ghcr.io/stackhpc/slurm-docker-cluster:1f51003 linux/amd64

ghcr.io/stackhpc/slurm-docker-cluster:1f51003 - Trivy安全扫描结果 扫描时间: 2024-10-29 18:11
全部漏洞信息
低危漏洞:20 中危漏洞:212 高危漏洞:367 严重漏洞:9

系统OS: rocky 8.8 扫描引擎: Trivy 扫描时间: 2024-10-29 18:11

ghcr.io/stackhpc/slurm-docker-cluster:1f51003 (rocky 8.8) (rocky)
低危漏洞:7 中危漏洞:162 高危漏洞:303 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
curl CVE-2023-38546 高危 7.61.1-30.el8_8.3 7.61.1-33.el8_9.5 curl: cookie injection with none file

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15

git CVE-2024-32002 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: Recursive clones RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git CVE-2024-32004 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: RCE while cloning local repos

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git CVE-2024-32020 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: insecure hardlinks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15

git CVE-2024-32021 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: symlink bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git CVE-2024-32465 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: additional local RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git-core CVE-2024-32002 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: Recursive clones RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git-core CVE-2024-32004 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: RCE while cloning local repos

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git-core CVE-2024-32020 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: insecure hardlinks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15

git-core CVE-2024-32021 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: symlink bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git-core CVE-2024-32465 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: additional local RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git-core-doc CVE-2024-32002 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: Recursive clones RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git-core-doc CVE-2024-32004 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: RCE while cloning local repos

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

git-core-doc CVE-2024-32020 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: insecure hardlinks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15

git-core-doc CVE-2024-32021 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: symlink bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

git-core-doc CVE-2024-32465 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: additional local RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

glibc CVE-2023-4527 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: Stack read overflow in getaddrinfo in no-aaaa mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc CVE-2023-4806 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc CVE-2023-4813 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

glibc CVE-2023-4911 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: buffer overflow in ld.so leading to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46

glibc CVE-2024-2961 高危 2.28-225.el8 2.28-236.el8_9.13 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

glibc CVE-2024-33599 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc CVE-2024-33600 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc CVE-2024-33601 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc CVE-2024-33602 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-common CVE-2023-4527 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: Stack read overflow in getaddrinfo in no-aaaa mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-common CVE-2023-4806 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-common CVE-2023-4813 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

glibc-common CVE-2023-4911 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: buffer overflow in ld.so leading to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46

glibc-common CVE-2024-2961 高危 2.28-225.el8 2.28-236.el8_9.13 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

glibc-common CVE-2024-33599 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-common CVE-2024-33600 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-common CVE-2024-33601 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-common CVE-2024-33602 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-devel CVE-2023-4527 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: Stack read overflow in getaddrinfo in no-aaaa mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-devel CVE-2023-4806 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-devel CVE-2023-4813 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

glibc-devel CVE-2023-4911 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: buffer overflow in ld.so leading to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46

glibc-devel CVE-2024-2961 高危 2.28-225.el8 2.28-236.el8_9.13 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

glibc-devel CVE-2024-33599 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-devel CVE-2024-33600 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-devel CVE-2024-33601 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-devel CVE-2024-33602 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-gconv-extra CVE-2023-4527 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: Stack read overflow in getaddrinfo in no-aaaa mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-gconv-extra CVE-2023-4806 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-gconv-extra CVE-2023-4813 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

glibc-gconv-extra CVE-2023-4911 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: buffer overflow in ld.so leading to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46

glibc-gconv-extra CVE-2024-2961 高危 2.28-225.el8 2.28-236.el8_9.13 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

glibc-gconv-extra CVE-2024-33599 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-gconv-extra CVE-2024-33600 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-gconv-extra CVE-2024-33601 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-gconv-extra CVE-2024-33602 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-headers CVE-2023-4527 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: Stack read overflow in getaddrinfo in no-aaaa mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-headers CVE-2023-4806 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-headers CVE-2023-4813 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

glibc-headers CVE-2023-4911 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: buffer overflow in ld.so leading to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46

glibc-headers CVE-2024-2961 高危 2.28-225.el8 2.28-236.el8_9.13 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

glibc-headers CVE-2024-33599 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-headers CVE-2024-33600 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-headers CVE-2024-33601 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-headers CVE-2024-33602 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-minimal-langpack CVE-2023-4527 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: Stack read overflow in getaddrinfo in no-aaaa mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4527

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-minimal-langpack CVE-2023-4806 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in getaddrinfo()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4806

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-18 17:15 修改: 2024-09-16 14:15

glibc-minimal-langpack CVE-2023-4813 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: potential use-after-free in gaih_inet()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4813

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-09-12 22:15 修改: 2024-09-16 14:15

glibc-minimal-langpack CVE-2023-4911 高危 2.28-225.el8 2.28-225.el8_8.6 glibc: buffer overflow in ld.so leading to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4911

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-10-03 18:15 修改: 2024-09-17 19:46

glibc-minimal-langpack CVE-2024-2961 高危 2.28-225.el8 2.28-236.el8_9.13 glibc: Out of bounds write in iconv may lead to remote code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2961

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-04-17 18:15 修改: 2024-07-22 18:15

glibc-minimal-langpack CVE-2024-33599 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: stack-based buffer overflow in netgroup cache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33599

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-minimal-langpack CVE-2024-33600 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: null pointer dereferences after failed netgroup cache insertion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33600

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-minimal-langpack CVE-2024-33601 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache may terminate daemon on memory allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33601

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

glibc-minimal-langpack CVE-2024-33602 高危 2.28-225.el8 2.28-251.el8_10.2 glibc: netgroup cache assumes NSS callback uses in-buffer strings

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33602

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-05-06 20:15 修改: 2024-07-22 18:15

kernel-headers CVE-2020-26555 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-26555

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2021-05-24 18:15 修改: 2023-11-07 03:20

kernel-headers CVE-2021-33631 高危 4.18.0-477.21.1.el8_8 4.18.0-513.24.1.el8_9 kernel: ext4: kernel bug in ext4_write_inline_data_end()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-33631

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-18 15:15 修改: 2024-02-03 03:15

kernel-headers CVE-2021-46909 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: PCI interrupt mapping cause oops

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46909

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-27 07:15 修改: 2024-04-17 16:57

kernel-headers CVE-2021-46939 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tracing: Restructure trace_clock_global() to never block

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46939

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-27 19:04 修改: 2024-04-10 19:49

kernel-headers CVE-2021-46972 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: ovl: fix leaked dentry

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46972

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-27 19:04 修改: 2024-02-28 14:06

kernel-headers CVE-2021-47018 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ensure definition of the fixmap area is in a limit

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47018

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06

kernel-headers CVE-2021-47069 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47069

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-01 22:15 修改: 2024-03-01 22:22

kernel-headers CVE-2021-47073 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47073

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-01 22:15 修改: 2024-03-01 22:22

kernel-headers CVE-2021-47236 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net: cdc_eem: fix tx fixup skb leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47236

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47257 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: ieee802154: fix null deref in parse dev addr

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47257

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47284 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: isdn: mISDN: netjet: Fix crash in nj_probe

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47284

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37

kernel-headers CVE-2021-47304 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47304

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47310 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net: ti: fix UAF in tlan_remove_one

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47310

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47311 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net: qcom/emac: fix UAF in emac_remove

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47311

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47353 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: udf: Fix NULL pointer dereference in udf_symlink function

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47353

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47356 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mISDN: fix possible use-after-free in HFC_cleanup()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47356

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-07-03 01:37

kernel-headers CVE-2021-47373 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: irqchip/gic-v3-its: Fix potential VPE leak on error

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47373

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47408 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: conntrack: serialize hash resizes and cleanups

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47408

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 15:15 修改: 2024-05-21 16:54

kernel-headers CVE-2021-47456 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: can: peak_pci: peak_pci_remove(): fix UAF

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47456

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-22 07:15 修改: 2024-07-03 01:37

kernel-headers CVE-2021-47461 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: userfaultfd: fix a race between writeprotect and exit_mmap()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47461

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46

kernel-headers CVE-2021-47468 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: isdn: mISDN: Fix sleeping function called from invalid context

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47468

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-22 07:15 修改: 2024-05-22 12:46

kernel-headers CVE-2021-47491 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mm: khugepaged: skip huge page collapse for special files

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47491

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46

kernel-headers CVE-2021-47495 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: usbnet: sanity check for maxpacket

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47495

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-22 09:15 修改: 2024-05-22 12:46

kernel-headers CVE-2021-47548 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47548

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-24 15:15 修改: 2024-07-03 01:38

kernel-headers CVE-2021-47579 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ovl: fix warning in ovl_create_real()

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47579

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 15:15 修改: 2024-06-20 12:43

kernel-headers CVE-2021-47624 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47624

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-16 12:15 修改: 2024-08-21 17:43

kernel-headers CVE-2022-38096 高危 4.18.0-477.21.1.el8_8 4.18.0-513.24.1.el8_9 kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38096

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-09-09 15:15 修改: 2024-06-25 21:15

kernel-headers CVE-2022-48627 高危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: vt: fix memory overlapping when deleting chars in the buffer

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48627

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-06-27 12:15

kernel-headers CVE-2022-48632 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48632

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-28 13:15 修改: 2024-04-29 12:42

kernel-headers CVE-2022-48747 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: block: Fix wrong offset in bio_truncate()

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48747

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-20 12:15 修改: 2024-07-03 01:39

kernel-headers CVE-2022-48757 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: fix information leakage in /proc/net/ptype

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48757

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-20 12:15 修改: 2024-06-20 12:43

kernel-headers CVE-2023-28746 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: Local information disclosure on Intel(R) Atom(R) processors

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28746

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-14 17:15 修改: 2024-06-25 23:15

kernel-headers CVE-2023-5090 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5090

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-11-06 11:15 修改: 2024-09-11 11:15

kernel-headers CVE-2023-51042 高危 4.18.0-477.21.1.el8_8 4.18.0-513.24.1.el8_9 kernel: use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51042

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-23 11:15 修改: 2024-10-03 21:35

kernel-headers CVE-2023-52451 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: powerpc: Fix access beyond end of drmem array

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52451

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-22 17:15 修改: 2024-06-25 21:15

kernel-headers CVE-2023-52464 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52464

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-23 15:15 修改: 2024-06-27 13:15

kernel-headers CVE-2023-52469 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: use-after-free in kv_parse_power_table

