss-softokn |
CVE-2024-7531 |
低危 |
3.112.0-4.el9_4 |
|
mozilla: nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-06 13:15 修改: 2025-03-19 16:15
|
| nss-softokn-freebl |
CVE-2020-12413 |
低危 |
3.112.0-4.el9_4 |
|
nss: Information exposure when DH secret are reused across multiple TLS connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-02-16 22:15 修改: 2025-03-19 16:15
|
| nss-softokn-freebl |
CVE-2024-7531 |
低危 |
3.112.0-4.el9_4 |
|
mozilla: nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-06 13:15 修改: 2025-03-19 16:15
|
| nss-sysinit |
CVE-2020-12413 |
低危 |
3.112.0-4.el9_4 |
|
nss: Information exposure when DH secret are reused across multiple TLS connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-02-16 22:15 修改: 2025-03-19 16:15
|
| nss-sysinit |
CVE-2024-7531 |
低危 |
3.112.0-4.el9_4 |
|
mozilla: nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-06 13:15 修改: 2025-03-19 16:15
|
| nss-util |
CVE-2020-12413 |
低危 |
3.112.0-4.el9_4 |
|
nss: Information exposure when DH secret are reused across multiple TLS connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-12413
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-02-16 22:15 修改: 2025-03-19 16:15
|
| nss-util |
CVE-2024-7531 |
低危 |
3.112.0-4.el9_4 |
|
mozilla: nss: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel Sandy Bridge machines
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-7531
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-06 13:15 修改: 2025-03-19 16:15
|
| elfutils-libs |
CVE-2024-25260 |
低危 |
0.193-1.el9 |
|
elfutils: global-buffer-overflow exists in the function ebl_machine_flag_name in eblmachineflagname.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25260
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-02-20 18:15 修改: 2025-04-25 20:42
|
| elfutils-libs |
CVE-2025-1371 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1371
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 03:15 修改: 2025-11-04 20:13
|
| elfutils-libs |
CVE-2025-1376 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip elf_strptr.c elf_strptr denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1376
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:21
|
| elfutils-libs |
CVE-2025-1377 |
低危 |
0.193-1.el9 |
|
elfutils: GNU elfutils eu-strip strip.c gelf_getsymshndx denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1377
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:26
|
| emacs-filesystem |
CVE-2017-1000383 |
低危 |
1:27.2-18.el9 |
|
emacs: Ignores umask when creating a swap file
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-1000383
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2017-10-31 20:29 修改: 2025-04-20 01:37
|
| openssl |
CVE-2024-13176 |
低危 |
1:3.5.1-5.el9_7 |
|
openssl: Timing side-channel in ECDSA signature computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-13176
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-01-20 14:15 修改: 2025-11-03 20:16
|
| openssl |
CVE-2024-41996 |
低危 |
1:3.5.1-5.el9_7 |
|
openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-08-26 06:15 修改: 2024-08-26 16:35
|
| openssl |
CVE-2025-9232 |
低危 |
1:3.5.1-5.el9_7 |
|
openssl: Out-of-bounds read in HTTP client no_proxy handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9232
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| openssl-libs |
CVE-2024-13176 |
低危 |
1:3.5.1-5.el9_7 |
|
openssl: Timing side-channel in ECDSA signature computation
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-13176
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-01-20 14:15 修改: 2025-11-03 20:16
|
| openssl-libs |
CVE-2024-41996 |
低危 |
1:3.5.1-5.el9_7 |
|
openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41996
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-08-26 06:15 修改: 2024-08-26 16:35
|
| openssl-libs |
CVE-2025-9232 |
低危 |
1:3.5.1-5.el9_7 |
|
openssl: Out-of-bounds read in HTTP client no_proxy handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9232
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-09-30 14:15 修改: 2025-11-04 22:16
|
| pcre2 |
CVE-2022-41409 |
低危 |
10.40-6.el9 |
|
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-07-18 14:15 修改: 2024-11-21 07:23
|
| pcre2-syntax |
CVE-2022-41409 |
低危 |
10.40-6.el9 |
|
pcre2: negative repeat value in a pcre2test subject line leads to inifinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41409
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-07-18 14:15 修改: 2024-11-21 07:23
|
| pkgconf |
CVE-2023-24056 |
低危 |
1.7.3-10.el9 |
|
pkgconf: unbounded string expansion due to incorrect checks may result in buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-01-22 04:15 修改: 2025-04-02 16:15
|
| pkgconf-m4 |
CVE-2023-24056 |
低危 |
1.7.3-10.el9 |
|
pkgconf: unbounded string expansion due to incorrect checks may result in buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-01-22 04:15 修改: 2025-04-02 16:15
|
| pkgconf-pkg-config |
CVE-2023-24056 |
低危 |
1.7.3-10.el9 |
|
pkgconf: unbounded string expansion due to incorrect checks may result in buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24056
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-01-22 04:15 修改: 2025-04-02 16:15
|
| expat |
CVE-2025-66382 |
低危 |
2.5.0-5.el9_7.1 |
|
libexpat: libexpat: Denial of service via crafted file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66382
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-11-28 07:15 修改: 2025-12-19 16:05
|
| gawk |
CVE-2023-4156 |
低危 |
5.1.0-6.el9 |
|
gawk: heap out of bound read in builtin.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4156
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-09-25 18:15 修改: 2024-11-21 08:34
|
| binutils |
CVE-2025-11494 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| binutils |
CVE-2025-11495 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11495
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:28
|
| binutils |
CVE-2025-1150 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils ld libbfd.c bfd_malloc memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1150
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 17:15 修改: 2025-03-11 19:01
