搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2024-57996 | net_sched:sch_sfq:不允许1个数据包限制(CVE-2024-57996) | 2025-02-27 | ||
| AVD-2024-57995 | wifi:ath12k:修复在ATH12K_MAC_ASSIGN_VIF_TO_VDEV()(CVE-2024-57995)中免费读取指针。 | 2025-02-27 | ||
| AVD-2024-57994 | ptr_ring:请勿阻止ptr_ring_resize_multiple()(CVE-2024-57994)中的硬中断 | 2025-02-27 | ||
| AVD-2024-57993 | HID:HID-THRUSTMASTER:通过添加端点检查(CVE-2024-57993)在Throustmaster_probe中修复警告 | 2025-02-27 | ||
| AVD-2024-57992 | WiFi:WILC1000:仅在注册时取消登记Wiphy(CVE-2024-57992) | 2025-02-27 | ||
| AVD-2024-57991 | wifi:rtw89:chan:修复rtw89_entity_recalc_mgnt_roles()(CVE-2024-57991)中的软锁定 | 2025-02-27 | ||
| AVD-2024-57990 | WiFi:MT76:MT7925:MT7925_LOAD_CLC()(CVE-2024-57990)中的一个修复 | 2025-02-27 | ||
| AVD-2024-57989 | WiFi:MT76:MT7925:修复Null Deref检查MT7925_CHANGE_VIF_LINKS(CVE-2024-57989) | 2025-02-27 | ||
| AVD-2024-57988 | 蓝牙:BTBCM:修复null deref中的btbcm_get_board_name()(CVE-2024-57988) | 2025-02-27 | ||
| AVD-2024-57987 | 蓝牙:btrtl:在btrtl_setup_realtek()(CVE-2024-57987)中检查null | 2025-02-27 | ||
| AVD-2024-57986 | HID:核心:修复假设,即分辨率乘数必须在逻辑集合中(CVE-2024-57986) | 2025-02-27 | ||
| AVD-2024-57985 | 固件:QCOM:SCM:探针故障上的清理全局'__scm'(CVE-2024-57985) | 2025-02-27 | ||
| AVD-2024-57984 | i3c:DW:由于种族条件而在DW_I3C_Master驱动程序中不使用时使用(CVE-2024-57984) | 2025-02-27 | ||
| AVD-2024-57983 | 邮箱:TH1520:修复由于不正确的数组大小而导致的内存损坏(CVE-2024-57983) | 2025-02-27 | ||
| AVD-2024-57982 | XFRM:状态:在查找过程中读取的修复外读取(CVE-2024-57982) | 2025-02-27 | ||
| AVD-2024-57981 | USB:XHCI:修复对某些命令中止的null指针解除(CVE-2024-57981) | 2025-02-27 | ||
| AVD-2024-57980 | 媒体:UVCVIDEO:修复双免费错误路径(CVE-2024-57980) | 2025-02-27 | ||
| AVD-2024-57979 | pps:修复UAF漏洞(CVE-2024-57979) | 2025-02-27 | ||
| AVD-2024-57978 | 媒体:IMX-JPEG:修复潜在的错误指针在distach_pm()(CVE-2024-57978)中取消指示 | 2025-02-27 | ||
| AVD-2024-57977 | MEMCG:修复OOM过程中的软锁定(CVE-2024-57977) | 2025-02-27 | ||
| AVD-2024-57976 | btrfs:cow_file_range()失败时进行适当的作品集清理(CVE-2024-57976) | 2025-02-27 | ||
| AVD-2024-57975 | btrfs:run_delalloc_nocow()失败时进行适当的作品集清理(CVE-2024-57975) | 2025-02-27 | ||
| AVD-2024-57974 | UDP:处理UDP插座地址更改与Rehash之间的竞赛(CVE-2024-57974) | 2025-02-27 | ||
| AVD-2024-57973 | RDMA/CXGB4:防止32位的潜在整数溢出(CVE-2024-57973) | 2025-02-27 | ||
| AVD-2024-57953 | RTC:TPS6594:修复32位系统上的整数溢出(CVE-2024-57953) | 2025-02-27 | ||
| AVD-2022-49732 | 袜子:重做PSOCK vs ULP保护检查(CVE-2022-49732) | 2025-02-26 | ||
| AVD-2022-49731 | ATA:libata核:修复null指针deref in ata_host_alloc_pinfo()(CVE-2022-49731) | 2025-02-26 | ||
| AVD-2022-49730 | SCSI:LPFC:在中止ELS徽标后解析NULL PTR取消率(CVE-2022-49730) | 2025-02-26 | ||
| AVD-2022-49729 | NFC:NFCMRVL:修复NFCMRVL_PLAY_DEFERRED中的内存泄漏(CVE-2022-49729) | 2025-02-26 | ||
| AVD-2022-49728 | IPv6:修复签名的整数溢出__IP6_APPEND_DATA(CVE-2022-49728) | 2025-02-26 |