搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2024-58014 | WiFi:BRCMSMAC:添加增益范围检查到WLC_PHY_IQCAL_GAINPARAMS_NPHY()(CVE-2024-58014) | 2025-02-27 | ||
| AVD-2024-58013 | 蓝牙:mgmt:修复板条 - 使用后免费阅读,请阅读mgmt_remove_adv_monitor_sync(CVE-2024-58013) | 2025-02-27 | ||
| AVD-2024-58011 | 平台/X86:INT3472:检查ADEV == NULL(CVE-2024-58011) | 2025-02-27 | ||
| AVD-2024-58010 | BINFMT_FLAT:修复32位系统上的整数溢出错误(CVE-2024-58010) | 2025-02-27 | ||
| AVD-2024-58009 | 蓝牙:L2CAP:在L2CAP_SOCK_ALLOC(CVE-2024-58009)中处理Null Sock指针 | 2025-02-27 | ||
| AVD-2024-58008 | 密钥:值得信赖:DCP:FIX不正确的SG与config_vmap_stack = y(CVE-2024-58008) | 2025-02-27 | ||
| AVD-2024-58007 | SOC:QCOM:SOCINFO:避免阅读序列号的界限(CVE-2024-58007) | 2025-02-27 | ||
| AVD-2024-58006 | PCI:DWC:EP:在PCI_EPC_SET_BAR()(CVE-2024-58006)中预防更改条尺寸/标志 | 2025-02-27 | ||
| AVD-2024-58005 | TPM:在EventLog/acpi.c(CVE-2024-58005)中更改为kvalloc() | 2025-02-27 | ||
| AVD-2024-58004 | 媒体:Intel/ipu6:删除错误QOS QOS请求(CVE-2024-58004) | 2025-02-27 | ||
| AVD-2024-58003 | 媒体:I2C:DS90UB9X3:修复Extra Fwnode_handle_put()(CVE-2024-58003) | 2025-02-27 | ||
| AVD-2024-58002 | 媒体:UVCVIDEO:删除悬挂的指针(CVE-2024-58002) | 2025-02-27 | ||
| AVD-2024-58001 | OCFS2:正确处理符号读取错误(CVE-2024-58001) | 2025-02-27 | ||
| AVD-2024-57834 | 媒体:VIDTV:修复vidtv_mux_stop_thread中的null-ptr-deref(CVE-2024-57834) | 2025-02-27 | ||
| AVD-2024-54458 | SCSI:UFS:BSG:拆除后将BSG_Queue设置为null(CVE-2024-54458) | 2025-02-27 | ||
| AVD-2024-54456 | NFS:修复潜在的缓冲区溢出NFS_SYSFS_LINK_RPC_CLIENT()(CVE-2024-54456) | 2025-02-27 | ||
| AVD-2024-52559 | DRM/MSM/GEM:在MSM_IOCTL_GEM_SUBMIT()(CVE-2024-5259)中预防整数溢出 | 2025-02-27 | ||
| AVD-2024-52557 | DRM:zynqmp_dp:zynqmp_dp_rate_get()(CVE-2024-5257)中的修复整数溢出 | 2025-02-27 | ||
| AVD-2024-49570 | DRM/XE/跟踪:修复潜在的TP_PRINTK UAF(CVE-2024-49570) | 2025-02-27 | ||
| AVD-2025-21731 | NBD:断开后不允许重新连接(CVE-2025-21731) | 2025-02-27 | ||
| AVD-2025-21730 | wifi:rtw89:避免在WOWLAN失败时两次Init Mgnt_entry列表(CVE-2025-21730) | 2025-02-27 | ||
| AVD-2025-21729 | wifi:rtw89:修复cancel_hw_scan和HW_SCAN完成之间的比赛(CVE-2025-21729) | 2025-02-27 | ||
| AVD-2025-21728 | BPF:如果可先到! | 2025-02-27 | ||
| AVD-2025-21727 | PADATA:修复padata_reorder中的UAF(CVE-2025-21727) | 2025-02-27 | ||
| AVD-2025-21726 | PADATA:避免使用UAF进行Reorder_work(CVE-2025-21726) | 2025-02-27 | ||
| AVD-2025-21725 | SMB:客户端:由于未设置的链接速度(CVE-2025-21725)修复OOPS | 2025-02-27 | ||
| AVD-2025-21724 | iOmmufd/iova_bitmap:修复iova_bitmap_offset_to_index()(CVE-2025-21724)中的隔离式偏移 | 2025-02-27 | ||
| AVD-2025-21723 | SCSI:MPI3MR:设置BSG失败时可能崩溃(CVE-2025-21723) | 2025-02-27 | ||
| AVD-2025-21722 | NILFS2:如果引用缓冲液,请勿强制清晰的作品集(CVE-2025-21722) | 2025-02-27 | ||
| AVD-2025-21721 | NILFS2:处理NILFS_PREPARE_CHUNK()可能返回的错误(CVE-2025-21721) | 2025-02-27 |