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52469

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-26 16:27 修改: 2024-06-27 13:15

kernel-headers CVE-2023-52471 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: null pointer dereference issues in ice_ptp.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52471

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-26 16:27 修改: 2024-04-17 18:59

kernel-headers CVE-2023-52486 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm: Don't unref the same fb many times by mistake due to deadlock handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52486

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-11 18:15 修改: 2024-06-27 13:15

kernel-headers CVE-2023-52530 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: mac80211: fix potential key use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52530

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-10-22 15:15

kernel-headers CVE-2023-52560 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52560

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52615 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52615

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-18 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2023-52619 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: pstore/ram: Fix crash when setting number of cpus to an odd number

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52619

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-18 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2023-52622 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ext4: avoid online resizing failures due to oversized flex bg

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52622

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-26 18:15 修改: 2024-06-27 13:15

kernel-headers CVE-2023-52623 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: SUNRPC: Fix a suspicious RCU usage warning

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52623

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-26 18:15 修改: 2024-06-27 13:15

kernel-headers CVE-2023-52648 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm/vmwgfx: Unmap the surface before resetting it on a plane state

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52648

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-05-01 13:02

kernel-headers CVE-2023-52653 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: SUNRPC: fix a memleak in gss_import_v2_context

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52653

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-05-01 19:50

kernel-headers CVE-2023-52658 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52658

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 12:15 修改: 2024-05-17 18:35

kernel-headers CVE-2023-52662 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52662

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35

kernel-headers CVE-2023-52669 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: crypto: s390/aes - Fix buffer overread in CTR mode

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52669

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-06-25 22:15

kernel-headers CVE-2023-52675 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52675

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-06-25 21:15

kernel-headers CVE-2023-52679 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: of: Fix double free in of_parse_phandle_with_args_map

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52679

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-06-27 12:15

kernel-headers CVE-2023-52686 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: powerpc/powernv: Add a null pointer check in opal_event_init()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52686

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-06-25 21:15

kernel-headers CVE-2023-52700 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: tipc: fix kernel warning when sending SYN message

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52700

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52703 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52703

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52707 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52707

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52730 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mmc: sdio: fix possible resource leaks in some error paths

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52730

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52756 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: pwm: Fix double shift bug

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52756

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-06-08 12:15

kernel-headers CVE-2023-52762 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52762

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52764 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52764

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52775 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/smc: avoid data corruption caused by decline

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52775

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52777 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: ath11k: fix gtk offload status event locking

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52777

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52781 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()'

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52781

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52784 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: bonding: stop the device in bond_setup_by_slave()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52784

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52791 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: i2c: core: Run atomic i2c xfer when !preemptible

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52791

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52796 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ipvlan: add ipvlan_route_v6_outbound() helper

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52796

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52803 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52803

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-07-18 12:15

kernel-headers CVE-2023-52811 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52811

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52813 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52813

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52832 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52832

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-07-03 01:44

kernel-headers CVE-2023-52834 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: atl1c: Work around the DMA RX overflow issue

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52834

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52835 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: perf/core: Bail out early if the request AUX area is out of bound

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52835

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52845 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52845

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52847 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: media: bttv: fix use after free error due to btv->timeout timer

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52847

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52864 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: platform/x86: wmi: Fix opening of char device

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52864

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52877 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52877

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52878 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52878

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-21 16:15 修改: 2024-05-21 16:53

kernel-headers CVE-2023-52881 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52881

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-29 11:16 修改: 2024-05-29 13:02

kernel-headers CVE-2023-6546 高危 4.18.0-477.21.1.el8_8 4.18.0-513.24.1.el8_9 kernel: GSM multiplexing race condition leads to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6546

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-21 20:15 修改: 2024-09-14 00:15

kernel-headers CVE-2023-6931 高危 4.18.0-477.21.1.el8_8 4.18.0-513.24.1.el8_9 kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6931

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-19 14:15 修改: 2024-02-01 18:51

kernel-headers CVE-2024-0565 高危 4.18.0-477.21.1.el8_8 4.18.0-513.24.1.el8_9 kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0565

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-15 20:15 修改: 2024-09-14 00:15

kernel-headers CVE-2024-1086 高危 4.18.0-477.21.1.el8_8 4.18.0-513.24.1.el8_9 kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-1086

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-31 13:15 修改: 2024-08-14 19:41

kernel-headers CVE-2024-21823 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-21823

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-16 21:16 修改: 2024-08-14 21:15

kernel-headers CVE-2024-2201 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 hw: cpu: intel: Native Branch History Injection (BHI)

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2201

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

kernel-headers CVE-2024-25739 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: crash due to a missing check for leb_size

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25739

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-12 03:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26583 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: tls: race between async notify and socket close

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26583

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-21 15:15 修改: 2024-05-25 15:15

kernel-headers CVE-2024-26584 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: tls: handle backlogging of crypto requests

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26584

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-21 15:15 修改: 2024-05-25 15:15

kernel-headers CVE-2024-26585 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: tls: race between tx work scheduling and socket close

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26585

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-21 15:15 修改: 2024-08-19 05:15

kernel-headers CVE-2024-26586 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26586

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-22 17:15 修改: 2024-06-25 21:15

kernel-headers CVE-2024-26614 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tcp: make sure init the accept_queue's spinlocks once

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26614

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-11 18:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26640 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tcp: add sanity checks to rx zerocopy

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26640

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-18 11:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26656 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: drm/amdgpu: use-after-free vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26656

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-02 07:15 修改: 2024-04-03 14:15

kernel-headers CVE-2024-26660 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26660

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50

kernel-headers CVE-2024-26669 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/sched: flower: Fix chain template offload

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26669

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-02 07:15 修改: 2024-04-02 12:50

kernel-headers CVE-2024-26675 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: ppp_async: limit MRU to 64K

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26675

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-02 07:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26686 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26686

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24

kernel-headers CVE-2024-26698 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26698

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 15:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26704 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ext4: fix double-free of blocks due to wrong extents moved_len

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26704

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 15:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26733 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: arp: Prevent overflow in arp_req_get().

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26733

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-06-25 23:15

kernel-headers CVE-2024-26740 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/sched: act_mirred: use the backlog for mirred ingress

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26740

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24

kernel-headers CVE-2024-26759 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mm/swap: fix race when skipping swapcache

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26759

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-04-03 17:24

kernel-headers CVE-2024-26772 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26772

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26802 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: stmmac: Clear variable when destroying workqueue

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26802

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-04 09:15 修改: 2024-04-04 12:48

kernel-headers CVE-2024-26804 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net: ip_tunnel: prevent perpetual headroom growth

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26804

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-04 09:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26810 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: vfio/pci: Lock external INTx masking ops

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26810

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-05 09:15 修改: 2024-06-25 21:15

kernel-headers CVE-2024-26826 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mptcp: fix data re-injection from stale subflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26826

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 10:15 修改: 2024-04-17 12:48

kernel-headers CVE-2024-26837 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26837

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 10:15 修改: 2024-04-17 12:48

kernel-headers CVE-2024-26840 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: cachefiles: fix memory leak in cachefiles_add_cache()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26840

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 10:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26843 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: efi: runtime: Fix potential overflow of soft-reserved region size

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26843

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 10:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26853 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: igc: avoid returning frame twice in XDP_REDIRECT

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26853

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-04-17 12:48

kernel-headers CVE-2024-26859 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net/bnx2x: Prevent access to a freed page in page_pool

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26859

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26870 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26870

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-06-25 23:15

kernel-headers CVE-2024-26878 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: quota: Fix potential NULL pointer dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26878

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26897 高危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26897

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-06-25 23:15

kernel-headers CVE-2024-26906 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26906

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26907 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26907

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-08-08 18:35

kernel-headers CVE-2024-26908 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: x86/xen: Add some null pointer checking to smp.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26908

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-04-30 08:15

kernel-headers CVE-2024-26921 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: inet: inet_defrag: prevent sk release while still in use

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26921

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-18 10:15 修改: 2024-10-17 14:15

kernel-headers CVE-2024-26925 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26925

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-25 06:15 修改: 2024-06-25 21:15

kernel-headers CVE-2024-26940 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26940

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-05-01 13:02

kernel-headers CVE-2024-26958 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: nfs: fix UAF in direct writes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26958

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26960 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mm: swap: fix race between free_swap_and_cache() and swapoff()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26960

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-07-03 01:50

kernel-headers CVE-2024-26961 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26961

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-27010 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/sched: Fix mirred deadlock on device recursion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27010

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-05-13 08:15

kernel-headers CVE-2024-27011 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: fix memleak in map from abort path

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27011

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-10-10 12:15

kernel-headers CVE-2024-27019 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27019

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-16 13:15

kernel-headers CVE-2024-27020 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27020

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-27025 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: nbd: null check for nla_nest_start

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27025

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-27052 高危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27052

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-07-03 01:50

kernel-headers CVE-2024-27065 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: do not compare internal table flags on updates

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27065

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-27388 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: SUNRPC: fix some memleaks in gssx_dec_option_array

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27388

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-27395 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27395

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 15:12 修改: 2024-06-27 12:15

kernel-headers CVE-2024-27397 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: netfilter: nf_tables: use timestamp to check for set element timeout

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27397

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 15:12 修改: 2024-08-19 05:15

kernel-headers CVE-2024-27410 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: wifi: nl80211: reject iftype change with mesh ID change

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27410

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 12:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-27434 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: iwlwifi: mvm: don't set the MFP flag for the GTK

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27434

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 13:15 修改: 2024-05-17 18:35

kernel-headers CVE-2024-31076 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-31076

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15

kernel-headers CVE-2024-33621 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-33621

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15

kernel-headers CVE-2024-35789 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35789

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 13:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35790 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35790

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 13:15 修改: 2024-05-17 18:35

kernel-headers CVE-2024-35801 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35801

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-07-03 02:02

kernel-headers CVE-2024-35807 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ext4: fix corruption during on-line resize

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35807

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-35810 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm/vmwgfx: Fix the lifetime of the bo cursor memory

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35810

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35

kernel-headers CVE-2024-35814 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: swiotlb: Fix double-allocation of slots due to broken alignment handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35814

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-07-03 02:02

kernel-headers CVE-2024-35823 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: vt: fix unicode buffer corruption when deleting characters

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35823

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-35824 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35824

