搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2023-53350 | 加速/QAIC:修复切片内存泄漏(CVE-2023-53350) | 2025-09-17 | ||
| AVD-2023-53349 | 媒体:OV2740:修复OV2740_INIT_CONTROLS()(CVE-2023-53349)中的memleak | 2025-09-17 | ||
| AVD-2023-53348 | BTRFS:解决僵局在使用SCRUB搬迁期间中止交易时(CVE-2023-53348) | 2025-09-17 | ||
| AVD-2023-53347 | NET/MLX5:通过上行链路UN/LOAD API(CVE-2023-53347)处理E-SWitch的配对 | 2025-09-17 | ||
| AVD-2023-53346 | 内核/fail_function:使用debugfs_lookup()(CVE-2023-53346)修复内存泄漏 | 2025-09-17 | ||
| AVD-2023-53345 | RXRPC:修复RXRPC_WAIT_TO_BE_CONNEDED()(CVE-2023-53345)中的潜在数据竞赛 | 2025-09-17 | ||
| AVD-2023-53344 | CAN:BCM:BCM_TX_SETUP():修复VFS_WRITE中的KMSAN UNINIT-VALUE(CVE-2023-53344) | 2025-09-17 | ||
| AVD-2023-53343 | ICMP6:ip6_null_entry-> rt6i_idev()中的IP6_NULL_ENTRY->修复NULL-PTR-DEREF()。 (CVE-2023-53343) | 2025-09-17 | ||
| AVD-2023-53342 | 网络:Marvell:Prestera:使用NHID(CVE-2023-53342)修复处理IPv4路线 | 2025-09-17 | ||
| AVD-2023-53341 | /fdt:运行SOC内存设置时 | 2025-09-17 | ||
| AVD-2023-53340 | NET/MLX5:收集仅针对已知命令的命令故障数据(CVE-2023-53340) | 2025-09-17 | ||
| AVD-2023-53339 | BTRFS:BTRFS_CANCEL_BALANCE(CVE-2023-53339)中的FIX BUG_ON条件 | 2025-09-17 | ||
| AVD-2023-53338 | LWT:BPF XMIT OPS的修复返回值(CVE-2023-53338) | 2025-09-17 | ||
| AVD-2023-53337 | NILFS2:脱落到只读后,请勿编写肮脏的数据(CVE-2023-53337) | 2025-09-17 | ||
| AVD-2023-53336 | 媒体:IPU-Bridge:修复Null指针DEREF在SSDB/PLD解析警告上(CVE-2023-5336) | 2025-09-17 | ||
| AVD-2023-53335 | RDMA/CXGB4:修复pass_establish()(CVE-2023-53335)中的潜在null-ptr-deref | 2025-09-17 | ||
| AVD-2022-50374 | 蓝牙:hci_ {ldisc,serdev}:检查percpu_init_rwsem()失败(CVE-2022-50374) | 2025-09-17 | ||
| AVD-2022-50373 | FS:DLM:在LowComms中修复比赛(CVE-2022-50373) | 2025-09-17 | ||
| AVD-2022-50372 | CIFS:修复内存泄漏时构建NTLMSSP协商BLOB失败时(CVE-2022-50372) | 2025-09-17 | ||
| AVD-2022-50371 | LED:QCOM-LPG:修复在原子中睡觉(CVE-2022-50371) | 2025-09-17 | ||
| AVD-2022-50370 | I2C:DesignWare:修复真实但意外设备中断的处理(CVE-2022-50370) | 2025-09-17 | ||
| AVD-2022-50369 | DRM/VKMS:修复null-ptr-deref在vkms_release()(CVE-2022-50369)中 | 2025-09-17 | ||
| AVD-2022-50368 | DRM/MSM/DSI:用太多桥梁修复内存损坏(CVE-2022-50368) | 2025-09-17 | ||
| AVD-2022-50367 | FS:修复NILFS_MDT_DESTROY中的UAF/GPF错误(CVE-2022-50367) | 2025-09-17 | ||
| AVD-2022-50366 | PowerCap:intel_rapl:修复乌巴桑班次偏移问题(CVE-2022-50366) | 2025-09-17 | ||
| AVD-2022-50365 | Skbuff:拉动操作期间的尾巴调整(CVE-2022-50365) | 2025-09-17 | ||
| AVD-2022-50364 | I2C:MUX:REG:调用Platform_get_resource()(CVE-2022-50364)之后检查返回值 | 2025-09-17 | ||
| AVD-2022-50363 | SKMSG:将GFP参数传递给Alloc_sk_msg()(CVE-2022-50363) | 2025-09-17 | ||
| AVD-2022-50362 | DMAENGINE:HISILICON:添加对DMA频道的多线程支持(CVE-2022-50362) | 2025-09-17 | ||
| AVD-2022-50361 | wifi:wilc1000:在wilc_netdev_ifc_init()(CVE-2022-50361)中添加缺失的unregister_netdev() | 2025-09-17 |