搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2024-58021 | HID:WINWING:添加null检查中的winwing_init_led()(CVE-2024-58021) | 2025-02-27 | ||
| AVD-2024-58020 | HID:Multitouch:在MT_INPUT_CONFIGURED中添加NULL检查(CVE-2024-58020) | 2025-02-27 | ||
| AVD-2024-58019 | NVKM/GSP:正确推进GSP消息队列的读取指针(CVE-2024-58019) | 2025-02-27 | ||
| AVD-2024-58018 | NVKM:正确计算GSP CMDQ缓冲区的可用空间(CVE-2024-58018) | 2025-02-27 | ||
| AVD-2024-58017 | printk:定义log_buf_len_max(CVE-2024-58017)时修复签名的整数溢出 | 2025-02-27 | ||
| AVD-2024-58016 | SAFESETID:策略写入尺寸(CVE-2024-58016) | 2025-02-27 | ||
| AVD-2024-58015 | wifi:ath12k:解决边界外访问错误(CVE-2024-58015) | 2025-02-27 | ||
| AVD-2024-58014 | WiFi:BRCMSMAC:添加增益范围检查到WLC_PHY_IQCAL_GAINPARAMS_NPHY()(CVE-2024-58014) | 2025-02-27 | ||
| AVD-2024-58013 | 蓝牙:mgmt:修复板条 - 使用后免费阅读,请阅读mgmt_remove_adv_monitor_sync(CVE-2024-58013) | 2025-02-27 | ||
| AVD-2024-58012 | ASOC:SOF:INTEL:HDA-DAI:确保DAI小部件在参数期间有效(CVE-2024-58012) | 2025-02-27 | ||
| AVD-2024-58011 | 平台/X86:INT3472:检查ADEV == NULL(CVE-2024-58011) | 2025-02-27 | ||
| AVD-2024-58010 | BINFMT_FLAT:修复32位系统上的整数溢出错误(CVE-2024-58010) | 2025-02-27 | ||
| AVD-2024-58009 | 蓝牙:L2CAP:在L2CAP_SOCK_ALLOC(CVE-2024-58009)中处理Null Sock指针 | 2025-02-27 | ||
| AVD-2024-58008 | 密钥:值得信赖:DCP:FIX不正确的SG与config_vmap_stack = y(CVE-2024-58008) | 2025-02-27 | ||
| AVD-2024-58007 | SOC:QCOM:SOCINFO:避免阅读序列号的界限(CVE-2024-58007) | 2025-02-27 | ||
| AVD-2024-58006 | PCI:DWC:EP:在PCI_EPC_SET_BAR()(CVE-2024-58006)中预防更改条尺寸/标志 | 2025-02-27 | ||
| AVD-2024-58005 | TPM:在EventLog/acpi.c(CVE-2024-58005)中更改为kvalloc() | 2025-02-27 | ||
| AVD-2024-58004 | 媒体:Intel/ipu6:删除错误QOS QOS请求(CVE-2024-58004) | 2025-02-27 | ||
| AVD-2024-58003 | 媒体:I2C:DS90UB9X3:修复Extra Fwnode_handle_put()(CVE-2024-58003) | 2025-02-27 | ||
| AVD-2024-58002 | 媒体:UVCVIDEO:删除悬挂的指针(CVE-2024-58002) | 2025-02-27 | ||
| AVD-2024-58001 | OCFS2:正确处理符号读取错误(CVE-2024-58001) | 2025-02-27 | ||
| AVD-2024-57852 | 固件:QCOM:SCM:SMC:处理缺失的SCM设备(CVE-2024-57852) | 2025-02-27 | ||
| AVD-2024-57834 | 媒体:VIDTV:修复vidtv_mux_stop_thread中的null-ptr-deref(CVE-2024-57834) | 2025-02-27 | ||
| AVD-2024-54458 | SCSI:UFS:BSG:拆除后将BSG_Queue设置为null(CVE-2024-54458) | 2025-02-27 | ||
| AVD-2024-54456 | NFS:修复潜在的缓冲区溢出NFS_SYSFS_LINK_RPC_CLIENT()(CVE-2024-54456) | 2025-02-27 | ||
| AVD-2024-52560 | FS/NTFS3:Mark Inode在MI_ENUM_ATTR()中检测到的错误后立即很糟糕(CVE-2024-52560) | 2025-02-27 | ||
| AVD-2024-52559 | DRM/MSM/GEM:在MSM_IOCTL_GEM_SUBMIT()(CVE-2024-5259)中预防整数溢出 | 2025-02-27 | ||
| AVD-2024-52557 | DRM:zynqmp_dp:zynqmp_dp_rate_get()(CVE-2024-5257)中的修复整数溢出 | 2025-02-27 | ||
| AVD-2024-49570 | DRM/XE/跟踪:修复潜在的TP_PRINTK UAF(CVE-2024-49570) | 2025-02-27 | ||
| AVD-2025-21731 | NBD:断开后不允许重新连接(CVE-2025-21731) | 2025-02-27 |