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35

kernel-headers CVE-2024-35835 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net/mlx5e: fix a double-free in arfs_create_groups

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35835

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35838 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: wifi: mac80211: fix potential sta-link leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35838

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35

kernel-headers CVE-2024-35845 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35845

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-07-03 02:02

kernel-headers CVE-2024-35847 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: irqchip/gic-v3-its: Prevent double free on error

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35847

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35852 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35852

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-06-25 21:15

kernel-headers CVE-2024-35853 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35853

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-08-01 14:35

kernel-headers CVE-2024-35854 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35854

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-07-03 02:02

kernel-headers CVE-2024-35855 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35855

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 15:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-35876 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: x86/mce: Make sure to grab mce_sysfs_mutex in set_bank()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35876

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-05-23 14:15

kernel-headers CVE-2024-35888 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: erspan: make sure erspan_base_hdr is present in skb->head

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35888

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35890 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: gro: fix ownership transfer

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35890

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-35893 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/sched: act_skbmod: prevent kernel-infoleak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35893

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35896 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: validate user input for expected length

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35896

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-35897 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35897

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-35899 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: flush pending destroy work before exit_net release

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35899

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-07-03 02:02

kernel-headers CVE-2024-35900 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: reject new basechain after table flag update

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35900

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-35910 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tcp: properly terminate timers for kernel sockets

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35910

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35912 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35912

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 09:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-35924 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: usb: typec: ucsi: Limit read size on v1.2

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35924

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-35925 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: block: prevent division by zero in blk_rq_stat_sum()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35925

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 11:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-35930 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35930

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35937 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: cfg80211: check A-MSDU format more carefully

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35937

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 11:15 修改: 2024-08-29 17:15

kernel-headers CVE-2024-35938 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35938

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-35946 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: rtw89: fix null pointer access when abort scan

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35946

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 11:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-35947 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: dyndbg: fix old BUG_ON in >control parser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35947

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-19 12:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-35952 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm/ast: Fix soft lockup

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35952

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-35958 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net: ena: Fix incorrect descriptor free behavior

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35958

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-06-25 21:15

kernel-headers CVE-2024-35959 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35959

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-36004 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36004

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-36005 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36005

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-06-25 21:15

kernel-headers CVE-2024-36006 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36006

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-36007 高危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36007

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-36010 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: igb: Fix string truncation warnings in igb_set_fw_version

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36010

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-22 12:15 修改: 2024-05-29 06:18

kernel-headers CVE-2024-36016 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36016

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-29 19:15 修改: 2024-07-15 07:15

kernel-headers CVE-2024-36017 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36017

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 13:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36020 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: i40e: fix vf may be used uninitialized in this function warning

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36020

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 15:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-36025 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36025

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 15:15 修改: 2024-05-30 18:19

kernel-headers CVE-2024-36270 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: tproxy: bail out if IP has been disabled on the device

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36270

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:16

kernel-headers CVE-2024-36286 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36286

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-21 11:15 修改: 2024-07-15 07:15

kernel-headers CVE-2024-36489 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tls: fix missing memory barrier in tls_init

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36489

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:32

kernel-headers CVE-2024-36886 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: TIPC message reassembly use-after-free remote code execution vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36886

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-07-03 02:03

kernel-headers CVE-2024-36889 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mptcp: ensure snd_nxt is properly initialized on connect

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36889

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36896 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: USB: core: Fix access violation during port device removal

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36896

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-07-03 02:03

kernel-headers CVE-2024-36904 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36904

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 13:16

kernel-headers CVE-2024-36905 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36905

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-07-03 02:03

kernel-headers CVE-2024-36917 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: block: fix overflow in blk_ioctl_discard()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36917

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-10-10 12:15

kernel-headers CVE-2024-36921 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on removal

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36921

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18

kernel-headers CVE-2024-36927 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ipv4: Fix uninit-value access in __ip_make_skb()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36927

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18

kernel-headers CVE-2024-36929 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36929

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36933 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment().

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36933

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36940 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: pinctrl: core: delete incorrect free in pinctrl_enable()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36940

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36941 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: nl80211: don't free NULL coalescing rule

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36941

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36945 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36945

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-05-30 18:18

kernel-headers CVE-2024-36950 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: firewire: ohci: mask bus reset interrupts between ISR and bottom half

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36950

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36954 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: tipc: fix a possible memleak in tipc_buf_append

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36954

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-30 16:15 修改: 2024-06-27 14:15

kernel-headers CVE-2024-36960 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: drm/vmwgfx: Fix invalid reads in fence signaled events

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36960

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-03 08:15 修改: 2024-07-03 02:03

kernel-headers CVE-2024-36971 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: kernel: UAF in network route management

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36971

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-10 09:15 修改: 2024-08-08 14:49

kernel-headers CVE-2024-36978 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36978

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 07:15 修改: 2024-08-19 18:31

kernel-headers CVE-2024-38538 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: bridge: xmit: make sure we have at least eth header len bytes

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38538

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-08-29 02:26

kernel-headers CVE-2024-38555 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/mlx5: Discard command completions in internal error

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38555

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-08-27 19:54

kernel-headers CVE-2024-38573 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: cppc_cpufreq: Fix possible null pointer dereference

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38573

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-07-03 02:05

kernel-headers CVE-2024-38575 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: wifi: brcmfmac: pcie: handle randbuf allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38575

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:44

kernel-headers CVE-2024-38596 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38596

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-07-15 07:15

kernel-headers CVE-2024-38598 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: md: fix resync softlockup when bitmap size is less than array size

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38598

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-08-27 18:36

kernel-headers CVE-2024-38615 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: cpufreq: exit() callback is optional

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38615

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-06-20 12:43

kernel-headers CVE-2024-38627 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: stm class: Fix a double free in stm_register_device()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38627

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-21 11:15 修改: 2024-09-09 13:39

kernel-headers CVE-2024-39276 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39276

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-25 15:15 修改: 2024-06-25 18:50

kernel-headers CVE-2024-39472 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: xfs: fix log recovery buffer allocation for the legacy h_size fixup

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39472

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-05 07:15 修改: 2024-08-19 05:15

kernel-headers CVE-2024-39476 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39476

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-05 07:15 修改: 2024-07-08 17:11

kernel-headers CVE-2024-39487 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39487

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-09 10:15 修改: 2024-08-21 17:18

kernel-headers CVE-2024-39502 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ionic: fix use after netif_napi_del()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39502

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34

kernel-headers CVE-2024-40974 高危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: powerpc/pseries: Enforce hcall result buffer validity and size

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40974

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34

libcurl-minimal CVE-2023-38546 高危 7.61.1-30.el8_8.3 7.61.1-33.el8_9.5 curl: cookie injection with none file

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38546

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-18 04:15 修改: 2024-07-09 14:15

perl-Git CVE-2024-32002 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: Recursive clones RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32002

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

perl-Git CVE-2024-32004 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: RCE while cloning local repos

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32004

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-26 10:15

perl-Git CVE-2024-32020 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: insecure hardlinks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32020

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 19:15 修改: 2024-06-10 18:15

perl-Git CVE-2024-32021 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: symlink bypass

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32021

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

perl-Git CVE-2024-32465 高危 2.39.3-1.el8_8 2.43.5-1.el8_10 git: additional local RCE

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-32465

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 20:15 修改: 2024-06-26 10:15

platform-python CVE-2023-6597 高危 3.6.8-51.el8_8.1.rocky.0 3.6.8-62.el8_10.rocky.0 python: Path traversal on tempfile.TemporaryDirectory

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15

platform-python CVE-2024-0450 高危 3.6.8-51.el8_8.1.rocky.0 3.6.8-62.el8_10.rocky.0 python: The zipfile module is vulnerable to zip-bombs leading to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15

platform-python-devel CVE-2023-6597 高危 3.6.8-51.el8_8.1.rocky.0 3.6.8-62.el8_10.rocky.0 python: Path traversal on tempfile.TemporaryDirectory

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15

platform-python-devel CVE-2024-0450 高危 3.6.8-51.el8_8.1.rocky.0 3.6.8-62.el8_10.rocky.0 python: The zipfile module is vulnerable to zip-bombs leading to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15

platform-python-setuptools CVE-2024-6345 高危 39.2.0-7.el8 39.2.0-8.el8_10 pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00

pmix CVE-2023-41915 高危 2.2.5-1.el8 2.2.5-3.el8 pmix: race condition allows attackers to obtain ownership of arbitrary files

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-41915

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-09 22:15 修改: 2024-07-11 14:15

python3-libs CVE-2023-6597 高危 3.6.8-51.el8_8.1.rocky.0 3.6.8-62.el8_10.rocky.0 python: Path traversal on tempfile.TemporaryDirectory

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6597

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15

python3-libs CVE-2024-0450 高危 3.6.8-51.el8_8.1.rocky.0 3.6.8-62.el8_10.rocky.0 python: The zipfile module is vulnerable to zip-bombs leading to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0450

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-19 16:15 修改: 2024-06-10 18:15

python3-setuptools CVE-2024-6345 高危 39.2.0-7.el8 39.2.0-8.el8_10 pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00

python3-setuptools-wheel CVE-2024-6345 高危 39.2.0-7.el8 39.2.0-8.el8_10 pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6345

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-07-15 01:15 修改: 2024-07-15 13:00

kernel-headers CVE-2020-36777 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: media: dvbdev: Fix memory leak in dvb_media_device_free()

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-36777

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-27 19:04 修改: 2024-04-10 19:32

kernel-headers CVE-2021-3753 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: a race out-of-bound read in vt

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3753

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-02-16 19:15 修改: 2022-12-07 01:58

kernel-headers CVE-2021-4204 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: improper input validation may lead to privilege escalation

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-4204

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-08-24 16:15 修改: 2023-07-18 13:52

kernel-headers CVE-2021-46934 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: i2c: validate user data in compat ioctl

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-46934

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-27 10:15 修改: 2024-04-10 18:19

kernel-headers CVE-2021-47013 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47013

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-28 09:15 修改: 2024-02-28 14:06

kernel-headers CVE-2021-47055 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: mtd: require write permissions for locking and badblock ioctls

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47055

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 23:15 修改: 2024-03-01 14:04

kernel-headers CVE-2021-47118 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: pid: take a reference when initializing `cad_pid`

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47118

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-15 21:15 修改: 2024-03-17 22:38

kernel-headers CVE-2021-47153 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: i2c: i801: Don't generate an interrupt on bus reset

