expat |
CVE-2024-45490 |
中危 |
2.5.0-2.el9_4 |
2.5.0-2.el9_4.1 |
libexpat: Negative Length Parsing Vulnerability in libexpat
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490
镜像层: sha256:7cb46725af4a6b261e4b9011837175bf8b3ab5d0344691b402da2ebb379e32e6
发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24
|
expat |
CVE-2024-45491 |
中危 |
2.5.0-2.el9_4 |
2.5.0-2.el9_4.1 |
libexpat: Integer Overflow or Wraparound
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491
镜像层: sha256:7cb46725af4a6b261e4b9011837175bf8b3ab5d0344691b402da2ebb379e32e6
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
expat |
CVE-2024-45492 |
中危 |
2.5.0-2.el9_4 |
2.5.0-2.el9_4.1 |
libexpat: integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492
镜像层: sha256:7cb46725af4a6b261e4b9011837175bf8b3ab5d0344691b402da2ebb379e32e6
发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28
|
glib2 |
CVE-2024-34397 |
中危 |
2.68.4-14.el9 |
2.68.4-14.el9_4.1 |
glib2: Signal subscription vulnerabilities
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34397
镜像层: sha256:7cb46725af4a6b261e4b9011837175bf8b3ab5d0344691b402da2ebb379e32e6
发布日期: 2024-05-07 18:15 修改: 2024-06-10 18:15
|
kernel-headers |
CVE-2023-52463 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: efivarfs: force RO when remounting if SetVariable is not supported
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52463
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-02-23 15:15 修改: 2024-06-25 21:15
|
kernel-headers |
CVE-2023-52801 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52801
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:43
|
kernel-headers |
CVE-2024-26629 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: nfsd: fix RELEASE_LOCKOWNER
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26629
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-03-13 14:15 修改: 2024-06-21 14:15
|
kernel-headers |
CVE-2024-26630 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: mm: cachestat: fix folio read-after-free in cache walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26630
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-03-13 16:15 修改: 2024-03-13 18:15
|
kernel-headers |
CVE-2024-26720 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26720
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-04-03 15:15 修改: 2024-07-18 12:15
|
kernel-headers |
CVE-2024-26886 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: Bluetooth: af_bluetooth: Fix deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26886
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-04-17 11:15 修改: 2024-04-17 12:48
|
kernel-headers |
CVE-2024-26946 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26946
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-01 06:15 修改: 2024-05-01 13:02
|
kernel-headers |
CVE-2024-35791 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35791
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-17 13:15 修改: 2024-06-25 22:15
|
kernel-headers |
CVE-2024-35797 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: mm: cachestat: fix two shmem bugs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35797
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35
|
kernel-headers |
CVE-2024-35875 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35875
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-19 09:15 修改: 2024-05-20 13:00
|
kernel-headers |
CVE-2024-36000 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36000
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-20 10:15 修改: 2024-05-20 13:00
|
kernel-headers |
CVE-2024-36019 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: regmap: maple: Fix cache corruption in regcache_maple_drop()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36019
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-30 15:15 修改: 2024-05-30 18:19
|
kernel-headers |
CVE-2024-36883 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: net: fix out-of-bounds access in ops_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36883
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-05-30 16:15 修改: 2024-06-27 13:15
|
kernel-headers |
CVE-2024-36979 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: net: bridge: mst: fix vlan use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36979
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-06-19 14:15 修改: 2024-08-26 12:48
|
kernel-headers |
CVE-2024-38559 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: scsi: qedf: Ensure the copied buf is NUL terminated
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38559
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15
|
kernel-headers |
CVE-2024-38619 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: usb-storage: alauda: Check whether the media is initialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38619
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-06-20 07:15 修改: 2024-07-05 08:15
|
kernel-headers |
CVE-2024-40927 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: xhci: Handle TD clearing for multiple streams case
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40927
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-40936 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40936
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34
|
kernel-headers |
CVE-2024-41040 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: net/sched: Fix UAF when resolving a clash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41040
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-29 15:15 修改: 2024-09-10 17:31
|
kernel-headers |
CVE-2024-41044 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: ppp: reject claimed-as-LCP but actually malformed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41044
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-29 15:15 修改: 2024-07-29 16:21
|
kernel-headers |
CVE-2024-41055 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: mm: prevent derefencing NULL ptr in pfn_section_valid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41055
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-29 15:15 修改: 2024-08-22 14:11
|
kernel-headers |
CVE-2024-41073 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: nvme: avoid double free special payload
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41073
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-29 15:15 修改: 2024-08-22 14:11
|
kernel-headers |
CVE-2024-41096 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: PCI/MSI: Fix UAF in msi_capability_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41096
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-29 16:15 修改: 2024-09-08 08:15
|
kernel-headers |
CVE-2024-42082 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: xdp: Remove WARN() from __xdp_reg_mem_model()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42082
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-29 16:15 修改: 2024-07-30 19:04
|
kernel-headers |
CVE-2024-42096 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: x86: stop playing stack games in profile_pc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42096
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-29 18:15 修改: 2024-07-30 13:33
|
kernel-headers |
CVE-2024-42102 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42102
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-30 08:15 修改: 2024-09-19 20:38
|
kernel-headers |
CVE-2024-42131 |
中危 |
5.14.0-427.33.1.el9_4 |
5.14.0-427.35.1.el9_4 |
kernel: mm: avoid overflows in dirty throttling logic
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42131
镜像层: sha256:d8881238d2f5540e18f064edab3841139ef5e7e0e7bc0dfa60ae1b7913ab3c06
发布日期: 2024-07-30 08:15 修改: 2024-09-25 14:45
|
openssl |
CVE-2024-6119 |
中危 |
1:3.0.7-27.el9.0.2 |
1:3.0.7-28.el9_4 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:7cb46725af4a6b261e4b9011837175bf8b3ab5d0344691b402da2ebb379e32e6
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|
openssl-libs |
CVE-2024-6119 |
中危 |
1:3.0.7-27.el9.0.2 |
1:3.0.7-28.el9_4 |
openssl: Possible denial of service in X.509 name checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6119
镜像层: sha256:7cb46725af4a6b261e4b9011837175bf8b3ab5d0344691b402da2ebb379e32e6
发布日期: 2024-09-03 16:15 修改: 2024-09-03 21:35
|