搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2023-53530 | SCSI:QLA2XXX:使用RAW_SMP_PROCESSOR_ID()代替SMP_PROCESSOR_ID()(CVE-2023-53530) | 2025-10-01 | ||
| AVD-2023-53526 | JBD2:从检查点删除(CVE-2023-53526)之前,请检查'JH-> B_Transaction' | 2025-10-01 | ||
| AVD-2023-53519 | 媒体:V4L2-MEM2MEM:添加锁定以保护参数num_rdy(CVE-2023-53519) | 2025-10-01 | ||
| AVD-2023-53518 | PM / DEVFREQ:修复DevFreq_Dev_Release()(CVE-2023-53518)中的修复泄漏 | 2025-10-01 | ||
| AVD-2023-53515 | Virtio-Mio:不要打破VM_DEV的生命周期(CVE-2023-53515) | 2025-10-01 | ||
| AVD-2023-53505 | CLK:TEGRA:TEGRA124-EMC:修复潜在内存泄漏(CVE-2023-53505) | 2025-10-01 | ||
| AVD-2023-53501 | iOmmu/amd/iommu_v2:修复Pasid_state重新计数DEC命中0警告Pasid Unbind(CVE-2023-53501) | 2025-10-01 | ||
| AVD-2023-53500 | XFRM:在Decode_session6(CVE-2023-53500)中修复不使用板 | 2025-10-01 | ||
| AVD-2023-53495 | 网络:以太网:mvpp2_main:修复可能的OOB写入MVPP2_ETHTOOL_GET_RXNFC()(CVE-2023-53495) | 2025-10-01 | ||
| AVD-2023-53492 | NETFILTER:NF_TABLES:通过ID查找链(CVE-2023-53492)时不要忽略GenMask | 2025-10-01 | ||
| AVD-2023-53488 | IB/HFI1:在热插管时修复可能的恐慌(CVE-2023-53488) | 2025-10-01 | ||
| AVD-2023-53487 | POWERPC/RTAS_FLASH:允许用户复制到Flash Block缓存对象(CVE-2023-53487) | 2025-10-01 | ||
| AVD-2023-53485 | FS:JFS:修复UBSAN:DBALLOCDMAPLEV中的阵列 - 索引束缚(CVE-2023-53485) | 2025-10-01 | ||
| AVD-2023-53480 | Kobject:在KSET_REGISTER()(CVE-2023-53480)中添加KSET-> KOBJ.KTYPE的理智检查 | 2025-10-01 | ||
| AVD-2023-53472 | PWM:LPC32XX:删除PWM通道的处理(CVE-2023-53472) | 2025-10-01 | ||
| AVD-2023-53465 | Soundwire:QCOM:修复存储端口config Out-BONDS(CVE-2023-53465) | 2025-10-01 | ||
| AVD-2023-53463 | IBMVNIC:请勿重置non_fatal Err上的DQL统计数据(CVE-2023-53463) | 2025-10-01 | ||
| AVD-2023-53462 | HSR:FILD_FRAME_INFO()(CVE-2023-53462)中的FIX UNINIT-VALUE访问 | 2025-10-01 | ||
| AVD-2023-53461 | io_uring:在出口(CVE-2023-53461)上的请求完成中中断 | 2025-10-01 | ||
| AVD-2023-53457 | FS:JFS:修复null-ptr-deref在txbegin中阅读(CVE-2023-53457) | 2025-10-01 | ||
| AVD-2023-53456 | SCSI:QLA4XXX:添加长度检查NLATTRS时(CVE-2023-53456) | 2025-10-01 | ||
| AVD-2023-53454 | HID:Multitouch:hidinput input_dev名称(CVE-2023-53454)的正确DEVM设备参考 | 2025-10-01 | ||
| AVD-2023-53451 | SCSI:QLA2XXX:修复潜在的无效指针删除(CVE-2023-53451) | 2025-10-01 | ||
| AVD-2025-39925 | CAN:J1939:实施NetDev_unregister Notification处理程序(CVE-2025-39925) | 2025-10-01 | ||
| AVD-2025-39923 | DMAENGINE:QCOM:BAM_DMA:修复数字通道/EES的DT错误处理(CVE-2025-39923) | 2025-10-01 | ||
| AVD-2025-39920 | pcmcia:add_interval()中的add error处理()()(CVE-2025-39920) | 2025-10-01 | ||
| AVD-2025-39916 | mm/damon/reclaim:避免在damon_reclaim_apply_parameters()(CVE-2025-39916)中避免划分为零 | 2025-10-01 | ||
| AVD-2025-39914 | 跟踪:当块分配失败时,请警告trace_pid_write(CVE-2025-39914) | 2025-10-01 | ||
| AVD-2025-39913 | tcp_bpf:call sk_msg_free()当tcp_bpf_send_verdict()无法分配psock-> cork时。 (CVE-2025-39913) | 2025-10-01 | ||
| AVD-2025-39909 | mm/damon/lru_sort:避免在damon_lru_sort_apply_parameters()(CVE-2025-39909)中避免划分为零 | 2025-10-01 |