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47153

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-25 09:15 修改: 2024-03-25 13:47

kernel-headers CVE-2021-47171 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: net: usb: fix memory leak in smsc75xx_bind

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47171

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-25 10:15 修改: 2024-05-16 21:15

kernel-headers CVE-2021-47185 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-47185

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-10 19:15 修改: 2024-04-10 19:49

kernel-headers CVE-2022-0500 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0500

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-03-25 19:15 修改: 2023-06-26 18:01

kernel-headers CVE-2022-23222 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: local privileges escalation in kernel/bpf/verifier.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23222

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-01-14 08:15 修改: 2024-03-25 01:15

kernel-headers CVE-2022-3565 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: use-after-free in l1oip timer handlers

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3565

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-17 19:15 修改: 2023-11-07 03:51

kernel-headers CVE-2022-45934 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: integer overflow in l2cap_config_req() in net/bluetooth/l2cap_core.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45934

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-11-27 04:15 修改: 2023-11-07 03:54

kernel-headers CVE-2022-48669 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: powerpc/pseries: Fix potential memleak in papr_get_attr()

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48669

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-05-01 19:50

kernel-headers CVE-2022-48743 中危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: amd-xgbe: Fix skb data length underflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48743

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-20 12:15 修改: 2024-08-20 13:54

kernel-headers CVE-2023-1513 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1513

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-03-23 21:15 修改: 2023-11-07 04:04

kernel-headers CVE-2023-24023 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: Bluetooth Forward and Future Secrecy Attacks and Defenses

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-24023

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-11-28 07:15 修改: 2024-08-01 14:35

kernel-headers CVE-2023-25775 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: irdma: Improper access control

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25775

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-08-11 03:15 修改: 2024-01-11 21:15

kernel-headers CVE-2023-28464 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 Kernel: double free in hci_conn_cleanup of the bluetooth subsystem

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28464

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-03-31 16:15 修改: 2023-12-22 21:04

kernel-headers CVE-2023-31083 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31083

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-04-24 06:15 修改: 2024-03-25 01:15

kernel-headers CVE-2023-3567 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-3567

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-07-24 16:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-37453 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: usb: out-of-bounds read in read_descriptors

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-37453

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-07-06 17:15 修改: 2024-03-25 01:15

kernel-headers CVE-2023-38409 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38409

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-07-17 22:15 修改: 2023-07-27 03:49

kernel-headers CVE-2023-39189 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39189

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-39192 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: netfilter: xtables out-of-bounds read in u32_match_it()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39192

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-39193 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: netfilter: xtables sctp out-of-bounds read in match_flags()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39193

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-39194 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39194

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-09 18:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-39198 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: QXL: race condition leading to use-after-free in qxl_mode_dumb_create()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39198

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-11-09 20:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-4133 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: cxgb4: use-after-free in ch_flower_stats_cb()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4133

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-08-03 15:15 修改: 2024-05-22 17:16

kernel-headers CVE-2023-4244 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4244

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-06 14:15 修改: 2024-01-11 19:15

kernel-headers CVE-2023-42754 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42754

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-05 19:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-42755 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: rsvp: out-of-bounds read in rsvp_classify()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-42755

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-05 19:15 修改: 2024-09-13 19:15

kernel-headers CVE-2023-45863 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: lib/kobject.c vulnerable to fill_kobj_path out-of-bounds write

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45863

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-14 21:15 修改: 2024-01-11 21:15

kernel-headers CVE-2023-51779 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51779

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 01:42 修改: 2024-08-29 20:35

kernel-headers CVE-2023-51780 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: use-after-free in net/atm/ioctl.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-51780

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-11 19:15 修改: 2024-04-19 07:15

kernel-headers CVE-2023-52340 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52340

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-05 02:15 修改: 2024-07-08 16:42

kernel-headers CVE-2023-52434 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: smb: client: fix potential OOBs in smb2_parse_contexts()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52434

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-20 18:15 修改: 2024-06-25 22:15

kernel-headers CVE-2023-52439 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: uio: Fix use-after-free in uio_open

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52439

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-20 21:15 修改: 2024-06-27 12:15

kernel-headers CVE-2023-52445 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: pvrusb2: fix use after free on context disconnection

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52445

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-22 17:15 修改: 2024-06-27 12:15

kernel-headers CVE-2023-52448 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52448

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-22 17:15 修改: 2024-06-25 21:15

kernel-headers CVE-2023-52463 中危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: efivarfs: force RO when remounting if SetVariable is not supported

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52463

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-23 15:15 修改: 2024-06-25 21:15

kernel-headers CVE-2023-52477 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52477

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 06:15 修改: 2024-02-29 13:49

kernel-headers CVE-2023-52489 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: mm/sparsemem: fix race in accessing memory_section->usage

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52489

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-11 18:15 修改: 2024-06-25 23:15

kernel-headers CVE-2023-52513 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: RDMA/siw: Fix connection failure handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52513

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52520 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: platform/x86: think-lmi: Fix reference leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52520

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52528 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52528

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52565 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52565

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52574 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: team: NULL pointer dereference when team device type is changed

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52574

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52578 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: net: bridge: data races indata-races in br_handle_frame_finish()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52578

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52580 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: net/core: kernel crash in ETH_P_1588 flow dissector

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52580

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-03-04 13:58

kernel-headers CVE-2023-52581 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: netfilter: nf_tables: memory leak when more than 255 elements expired

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52581

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-02 22:15 修改: 2024-06-16 13:15

kernel-headers CVE-2023-52594 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52594

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-06 07:15 修改: 2024-06-27 12:15

kernel-headers CVE-2023-52595 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: rt2x00: restart beacon queue when hardware reset

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52595

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-06 07:15 修改: 2024-06-25 23:15

kernel-headers CVE-2023-52598 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: s390/ptrace: handle setting of fpc register correctly

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52598

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-06 07:15 修改: 2024-06-25 23:15

kernel-headers CVE-2023-52606 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: powerpc/lib: Validate size for vector operations

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52606

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-06 07:15 修改: 2024-06-25 23:15

kernel-headers CVE-2023-52607 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52607

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-06 07:15 修改: 2024-06-25 23:15

kernel-headers CVE-2023-52610 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: net/sched: act_ct: fix skb leak and crash on ooo frags

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52610

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-18 11:15 修改: 2024-03-18 12:38

kernel-headers CVE-2023-52620 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: netfilter: nf_tables: disallow timeout for anonymous sets

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52620

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-21 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2023-52626 中危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52626

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-26 18:15 修改: 2024-03-27 12:29

kernel-headers CVE-2023-52667 中危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52667

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 14:15 修改: 2024-05-17 18:35

kernel-headers CVE-2023-6121 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6121

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-11-16 15:15 修改: 2024-09-14 00:15

kernel-headers CVE-2023-6176 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: local dos vulnerability in scatterwalk_copychunks

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6176

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-11-16 18:15 修改: 2024-09-14 00:15

kernel-headers CVE-2023-6240 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: Marvin vulnerability side-channel leakage in the RSA decryption operation

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6240

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-04 14:15 修改: 2024-09-14 00:15

kernel-headers CVE-2023-6622 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: null pointer dereference vulnerability in nft_dynset_init()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6622

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-08 18:15 修改: 2024-09-14 00:15

kernel-headers CVE-2023-6915 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: Null Pointer Dereference vulnerability in ida_free in lib/idr.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6915

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-15 10:15 修改: 2024-09-14 00:15

kernel-headers CVE-2023-6932 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: use-after-free in IPv4 IGMP

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6932

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-19 14:15 修改: 2024-02-08 16:15

kernel-headers CVE-2024-0340 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: Information disclosure in vhost/vhost.c:vhost_new_msg()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0340

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-09 18:15 修改: 2024-09-14 00:15

kernel-headers CVE-2024-0841 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0841

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-28 12:15 修改: 2024-10-16 15:15

kernel-headers CVE-2024-23307 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: Integer Overflow in raid5_cache_count

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-23307

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-25 07:15 修改: 2024-01-31 20:38

kernel-headers CVE-2024-25742 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 hw: amd: Instruction raise #VC exception at exit

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25742

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-17 22:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-25743 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 hw: amd: Instruction raise #VC exception at exit

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25743

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-15 18:15 修改: 2024-08-15 16:35

kernel-headers CVE-2024-25744 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: untrusted VMM can trigger int80 syscall handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25744

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-12 05:15 修改: 2024-09-06 13:11

kernel-headers CVE-2024-26593 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: i2c: i801: Fix block process call transactions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26593

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-23 10:15 修改: 2024-06-25 23:15

kernel-headers CVE-2024-26602 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26602

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-26 16:28 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26603 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26603

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-26 16:28 修改: 2024-04-17 18:00

kernel-headers CVE-2024-26609 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: netfilter: nf_tables: reject QUEUE/DROP verdict parameters

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26609

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-11 18:15 修改: 2024-03-12 14:15

kernel-headers CVE-2024-26610 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: iwlwifi: fix a memory corruption

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26610

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-11 18:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26615 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: net/smc: fix illegal rmb_desc access in SMC-D connection dump

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26615

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-11 18:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26642 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: netfilter: nf_tables: disallow anonymous set with timeout flag

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26642

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-21 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26643 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26643

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-21 11:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26659 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: xhci: handle isoc Babble and Buffer Overrun events properly

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26659

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-02 07:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26664 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: hwmon: (coretemp) Fix out-of-bounds memory access

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26664

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-02 07:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26671 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: blk-mq: fix IO hang from sbitmap wakeup race

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26671

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-02 07:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26693 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: iwlwifi: mvm: fix a crash when we run out of stations

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26693

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24

kernel-headers CVE-2024-26694 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: iwlwifi: fix double-free bug

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26694

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 15:15 修改: 2024-04-03 17:24

kernel-headers CVE-2024-26735 中危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26735

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26743 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: RDMA/qedr: Fix qedr_create_user_qp error flow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26743

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26744 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26744

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26773 中危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26773

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26779 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: mac80211: fix race condition on enabling fast-xmit

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26779

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-03 17:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26801 中危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26801

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-04 09:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26852 中危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26852

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-08-08 19:35

kernel-headers CVE-2024-26872 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26872

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-06-25 22:15

kernel-headers CVE-2024-26892 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: mt76: mt7921e: fix use-after-free in free_irq()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26892

