搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2024-58075 | 加密:Tegra- Tegra Init失败时请勿转移REQ(CVE-2024-58075) | 2025-03-07 | ||
| AVD-2024-58074 | DRM/i915:从编码器中获取Intel_display,以避免潜在的OOPSIE(CVE-2024-58074) | 2025-03-07 | ||
| AVD-2024-58073 | DRM/MSM/DPU:检查有效SSPP(CVE-2024-58073)检查DPU_PLANE_ATOMIC_PRINT_STATE() | 2025-03-07 | ||
| AVD-2024-58072 | wifi:rtlwifi:删除未使用的check_buddy_priv(CVE-2024-58072) | 2025-03-07 | ||
| AVD-2024-58071 | 团队:防止添加已经是团队设备较低的设备(CVE-2024-58071) | 2025-03-07 | ||
| AVD-2024-58070 | BPF:bpf_local_storage:始终在preempt_rt中使用bpf_mem_alloc(CVE-2024-58070) | 2025-03-07 | ||
| AVD-2024-58069 | RTC:PCF85063:修复潜在的OOB写入PCF85063 NVMEM读取(CVE-2024-58069) | 2025-03-07 | ||
| AVD-2024-58068 | OPP:FIX DEV_PM_OPP_FIND_BW _*()未初始化带宽表(CVE-2024-58068) | 2025-03-07 | ||
| AVD-2024-58067 | CLK:MMP:PXA1908-MPMU:修复Null vs is_err()检查(CVE-2024-58067) | 2025-03-07 | ||
| AVD-2024-58066 | CLK:MMP:PXA1908-APBCP:修复Null vs IS_ERR()检查(CVE-2024-58066) | 2025-03-07 | ||
| AVD-2024-58065 | CLK:MMP:PXA1908-APBC:FIX NULL VS IS_ERR()检查(CVE-2024-58065) | 2025-03-07 | ||
| AVD-2024-58064 | WiFi:CFG80211:测试:修复test_cfg80211_parse_colocated_ap()(CVE-2024-58064)中的潜在null取消率 | 2025-03-07 | ||
| AVD-2024-58063 | wifi:rtlwifi:修复记忆泄漏和探针错误路径的无效访问(CVE-2024-58063) | 2025-03-07 | ||
| AVD-2024-58062 | wifi:iwlwifi:MVM:避免零指针解除(CVE-2024-58062) | 2025-03-07 | ||
| AVD-2024-58061 | WiFi:MAC80211:禁止停用所有链接(CVE-2024-58061) | 2025-03-07 | ||
| AVD-2024-58060 | BPF:拒绝使用模块PTR和模块BTF_ID的struct_ops注册(CVE-2024-58060) | 2025-03-07 | ||
| AVD-2024-58059 | 媒体:UVCVIDEO:在UVC_Probe期间修复僵局(CVE-2024-58059) | 2025-03-07 | ||
| AVD-2024-58058 | UBIFS:Zroot为Null时跳过倾倒TNC树(CVE-2024-58058) | 2025-03-07 | ||
| AVD-2024-58057 | IDPF:转换为未绑定的工作类别(CVE-2024-58057) | 2025-03-07 | ||
| AVD-2024-58056 | remoteproc:核心:未分配时修复IDA_FRE通话(CVE-2024-58056) | 2025-03-07 | ||
| AVD-2024-58055 | USB:小工具:F_TCM:不要立即释放命令(CVE-2024-58055) | 2025-03-07 | ||
| AVD-2024-58054 | 登台:媒体:Max96712:删除模块时修复内核oops(CVE-2024-58054) | 2025-03-07 | ||
| AVD-2024-58053 | RXRPC:修复接收连接的处理(CVE-2024-58053) | 2025-03-07 | ||
| AVD-2024-58052 | DRM/AMDGPU:修复Atomctrl_get_smc_sclk_range_table(CVE-2024-58052)中的潜在null指针取消指示 | 2025-03-07 | ||
| AVD-2024-58051 | IPMI:IPMB:添加检查DEVM_KASPRINTF()返回值(CVE-2024-58051) | 2025-03-07 | ||
| AVD-2024-51954 | 未经授权访问ArcGIS服务器中的安全服务(CVE-2024-51954) | 2025-03-04 | ||
| AVD-2022-49733 | ALSA:PCM:OSS:修复SNDCTL_DSP_SYNC的比赛(CVE-2022-49733) | 2025-03-02 | ||
| AVD-2025-21824 | GPU:HOST1X:修复使用非初始化的Mutex(CVE-2025-21824) | 2025-02-28 | ||
| AVD-2025-21823 | 蝙蝠侠-ADV:丢弃非托管的ELP公制工作者(CVE-2025-21823) | 2025-02-28 | ||
| AVD-2025-21822 | PTP:VMCLOCK:在使用之前设置驱动程序数据(CVE-2025-21822) | 2025-02-28 |