|
| python-unversioned-command |
CVE-2025-1795 |
低危 |
3.9.25-2.el9_7 |
|
python: Mishandling of comma during folding and unicode-encoding of email headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18
|
| python-unversioned-command |
CVE-2025-6075 |
低危 |
3.9.25-2.el9_7 |
|
python: Quadratic complexity in os.path.expandvars() with user-controlled template
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15
|
| glib2 |
CVE-2023-32636 |
低危 |
2.68.4-18.el9_7 |
|
glib: Timeout in fuzz_variant_text
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32636
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-09-14 20:15 修改: 2024-11-21 08:03
|
| glib2 |
CVE-2025-3360 |
低危 |
2.68.4-18.el9_7 |
|
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15
|
| glib2 |
CVE-2025-7039 |
低危 |
2.68.4-18.el9_7 |
|
glib: Buffer Under-read on GLib through glib/gfileutils.c via get_tmp_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7039
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-09-03 02:15 修改: 2025-09-04 15:36
|
| glib2 |
CVE-2026-0988 |
低危 |
2.68.4-18.el9_7 |
|
glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek()
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0988
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-21 12:15 修改: 2026-01-21 12:15
|
| binutils |
CVE-2025-1151 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils ld xmemdup.c xmemdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1151
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 17:15 修改: 2025-03-04 17:16
|
| python3 |
CVE-2025-1795 |
低危 |
3.9.25-2.el9_7 |
|
python: Mishandling of comma during folding and unicode-encoding of email headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18
|
| python3 |
CVE-2025-6075 |
低危 |
3.9.25-2.el9_7 |
|
python: Quadratic complexity in os.path.expandvars() with user-controlled template
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15
|
| glibc |
CVE-2025-15281 |
低危 |
2.34-231.el9_7.2 |
|
glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15281
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-20 14:16 修改: 2026-01-20 18:16
|
| glibc |
CVE-2026-0861 |
低危 |
2.34-231.el9_7.2 |
|
glibc: Integer overflow in memalign leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0861
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-14 21:15 修改: 2026-01-16 18:16
|
| binutils |
CVE-2025-1152 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| glibc-common |
CVE-2025-15281 |
低危 |
2.34-231.el9_7.2 |
|
glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15281
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-20 14:16 修改: 2026-01-20 18:16
|
| glibc-common |
CVE-2026-0861 |
低危 |
2.34-231.el9_7.2 |
|
glibc: Integer overflow in memalign leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0861
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-14 21:15 修改: 2026-01-16 18:16
|
| python3-libs |
CVE-2025-1795 |
低危 |
3.9.25-2.el9_7 |
|
python: Mishandling of comma during folding and unicode-encoding of email headers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1795
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-28 19:15 修改: 2025-11-03 21:18
|
| python3-libs |
CVE-2025-6075 |
低危 |
3.9.25-2.el9_7 |
|
python: Quadratic complexity in os.path.expandvars() with user-controlled template
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6075
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-31 17:15 修改: 2025-12-01 19:15
|
| binutils |
CVE-2025-1153 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils format.c bfd_set_format memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1153
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-02-10 19:15 修改: 2025-04-04 23:15
|
| glibc-minimal-langpack |
CVE-2025-15281 |
低危 |
2.34-231.el9_7.2 |
|
glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15281
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-20 14:16 修改: 2026-01-20 18:16
|
| glibc-minimal-langpack |
CVE-2026-0861 |
低危 |
2.34-231.el9_7.2 |
|
glibc: Integer overflow in memalign leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-0861
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2026-01-14 21:15 修改: 2026-01-16 18:16
|
| python3-pip-wheel |
CVE-2021-3572 |
低危 |
21.3.1-1.el9 |
|
python-pip: Incorrect handling of unicode separators in git references
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3572
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2021-11-10 18:15 修改: 2024-11-21 06:21
|
| python3-pip-wheel |
CVE-2023-5752 |
低危 |
21.3.1-1.el9 |
|
pip: Mercurial configuration injectable in repo revision when installing via pip
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5752
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2023-10-25 18:17 修改: 2025-11-03 18:15
|
| sqlite-libs |
CVE-2024-0232 |
低危 |
3.34.1-9.el9_7 |
|
sqlite: use-after-free bug in jsonParseAddNodeArray
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0232
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2024-01-16 14:15 修改: 2024-11-21 08:46
|
| binutils |
CVE-2025-11839 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| tar |
CVE-2023-39804 |
低危 |
2:1.34-9.el9_7 |
|
tar: Incorrectly handled extension attributes in PAX archives can lead to a crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39804
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2024-03-27 04:15 修改: 2025-11-04 19:15
|
| gnupg2 |
CVE-2022-3219 |
低危 |
2.3.3-5.el9_7 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| gnupg2 |
CVE-2025-30258 |
低危 |
2.3.3-5.el9_7 |
|
gnupg: verification DoS due to a malicious subkey in the keyring
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-30258
镜像层: sha256:d623905a9e62088c14c686460cf030a278af3c529dbce9a27603f3425dbd1fa7
发布日期: 2025-03-19 20:15 修改: 2025-10-16 16:53
|
| binutils |
CVE-2025-11840 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| binutils |
CVE-2025-3198 |
低危 |
2.35.2-67.el9_7.1 |
|
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:0abd0a9556aeb8e25d8c190eb07d6e84fa357275cc68e4bf30a1733abfb98f52
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|