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-04-17 12:48

kernel-headers CVE-2024-26901 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26901

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 11:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26919 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: usb: ulpi: Fix debugfs directory leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26919

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-17 16:15 修改: 2024-04-17 16:51

kernel-headers CVE-2024-26933 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: USB: core: Fix deadlock in port "disable" sysfs attribute

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26933

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-05-23 19:12

kernel-headers CVE-2024-26934 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: USB: core: Fix deadlock in usb_deauthorize_interface()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26934

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-26964 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26964

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-05-01 13:02

kernel-headers CVE-2024-26973 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: fat: fix uninitialized field in nostale filehandles

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26973

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26974 中危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: crypto: qat - resolve race condition during AER recovery

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26974

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-26982 中危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: Squashfs: check the inode number is not the invalid value of zero

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26982

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-05-03 06:15

kernel-headers CVE-2024-26993 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection()

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26993

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-06-27 13:15

kernel-headers CVE-2024-27014 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: net/mlx5e: Prevent deadlock while disabling aRFS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27014

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 06:15 修改: 2024-05-23 19:15

kernel-headers CVE-2024-27048 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: brcm80211: handle pmk_op allocation failure

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27048

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-05-01 19:50

kernel-headers CVE-2024-27056 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27056

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-05-01 19:50

kernel-headers CVE-2024-27059 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27059

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-01 13:15 修改: 2024-06-27 12:15

kernel-headers CVE-2024-35960 中危 4.18.0-477.21.1.el8_8 4.18.0-553.8.1.el8_10 kernel: net/mlx5: Properly link new fs rules into the tree

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35960

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-07-03 02:02

kernel-headers CVE-2024-36000 中危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36000

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-20 10:15 修改: 2024-05-20 13:00

kernel-headers CVE-2024-36979 中危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: net: bridge: mst: fix vlan use-after-free

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36979

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-19 14:15 修改: 2024-08-26 12:48

kernel-headers CVE-2024-40927 中危 4.18.0-477.21.1.el8_8 4.18.0-553.16.1.el8_10 kernel: xhci: Handle TD clearing for multiple streams case

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40927

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-12 13:15 修改: 2024-07-12 16:34

less CVE-2022-48624 中危 530-1.el8 530-2.el8_9 less: missing quoting of shell metacharacters in LESSCLOSE handling

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48624

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-02-19 01:15 修改: 2024-06-10 18:15

libXpm CVE-2023-43788 中危 3.5.12-9.el8_7 3.5.12-11.el8 libXpm: out of bounds read in XpmCreateXpmImageFromBuffer()

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43788

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-10 13:15 修改: 2024-09-16 15:15

libXpm CVE-2023-43789 中危 3.5.12-9.el8_7 3.5.12-11.el8 libXpm: out of bounds read on XPM with corrupted colormap

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-43789

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-12 12:15 修改: 2024-09-16 15:15

curl CVE-2023-28322 中危 7.61.1-30.el8_8.3 7.61.1-33.el8_9.5 curl: more POST-after-PUT confusion

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15

libcurl-minimal CVE-2023-28322 中危 7.61.1-30.el8_8.3 7.61.1-33.el8_9.5 curl: more POST-after-PUT confusion

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28322

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-05-26 21:15 修改: 2023-12-22 16:15

libcurl-minimal CVE-2023-46218 中危 7.61.1-30.el8_8.3 7.61.1-33.el8_9.5 curl: information disclosure by exploiting a mixed case flaw

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15

libtiff CVE-2018-15209 中危 4.0.9-28.el8_8 4.0.9-32.el8_10 libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-15209

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2018-08-08 04:29 修改: 2020-08-24 17:37

libtiff CVE-2022-4645 中危 4.0.9-28.el8_8 4.0.9-31.el8 libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4645

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-03-03 16:15 修改: 2023-11-07 03:58

libtiff CVE-2023-0800 中危 4.0.9-28.el8_8 4.0.9-29.el8_8 libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0800

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16

libtiff CVE-2023-0801 中危 4.0.9-28.el8_8 4.0.9-29.el8_8 libtiff: out-of-bounds write in _TIFFmemcpy() in libtiff/tif_unix.c when called by functions in tools/tiffcrop.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0801

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16

libtiff CVE-2023-0802 中危 4.0.9-28.el8_8 4.0.9-29.el8_8 libtiff: out-of-bounds write in extractContigSamplesShifted32bits() in tools/tiffcrop.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0802

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16

libtiff CVE-2023-0803 中危 4.0.9-28.el8_8 4.0.9-29.el8_8 libtiff: out-of-bounds write in extractContigSamplesShifted16bits() in tools/tiffcrop.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0803

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-13 23:15 修改: 2023-05-30 06:16

libtiff CVE-2023-0804 中危 4.0.9-28.el8_8 4.0.9-29.el8_8 libtiff: out-of-bounds write in extractContigSamplesShifted24bits() in tools/tiffcrop.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0804

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-13 23:15 修改: 2023-11-07 04:01

libtiff CVE-2023-25433 中危 4.0.9-28.el8_8 4.0.9-32.el8_10 libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-25433

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-29 20:15 修改: 2023-08-01 02:15

libtiff CVE-2023-52356 中危 4.0.9-28.el8_8 4.0.9-32.el8_10 libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52356

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-01-25 20:15 修改: 2024-09-16 20:15

libtiff CVE-2023-6228 中危 4.0.9-28.el8_8 4.0.9-32.el8_10 libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6228

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-18 14:15 修改: 2024-10-11 16:15

libxml2 CVE-2024-25062 中危 2.9.7-16.el8_8.1 2.9.7-18.el8_10.1 libxml2: use-after-free in XMLReader

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25062

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-04 16:15 修改: 2024-02-13 00:40

pam CVE-2024-22365 中危 1.3.1-25.el8 1.3.1-33.el8 pam: allowing unprivileged user to block another user namespace

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-22365

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-02-06 08:15 修改: 2024-02-14 00:27

curl CVE-2023-46218 中危 7.61.1-30.el8_8.3 7.61.1-33.el8_9.5 curl: information disclosure by exploiting a mixed case flaw

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46218

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-07 01:15 修改: 2024-01-25 14:15

expat CVE-2023-52425 中危 2.2.5-11.el8 2.2.5-11.el8_9.1 expat: parsing large tokens can trigger a denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35

expat CVE-2024-45490 中危 2.2.5-11.el8 2.2.5-15.el8_10 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

expat CVE-2024-45491 中危 2.2.5-11.el8 2.2.5-15.el8_10 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

expat CVE-2024-45492 中危 2.2.5-11.el8 2.2.5-15.el8_10 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

expat-devel CVE-2023-52425 中危 2.2.5-11.el8 2.2.5-11.el8_9.1 expat: parsing large tokens can trigger a denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52425

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-04 20:15 修改: 2024-08-26 20:35

expat-devel CVE-2024-45490 中危 2.2.5-11.el8 2.2.5-15.el8_10 libexpat: Negative Length Parsing Vulnerability in libexpat

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45490

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-30 03:15 修改: 2024-10-18 12:24

platform-python CVE-2023-27043 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-56.el8_9.3.rocky.0 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27

platform-python CVE-2024-4032 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 python: incorrect IPv4 and IPv6 private ranges

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35

platform-python CVE-2024-6232 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 python: cpython: tarfile: ReDos via excessive backtracking while parsing header values

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15

platform-python CVE-2024-6923 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15

expat-devel CVE-2024-45491 中危 2.2.5-11.el8 2.2.5-15.el8_10 libexpat: Integer Overflow or Wraparound

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45491

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

gnutls CVE-2023-5981 中危 3.6.16-6.el8_7 3.6.16-8.el8_9 gnutls: timing side-channel in the RSA-PSK authentication

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5981

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2023-11-28 12:15 修改: 2024-09-16 13:15

platform-python-devel CVE-2023-27043 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-56.el8_9.3.rocky.0 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27

platform-python-devel CVE-2024-4032 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 python: incorrect IPv4 and IPv6 private ranges

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35

platform-python-devel CVE-2024-6232 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 python: cpython: tarfile: ReDos via excessive backtracking while parsing header values

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15

platform-python-devel CVE-2024-6923 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15

gnutls CVE-2024-28834 中危 3.6.16-6.el8_7 3.6.16-8.el8_9.3 gnutls: vulnerable to Minerva side-channel information leak

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28834

镜像层: sha256:964fc91a3863b6ffb1c39ac4ebb910c52f6feaedbd961503b6ddb6fade3f2423

发布日期: 2024-03-21 14:15 修改: 2024-09-12 20:15

expat-devel CVE-2024-45492 中危 2.2.5-11.el8 2.2.5-15.el8_10 libexpat: integer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45492

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-30 03:15 修改: 2024-09-04 14:28

kernel-headers CVE-2019-13631 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: OOB writes in parse_hid_report_descriptor in drivers/input/tablet/gtco.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-13631

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2019-07-17 19:15 修改: 2023-11-07 03:03

kernel-headers CVE-2019-15505 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: out of bounds read in drivers/media/usb/dvb-usb/technisat-usb2.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15505

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2019-08-23 06:15 修改: 2023-11-07 03:05

python3-libs CVE-2023-27043 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-56.el8_9.3.rocky.0 python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27043

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-04-19 00:15 修改: 2024-02-26 16:27

python3-libs CVE-2024-4032 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 python: incorrect IPv4 and IPv6 private ranges

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4032

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-17 15:15 修改: 2024-08-29 21:35

python3-libs CVE-2024-6232 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 python: cpython: tarfile: ReDos via excessive backtracking while parsing header values

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6232

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-03 13:15 修改: 2024-09-04 21:15

python3-libs CVE-2024-6923 中危 3.6.8-51.el8_8.1.rocky.0 3.6.8-67.el8_10.rocky.0 cpython: python: email module doesn't properly quotes newlines in email headers, allowing header injection

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6923

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-01 14:15 修改: 2024-09-04 21:15

kernel-headers CVE-2019-25162 中危 4.18.0-477.21.1.el8_8 4.18.0-553.5.1.el8_10 kernel: use after free in i2c

漏洞详情: https://avd.aquasec.com/nvd/cve-2019-25162

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-26 18:15 修改: 2024-04-17 17:38

kernel-headers CVE-2020-25656 中危 4.18.0-477.21.1.el8_8 4.18.0-553.el8_10 kernel: use-after-free in read in vt_do_kdgkb_ioctl

