搜索结果
关于「kernel」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2025-21739 | SCSI:UFS:核心:在INIT错误中免费修复使用后使用并删除路径(CVE-2025-21739) | 2025-02-27 | ||
AVD-2025-21738 | ATA:LIBATA-SFF:确保我们不能在分配的缓冲区外写(CVE-2025-21738) | 2025-02-27 | ||
AVD-2025-21736 | NILFS2:修复NILFS_FIEMAP()(CVE-2025-21736)中可能的INT溢出 | 2025-02-27 | ||
AVD-2025-21735 | NFC:NCI:在NCI_HCI_CREATE_PIPE()(CVE-2025-21735)中添加界限检查 | 2025-02-27 | ||
AVD-2025-21734 | MISC:FASTRPC:修复复制缓冲区页面大小(CVE-2025-21734) | 2025-02-27 | ||
AVD-2025-21733 | 跟踪/osnoise:修复跟踪点的重置(CVE-2025-21733) | 2025-02-27 | ||
AVD-2025-21732 | RDMA/MLX5:修复ODP MR的比赛,该竞赛导致CQE错误(CVE-2025-21732) | 2025-02-27 | ||
AVD-2024-58020 | HID:Multitouch:在MT_INPUT_CONFIGURED中添加NULL检查(CVE-2024-58020) | 2025-02-27 | ||
AVD-2024-58019 | NVKM/GSP:正确推进GSP消息队列的读取指针(CVE-2024-58019) | 2025-02-27 | ||
AVD-2024-58018 | NVKM:正确计算GSP CMDQ缓冲区的可用空间(CVE-2024-58018) | 2025-02-27 | ||
AVD-2024-58017 | printk:定义log_buf_len_max(CVE-2024-58017)时修复签名的整数溢出 | 2025-02-27 | ||
AVD-2024-58016 | SAFESETID:策略写入尺寸(CVE-2024-58016) | 2025-02-27 | ||
AVD-2024-58014 | WiFi:BRCMSMAC:添加增益范围检查到WLC_PHY_IQCAL_GAINPARAMS_NPHY()(CVE-2024-58014) | 2025-02-27 | ||
AVD-2024-58013 | 蓝牙:mgmt:修复板条 - 使用后免费阅读,请阅读mgmt_remove_adv_monitor_sync(CVE-2024-58013) | 2025-02-27 | ||
AVD-2024-58011 | 平台/X86:INT3472:检查ADEV == NULL(CVE-2024-58011) | 2025-02-27 | ||
AVD-2024-58010 | BINFMT_FLAT:修复32位系统上的整数溢出错误(CVE-2024-58010) | 2025-02-27 | ||
AVD-2024-58009 | 蓝牙:L2CAP:在L2CAP_SOCK_ALLOC(CVE-2024-58009)中处理Null Sock指针 | 2025-02-27 | ||
AVD-2024-58007 | SOC:QCOM:SOCINFO:避免阅读序列号的界限(CVE-2024-58007) | 2025-02-27 | ||
AVD-2024-58006 | PCI:DWC:EP:在PCI_EPC_SET_BAR()(CVE-2024-58006)中预防更改条尺寸/标志 | 2025-02-27 | ||
AVD-2024-58005 | TPM:在EventLog/acpi.c(CVE-2024-58005)中更改为kvalloc() | 2025-02-27 | ||
AVD-2024-58003 | 媒体:I2C:DS90UB9X3:修复Extra Fwnode_handle_put()(CVE-2024-58003) | 2025-02-27 | ||
AVD-2024-58002 | 媒体:UVCVIDEO:删除悬挂的指针(CVE-2024-58002) | 2025-02-27 | ||
AVD-2024-58001 | OCFS2:正确处理符号读取错误(CVE-2024-58001) | 2025-02-27 | ||
AVD-2024-54458 | SCSI:UFS:BSG:拆除后将BSG_Queue设置为null(CVE-2024-54458) | 2025-02-27 | ||
AVD-2025-21731 | NBD:断开后不允许重新连接(CVE-2025-21731) | 2025-02-27 | ||
AVD-2025-21728 | BPF:如果可先到! | 2025-02-27 | ||
AVD-2025-21727 | PADATA:修复padata_reorder中的UAF(CVE-2025-21727) | 2025-02-27 | ||
AVD-2025-21726 | PADATA:避免使用UAF进行Reorder_work(CVE-2025-21726) | 2025-02-27 | ||
AVD-2025-21725 | SMB:客户端:由于未设置的链接速度(CVE-2025-21725)修复OOPS | 2025-02-27 | ||
AVD-2025-21724 | iOmmufd/iova_bitmap:修复iova_bitmap_offset_to_index()(CVE-2025-21724)中的隔离式偏移 | 2025-02-27 |