漏洞详情: https://avd.aquasec.com/nvd/cve-2020-25656

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2020-12-02 01:15 修改: 2022-10-25 17:03

sqlite CVE-2023-7104 中危 3.26.0-18.el8_8 3.26.0-19.el8_9 sqlite: heap-buffer-overflow at sessionfuzz

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34

sqlite-devel CVE-2023-7104 中危 3.26.0-18.el8_8 3.26.0-19.el8_9 sqlite: heap-buffer-overflow at sessionfuzz

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34

sqlite-libs CVE-2023-7104 中危 3.26.0-18.el8_8 3.26.0-19.el8_9 sqlite: heap-buffer-overflow at sessionfuzz

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-7104

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-29 10:15 修改: 2024-05-17 02:34

squashfs-tools CVE-2021-40153 中危 4.3-20.el8 4.3-21.el8 squashfs-tools: unvalidated filepaths allow writing outside of destination

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-40153

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2021-08-27 15:15 修改: 2023-11-07 03:38

squashfs-tools CVE-2021-41072 中危 4.3-20.el8 4.3-21.el8 squashfs-tools: possible Directory Traversal via symbolic link

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-41072

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2021-09-14 01:15 修改: 2023-05-30 06:15

procps-ng CVE-2023-4016 低危 3.3.15-13.el8 3.3.15-14.el8 procps: ps buffer overflow

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4016

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-08-02 05:15 修改: 2023-12-15 18:19

krb5-libs CVE-2024-26461 低危 1.18.2-25.el8_8 1.18.2-27.el8_10 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

krb5-devel CVE-2024-26458 低危 1.18.2-25.el8_8 1.18.2-27.el8_10 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

krb5-devel CVE-2024-26461 低危 1.18.2-25.el8_8 1.18.2-27.el8_10 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

libkadm5 CVE-2024-26458 低危 1.18.2-25.el8_8 1.18.2-27.el8_10 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

libkadm5 CVE-2024-26461 低危 1.18.2-25.el8_8 1.18.2-27.el8_10 krb5: Memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26461

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 01:44 修改: 2024-08-14 16:35

krb5-libs CVE-2024-26458 低危 1.18.2-25.el8_8 1.18.2-27.el8_10 krb5: Memory leak at /krb5/src/lib/rpc/pmap_rmt.c

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26458

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 01:44 修改: 2024-05-14 15:09

Node.js (node-pkg)
低危漏洞:6 中危漏洞:9 高危漏洞:33 严重漏洞:8
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
@babel/traverse CVE-2023-45133 严重 7.17.10 7.23.2, 8.0.0-alpha.4 babel: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45133

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-12 17:15 修改: 2023-10-24 16:52

loader-utils CVE-2022-37601 严重 1.4.0 2.0.3, 1.4.1 loader-utils: prototype pollution in function parseQuery in parseQuery.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-12 20:15 修改: 2023-02-28 15:02

loader-utils CVE-2022-37601 严重 2.0.2 2.0.3, 1.4.1 loader-utils: prototype pollution in function parseQuery in parseQuery.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-12 20:15 修改: 2023-02-28 15:02

loader-utils CVE-2022-37601 严重 2.0.2 2.0.3, 1.4.1 loader-utils: prototype pollution in function parseQuery in parseQuery.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-12 20:15 修改: 2023-02-28 15:02

loader-utils CVE-2022-37601 严重 2.0.2 2.0.3, 1.4.1 loader-utils: prototype pollution in function parseQuery in parseQuery.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-12 20:15 修改: 2023-02-28 15:02

loader-utils CVE-2022-37601 严重 2.0.2 2.0.3, 1.4.1 loader-utils: prototype pollution in function parseQuery in parseQuery.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37601

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-12 20:15 修改: 2023-02-28 15:02

minimist CVE-2021-44906 严重 1.2.5 1.2.6, 0.2.4 minimist: prototype pollution

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-44906

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-03-17 16:15 修改: 2024-06-21 19:15

socket.io-parser CVE-2022-2421 严重 4.2.0 4.0.5, 4.2.1, 3.3.3, 3.4.2 Insufficient validation when decoding a Socket.IO packet

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2421

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-26 10:15 修改: 2024-01-02 19:15

body-parser CVE-2024-45590 高危 1.19.0 1.20.3 body-parser: Denial of Service Vulnerability in body-parser

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45590

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-10 16:15 修改: 2024-09-20 16:26

loader-utils CVE-2022-37599 高危 1.4.0 1.4.2, 2.0.4, 3.2.1 loader-utils: regular expression denial of service in interpolateName.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-11 19:15 修改: 2024-02-28 03:15

loader-utils CVE-2022-37603 高危 1.4.0 1.4.2, 2.0.4, 3.2.1 loader-utils: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37603

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-14 16:15 修改: 2023-11-07 03:49

braces CVE-2024-4068 高危 2.3.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

braces CVE-2024-4068 高危 3.0.2 3.0.3 braces: fails to limit the number of characters it can handle

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4068

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 15:42 修改: 2024-07-03 02:07

browserify-sign CVE-2023-46234 高危 4.2.1 4.2.2 browserify-sign: upper bound check issue in dsaVerify leads to a signature forgery attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-46234

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-26 15:15 修改: 2024-02-28 03:15

decode-uri-component CVE-2022-38900 高危 0.2.0 0.2.1 decode-uri-component: improper input validation resulting in DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-38900

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-11-28 13:15 修改: 2023-11-07 03:50

loader-utils CVE-2022-37599 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: regular expression denial of service in interpolateName.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-11 19:15 修改: 2024-02-28 03:15

loader-utils CVE-2022-37599 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: regular expression denial of service in interpolateName.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-11 19:15 修改: 2024-02-28 03:15

loader-utils CVE-2022-37599 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: regular expression denial of service in interpolateName.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-11 19:15 修改: 2024-02-28 03:15

loader-utils CVE-2022-37599 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: regular expression denial of service in interpolateName.js

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37599

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-11 19:15 修改: 2024-02-28 03:15

loader-utils CVE-2022-37603 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37603

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-14 16:15 修改: 2023-11-07 03:49

loader-utils CVE-2022-37603 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37603

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-14 16:15 修改: 2023-11-07 03:49

loader-utils CVE-2022-37603 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37603

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-14 16:15 修改: 2023-11-07 03:49

loader-utils CVE-2022-37603 高危 2.0.2 1.4.2, 2.0.4, 3.2.1 loader-utils: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-37603

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-14 16:15 修改: 2023-11-07 03:49

minimatch CVE-2022-3517 高危 3.0.4 3.0.5 nodejs-minimatch: ReDoS via the braceExpand function

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3517

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-10-17 20:15 修改: 2023-11-07 03:51

json5 CVE-2022-46175 高危 1.0.1 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

nth-check CVE-2021-3803 高危 1.0.2 2.0.1 nodejs-nth-check: inefficient regular expression complexity

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3803

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2021-09-17 07:15 修改: 2023-07-10 18:52

path-to-regexp CVE-2024-45296 高危 0.1.7 1.9.0, 0.1.10, 8.0.0, 3.3.0, 6.3.0 path-to-regexp: Backtracking regular expressions cause ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-45296

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-09 19:15 修改: 2024-09-10 12:09

qs CVE-2022-24999 高危 6.7.0 6.10.3, 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, 6.2.4 express: "qs" prototype poisoning causes the hang of the node process

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24999

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-11-26 22:15 修改: 2023-09-08 17:15

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44

semver CVE-2022-25883 高危 5.7.1 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44

semver CVE-2022-25883 高危 6.3.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44

semver CVE-2022-25883 高危 7.0.0 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44

semver CVE-2022-25883 高危 7.3.5 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44

semver CVE-2022-25883 高危 7.3.7 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44

semver CVE-2022-25883 高危 7.3.7 7.5.2, 6.3.1, 5.7.2 nodejs-semver: Regular expression denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25883

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-06-21 05:15 修改: 2023-11-07 03:44

json5 CVE-2022-46175 高危 2.2.1 2.2.2, 1.0.2 json5: Prototype Pollution in JSON5 via Parse Method

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-46175

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-24 04:15 修改: 2023-11-26 01:15

socket.io-parser CVE-2023-32695 高危 4.2.0 4.2.3, 3.4.3, 3.3.4 socket.io parser is a socket.io encoder and decoder written in JavaScr ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-32695

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-05-27 16:15 修改: 2023-06-05 15:54

terser CVE-2022-25858 高危 4.8.0 4.8.1, 5.14.2 terser: insecure use of regular expressions leads to ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25858

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-07-15 20:15 修改: 2023-08-08 14:22

terser CVE-2022-25858 高危 5.13.1 4.8.1, 5.14.2 terser: insecure use of regular expressions leads to ReDoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25858

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-07-15 20:15 修改: 2023-08-08 14:22

ws CVE-2024-37890 高危 8.2.1 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

ws CVE-2024-37890 高危 8.2.3 5.2.4, 6.2.3, 7.5.10, 8.17.1 nodejs-ws: denial of service when handling a request with many HTTP headers

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-37890

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-17 20:15 修改: 2024-06-20 12:44

send CVE-2024-43799 中危 0.17.1 0.19.0 send: Code Execution Vulnerability in Send Library

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43799

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:57

serve-static CVE-2024-43800 中危 1.14.1 1.16.0, 2.1.0 serve-static: Improper Sanitization in serve-static

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43800

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-10 15:15 修改: 2024-09-20 17:36

express CVE-2024-43796 中危 4.17.1 4.20.0, 5.0.0 express: Improper Input Handling in Express Redirects

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43796

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-10 15:15 修改: 2024-09-20 16:07

hbs CVE-2021-32822 中危 4.1.2 Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sensitive Information to an Unauthorized Actor in hbs

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-32822

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2021-08-16 19:15 修改: 2022-07-02 18:23

tar CVE-2024-28863 中危 6.1.11 6.2.1 node-tar: denial of service while parsing a tar file due to lack of folders depth validation

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-28863

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-21 23:15 修改: 2024-06-10 17:16

bootstrap CVE-2024-6531 中危 4.6.0 5.0.0 A vulnerability has been identified in Bootstrap that exposes users to ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6531

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-11 18:15 修改: 2024-07-12 12:49

postcss CVE-2023-44270 中危 8.4.13 8.4.31 An issue was discovered in PostCSS before 8.4.31. The vulnerability af ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44270

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-29 22:15 修改: 2023-10-10 17:19

micromatch CVE-2024-4067 中危 3.1.10 4.0.8 micromatch: vulnerable to Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-4067

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 15:42 修改: 2024-08-28 00:15

express CVE-2024-29041 中危 4.17.1 4.19.2, 5.0.0-beta.3 express: cause malformed URLs to be evaluated

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-29041

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-25 21:15 修改: 2024-03-26 12:55

elliptic CVE-2024-42459 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: EDDSA signature malleability due to missing signature length check

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42459

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-02 07:16 修改: 2024-08-02 15:35

elliptic CVE-2024-42460 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: ECDSA signature malleability due to missing checks

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42460

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-02 07:16 修改: 2024-08-02 16:35

elliptic CVE-2024-42461 低危 6.5.4 6.5.7 elliptic: nodejs/elliptic: ECDSA implementation malleability due to BER-enconded signatures being allowed

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42461

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-02 07:16 修改: 2024-08-16 16:51

elliptic CVE-2024-48948 低危 6.5.4 elliptic: ECDSA signature verification error may reject legitimate transactions

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48948

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-10-15 14:15 修改: 2024-10-16 16:38

elliptic CVE-2024-48949 低危 6.5.4 6.5.6 elliptic: Missing Validation in Elliptic's EDDSA Signature Verification

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-48949

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-10-10 01:15 修改: 2024-10-15 14:07

cookie CVE-2024-47764 低危 0.4.0 0.7.0 cookie: cookie accepts cookie name, path, and domain with out of bounds characters

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47764

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-10-04 20:15 修改: 2024-10-07 17:48

Python (python-pkg)
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
Ruby (gemspec)
低危漏洞:7 中危漏洞:25 高危漏洞:26 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
actionpack CVE-2023-22792 高危 5.2.8.1 ~> 5.2.8, >= 5.2.8.15, ~> 6.1.7, >= 6.1.7.1, >= 7.0.4.1 rubygem-actionpack: Denial of Service in Action Dispatch

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22792

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2024-02-02 14:15

actionpack CVE-2023-22795 高危 5.2.8.1 ~> 5.2.8, >= 5.2.8.15, ~> 6.1.7, >= 6.1.7.1, >= 7.0.4.1 rubygem-actionpack: Denial of Service in Action Dispatch

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22795

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2024-02-02 14:15

actionview CVE-2023-23913 高危 5.2.8.1 ~> 6.1.7.3, >= 7.0.4.3 rails: DOM Based Cross-site Scripting in rails-ujs for contenteditable HTML Elements

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-23913

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

activerecord CVE-2022-44566 高危 5.2.8.1 ~> 5.2.8, >= 5.2.8.15, ~> 6.1.7, >= 6.1.7.1, >= 7.0.4.1 rubygem-activerecord: Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44566

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2023-06-23 18:29

activesupport CVE-2023-22796 高危 5.2.4.3 ~> 5.2.8, >= 5.2.8.15, ~> 6.1.7, >= 6.1.7.1, >= 7.0.4.1 rubygem-activesupport: Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22796

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2024-02-02 14:15

activesupport CVE-2023-22796 高危 5.2.8.1 ~> 5.2.8, >= 5.2.8.15, ~> 6.1.7, >= 6.1.7.1, >= 7.0.4.1 rubygem-activesupport: Regular Expression Denial of Service

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22796

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2024-02-02 14:15

globalid CVE-2023-22799 高危 1.0.0 >= 1.0.1 rubygem-globalid: ReDoS vulnerability

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-22799

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2023-02-16 20:18

loofah CVE-2022-23514 高危 2.18.0 >= 2.19.1 rubygem-loofah: inefficient regular expression leading to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23514

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-14 14:15 修改: 2023-09-13 17:15

loofah CVE-2022-23516 高危 2.18.0 >= 2.19.1 rubygem-loofah: Uncontrolled Recursion leading to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23516

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-14 14:15 修改: 2023-09-13 17:15

nokogiri CVE-2018-25032 高危 1.12.5 >= 1.13.4 zlib: A flaw found in zlib when compressing (not decompressing) certain inputs

漏洞详情: https://avd.aquasec.com/nvd/cve-2018-25032

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-03-25 09:15 修改: 2023-11-07 02:56

nokogiri CVE-2021-30560 高危 1.12.5 >= 1.13.2 Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 a ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2021-30560

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2021-08-03 19:15 修改: 2024-03-27 14:45

nokogiri CVE-2022-24836 高危 1.12.5 >= 1.13.4 nokogiri: ReDoS in HTML encoding detection

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24836

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-04-11 22:15 修改: 2023-11-07 03:44

nokogiri CVE-2022-24839 高危 1.12.5 >= 1.13.4 nokogiri: Uncontrolled Resource Consumption in org.cyberneko.html (nokogiri fork)

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-24839

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-04-11 22:15 修改: 2023-02-23 20:19

nokogiri CVE-2022-29181 高危 1.12.5 >= 1.13.6 rubygem-nokogiri: Improper Handling of Unexpected Data Type in Nokogiri

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-29181

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-05-20 19:15 修改: 2023-02-16 02:31

nokogiri GHSA-cgx6-hpwq-fhv5 高危 1.12.5 >= 1.13.5 Integer Overflow or Wraparound in libxml2 affects Nokogiri

漏洞详情: https://github.com/advisories/GHSA-cgx6-hpwq-fhv5

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-fq42-c5rg-92c2 高危 1.12.5 1.13.2 Vulnerable dependencies in Nokogiri

漏洞详情: https://github.com/advisories/GHSA-fq42-c5rg-92c2

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-gx8x-g87m-h5q6 高危 1.12.5 1.13.4 Denial of Service (DoS) in Nokogiri on JRuby

漏洞详情: https://github.com/advisories/GHSA-gx8x-g87m-h5q6

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-v6gp-9mmm-c6p5 高危 1.12.5 1.13.4 Out-of-bounds Write in zlib affects Nokogiri

漏洞详情: https://github.com/advisories/GHSA-v6gp-9mmm-c6p5

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

rack CVE-2022-44570 高危 2.2.4 ~> 2.0.9, >= 2.0.9.2, ~> 2.1.4, >= 2.1.4.2, ~> 2.2.6, >= 2.2.6.2, >= 3.0.4.1 rubygem-rack: denial of service in Content-Disposition parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44570

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2023-12-08 22:15

rack CVE-2022-44571 高危 2.2.4 ~> 2.0.9, >= 2.0.9.2, ~> 2.1.4, >= 2.1.4.2, ~> 2.2.6, >= 2.2.6.1, >= 3.0.4.1 rubygem-rack: denial of service in Content-Disposition parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44571

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2023-12-08 22:15

rack CVE-2022-44572 高危 2.2.4 ~> 2.0.9, >= 2.0.9.2, ~> 2.1.4, >= 2.1.4.2, ~> 2.2.6, >= 2.2.6.1, >= 3.0.4.1 rubygem-rack: denial of service in Content-Disposition parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44572

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-02-09 20:15 修改: 2023-12-08 22:15

rack CVE-2023-27530 高危 2.2.4 ~> 2.0.9, >= 2.0.9.3, ~> 2.1.4, >= 2.1.4.3, ~> 2.2.6, >= 2.2.6.3, >= 3.0.4.2 rubygem-rack: Denial of service in Multipart MIME parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27530

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-03-10 22:15 修改: 2024-10-15 19:35

rails-html-sanitizer CVE-2022-23517 高危 1.4.3 >= 1.4.4 rubygem-rails-html-sanitizer: Inefficient Regular Expression leading to denial of service

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23517

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-14 17:15 修改: 2024-02-01 16:24

sinatra CVE-2022-45442 高危 2.2.0 ~> 2.2.3, >= 3.0.4 sinatra: Reflected File Download attack

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45442

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-11-28 21:15 修改: 2023-02-01 15:47

tzinfo CVE-2022-31163 高危 1.2.7 ~> 0.3.61, >= 1.2.10 rubygem-tzinfo: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31163

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-07-22 04:15 修改: 2022-10-26 19:00

tzinfo CVE-2022-31163 高危 1.2.9 ~> 0.3.61, >= 1.2.10 rubygem-tzinfo: arbitrary code execution

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-31163

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-07-22 04:15 修改: 2022-10-26 19:00

nokogiri GHSA-pxvg-2qj5-37jq 中危 1.12.5 >= 1.14.3 Update packaged libxml2 to v2.10.4 to resolve multiple CVEs

漏洞详情: https://github.com/advisories/GHSA-pxvg-2qj5-37jq

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-vcc3-rw6f-jv97 中危 1.12.5 1.15.6, 1.16.2 Use-after-free in libxml2 via Nokogiri::XML::Reader

漏洞详情: https://github.com/advisories/GHSA-vcc3-rw6f-jv97

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-xc9x-jj77-9p9j 中危 1.12.5 ~> 1.15.6, >= 1.16.2 Use-after-free in libxml2 via Nokogiri::XML::Reader

漏洞详情: https://github.com/advisories/GHSA-xc9x-jj77-9p9j

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-xxx9-3xcr-gjj3 中危 1.12.5 1.13.4 XML Injection in Xerces Java affects Nokogiri

漏洞详情: https://github.com/advisories/GHSA-xxx9-3xcr-gjj3

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

activesupport CVE-2023-28120 中危 5.2.4.3 ~> 6.1.7, >= 6.1.7.3, >= 7.0.4.3 rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28120

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

activestorage CVE-2024-26144 中危 5.2.8.1 ~> 6.1.7, >= 6.1.7.7, >= 7.0.8.1 rubygem-activestorage: Possible Sensitive Session Information Leak in Active Storage

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26144

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-27 16:15 修改: 2024-06-10 16:15

loofah CVE-2022-23515 中危 2.18.0 >= 2.19.1 rubygem-loofah: Improper neutralization of data URIs leading to Cross Site Scripting

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23515

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-14 14:15 修改: 2024-02-01 16:11

activesupport CVE-2023-28120 中危 5.2.8.1 ~> 6.1.7, >= 6.1.7.3, >= 7.0.4.3 rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28120

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

rack CVE-2023-27539 中危 2.2.4 ~> 2.0, >= 2.2.6.4, >= 3.0.6.1 rubygem-rack: denial of service in header parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-27539

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

rack CVE-2024-25126 中危 2.2.4 ~> 2.2.8, >= 2.2.8.1, >= 3.0.9.1 rubygem-rack: Denial of Service Vulnerability in Rack Content-Type Parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-25126

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 00:15 修改: 2024-06-10 18:15

rack CVE-2024-26141 中危 2.2.4 ~> 2.2.8, >= 2.2.8.1, >= 3.0.9.1 rubygem-rack: Possible DoS Vulnerability with Range Header in Rack

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26141

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 00:15 修改: 2024-06-10 17:16

rack CVE-2024-26146 中危 2.2.4 ~> 2.0.9, >= 2.0.9.4, ~> 2.1.4, >= 2.1.4.4, ~> 2.2.8, >= 2.2.8.1, >= 3.0.9.1 rubygem-rack: Possible Denial of Service Vulnerability in Rack Header Parsing

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-26146

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-02-29 00:15 修改: 2024-06-10 18:15

bootstrap-sass CVE-2024-6484 中危 3.4.1 A vulnerability has been identified in Bootstrap that exposes users to ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-6484

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-11 17:15 修改: 2024-07-11 18:09

rails-html-sanitizer CVE-2022-23518 中危 1.4.3 >= 1.4.4 rubygem-rails-html-sanitizer: Improper neutralization of data URIs leading to Cross site scripting

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23518

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-14 17:15 修改: 2024-02-01 16:06

rails-html-sanitizer CVE-2022-23519 中危 1.4.3 >= 1.4.4 rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23519

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-14 17:15 修改: 2024-02-01 15:59

rails-html-sanitizer CVE-2022-23520 中危 1.4.3 >= 1.4.4 rubygem-rails-html-sanitizer: Cross site scripting vulnerability with certain configurations

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23520

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-12-14 18:15 修改: 2024-02-01 16:52

rdoc CVE-2024-27281 中危 6.3.3 ~> 6.3.4, >= 6.3.4.1, ~> 6.4.1, >= 6.4.1.1, >= 6.5.1.1 ruby: RCE vulnerability with .rdoc_options in RDoc

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27281

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-14 15:11 修改: 2024-08-20 14:35

rexml CVE-2024-35176 中危 3.2.5 >= 3.2.7 REXML: DoS parsing an XML with many `<`s in an attribute value

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35176

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-05-16 16:15 修改: 2024-05-17 18:36

rexml CVE-2024-39908 中危 3.2.5 >= 3.3.2 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39908

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-16 18:15 修改: 2024-07-17 13:34

rexml CVE-2024-41123 中危 3.2.5 >= 3.3.3 rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]>

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41123

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-01 15:15 修改: 2024-10-10 12:56

rexml CVE-2024-41946 中危 3.2.5 >= 3.3.3 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41946

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-01 15:15 修改: 2024-09-05 16:09

rexml CVE-2024-43398 中危 3.2.5 >= 3.3.6 rexml: DoS vulnerability in REXML

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43398

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-08-22 15:15 修改: 2024-08-23 16:18

actionpack CVE-2023-28362 中危 5.2.8.1 ~> 6.1.7.4, >= 7.0.5.1 actionpack: Possible XSS via User Supplied Values to redirect_to

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-28362

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri CVE-2022-23437 中危 1.12.5 >= 1.13.4 xerces-j2: infinite loop when handling specially crafted XML document payloads

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-23437

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-01-24 15:15 修改: 2023-08-08 14:22

nokogiri GHSA-2qc6-mcvw-92cw 中危 1.12.5 >= 1.13.9 Update bundled libxml2 to v2.10.3 to resolve multiple CVEs

漏洞详情: https://github.com/advisories/GHSA-2qc6-mcvw-92cw

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

actionpack CVE-2024-47887 低危 5.2.8.1 ~> 6.1.7.9, ~> 7.0.8.5, ~> 7.1.4.1, >= 7.2.1.1 rubygem-actionpack: Possible ReDoS vulnerability in HTTP Token authentication in Action Controller

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47887

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-10-16 20:15 修改: 2024-10-18 12:53

actionmailer CVE-2024-47889 低危 5.2.8.1 ~> 6.1.7.9, ~> 7.0.8.5, ~> 7.1.4.1, >= 7.2.1.1 rubygem-actionmailer: Possible ReDoS vulnerability in block_format in Action Mailer

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47889

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-10-16 21:15 修改: 2024-10-18 12:53

activesupport CVE-2023-38037 低危 5.2.8.1 ~> 6.1.7, >= 6.1.7.5, >= 7.0.7.1 rubygem-activesupport: File Disclosure of Locally Encrypted Files

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38037

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

actionpack CVE-2024-41128 低危 5.2.8.1 ~> 6.1.7.9, ~> 7.0.8.5, ~> 7.1.4.1, >= 7.2.1.1 rubygem-actionpack: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41128

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-10-16 18:15 修改: 2024-10-18 12:53

dalli CVE-2022-4064 低危 3.2.0 >= 3.2.3 Unsanitized input leading to code injection in Dalli

漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4064

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2022-11-19 19:15 修改: 2023-11-07 03:56

activesupport CVE-2023-38037 低危 5.2.4.3 ~> 6.1.7, >= 6.1.7.5, >= 7.0.7.1 rubygem-activesupport: File Disclosure of Locally Encrypted Files

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-38037

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

nokogiri GHSA-r95h-9x8f-r3f7 低危 1.12.5 >= 1.16.5 Nokogiri updates packaged libxml2 to v2.12.7 to resolve CVE-2024-34459

漏洞详情: https://github.com/advisories/GHSA-r95h-9x8f-r3f7

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 0001-01-01 00:00 修改: 0001-01-01 00:00

usr/bin/kubectl (gobinary)
低危漏洞:0 中危漏洞:16 高危漏洞:5 严重漏洞:1
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息
stdlib CVE-2024-24790 严重 1.20.7 1.21.11, 1.22.4 golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24790

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-05 16:15 修改: 2024-09-03 18:35

golang.org/x/net CVE-2023-39325 高危 v0.13.0 0.17.0 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39325

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-11 22:15 修改: 2024-04-28 04:15

stdlib CVE-2023-39325 高危 1.20.7 1.20.10, 1.21.3 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39325

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-11 22:15 修改: 2024-04-28 04:15

stdlib CVE-2023-45283 高危 1.20.7 1.20.11, 1.21.4, 1.20.12, 1.21.5 The filepath package does not recognize paths with a \??\ prefix as sp ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45283

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-11-09 17:15 修改: 2023-12-14 10:15

stdlib CVE-2023-45288 高危 1.20.7 1.21.9, 1.22.2 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-04 21:15 修改: 2024-08-26 21:35

stdlib CVE-2024-34156 高危 1.20.7 1.22.7, 1.23.1 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34156

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-06 21:15 修改: 2024-09-09 15:35

google.golang.org/protobuf CVE-2024-24786 中危 v1.30.0 1.33.0 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24786

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-05 23:15 修改: 2024-06-10 18:15

golang.org/x/net CVE-2023-44487 中危 v0.13.0 0.17.0 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-44487

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-10-10 14:15 修改: 2024-08-14 19:57

golang.org/x/net CVE-2023-45288 中危 v0.13.0 0.23.0 golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45288

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-04-04 21:15 修改: 2024-08-26 21:35

stdlib CVE-2023-39318 中危 1.20.7 1.20.8, 1.21.1 golang: html/template: improper handling of HTML-like comments within script contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39318

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-08 17:15 修改: 2023-11-25 11:15

stdlib CVE-2023-39319 中危 1.20.7 1.20.8, 1.21.1 golang: html/template: improper handling of special tags within script contexts

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39319

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-09-08 17:15 修改: 2023-11-25 11:15

stdlib CVE-2023-39326 中危 1.20.7 1.20.12, 1.21.5 golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-39326

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-12-06 17:15 修改: 2024-01-20 04:15

stdlib CVE-2023-45284 中危 1.20.7 1.20.11, 1.21.4 On Windows, The IsLocal function does not correctly detect reserved de ...

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45284

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2023-11-09 17:15 修改: 2024-09-03 19:35

stdlib CVE-2023-45289 中危 1.20.7 1.21.8, 1.22.1 golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45289

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-05 23:15 修改: 2024-05-01 17:15

stdlib CVE-2023-45290 中危 1.20.7 1.21.8, 1.22.1 golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm

漏洞详情: https://avd.aquasec.com/nvd/cve-2023-45290

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-05 23:15 修改: 2024-05-01 17:15

stdlib CVE-2024-24783 中危 1.20.7 1.21.8, 1.22.1 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24783

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-05 23:15 修改: 2024-05-01 17:15

stdlib CVE-2024-24784 中危 1.20.7 1.21.8, 1.22.1 golang: net/mail: comments in display names are incorrectly handled

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24784

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-05 23:15 修改: 2024-08-05 21:35

stdlib CVE-2024-24785 中危 1.20.7 1.21.8, 1.22.1 golang: html/template: errors returned from MarshalJSON methods may break template escaping

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24785

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-03-05 23:15 修改: 2024-05-01 17:15

stdlib CVE-2024-24789 中危 1.20.7 1.21.11, 1.22.4 golang: archive/zip: Incorrect handling of certain ZIP files

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24789

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-06-05 16:15 修改: 2024-07-03 01:48

stdlib CVE-2024-24791 中危 1.20.7 1.21.12, 1.22.5 net/http: Denial of service due to improper 100-continue handling in net/http

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-24791

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-07-02 22:15 修改: 2024-07-08 14:17

stdlib CVE-2024-34155 中危 1.20.7 1.22.7, 1.23.1 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34155

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-06 21:15 修改: 2024-09-09 13:03

stdlib CVE-2024-34158 中危 1.20.7 1.22.7, 1.23.1 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion

漏洞详情: https://avd.aquasec.com/nvd/cve-2024-34158

镜像层: sha256:c711002a6d621d28f11bb1a31a06ae5528af801a25cf70e0e54aa9ad5bc39e42

发布日期: 2024-09-06 21:15 修改: 2024-09-09 14:35

/opt/ood/ondemand/root/usr/share/passenger/update_check_client_cert.pem ()
低危漏洞:0 中危漏洞:0 高危漏洞:0 严重漏洞:0
软件包 漏洞 安全状态 安装版本 修复版本 漏洞信息