搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2026-23142 | mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure (CVE-2026-23142) | 2026-02-15 | ||
| AVD-2026-23141 | btrfs: send: check for inline extents in range_is_hole_in_parent() (CVE-2026-23141) | 2026-02-15 | ||
| AVD-2026-23128 | arm64: Set __nocfi on swsusp_arch_resume() (CVE-2026-23128) | 2026-02-14 | ||
| AVD-2026-23126 | netdevsim: fix a race issue related to the operation on bpf_bound_progs list (CVE-2026-23126) | 2026-02-14 | ||
| AVD-2026-23125 | sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (CVE-2026-23125) | 2026-02-14 | ||
| AVD-2026-23124 | ipv6: annotate data-race in ndisc_router_discovery() (CVE-2026-23124) | 2026-02-14 | ||
| AVD-2026-23119 | bonding: provide a net pointer to __skb_flow_dissect() (CVE-2026-23119) | 2026-02-14 | ||
| AVD-2026-23113 | io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (CVE-2026-23113) | 2026-02-14 | ||
| AVD-2026-23111 | Linux kernel 安全漏洞(CVE-2026-23111) | 2026-02-13 | ||
| AVD-2025-6830 | Xpoda Türkiye Information Technology 的 Xpoda Studio 中的 SQLi (CVE-2025-6830) | 2026-02-09 | ||
| AVD-2026-23110 | scsi: core: Wake up the error handler when final completions race against each other (CVE-2026-23110) | 2026-02-05 | ||
| AVD-2026-23107 | arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (CVE-2026-23107) | 2026-02-05 | ||
| AVD-2026-23105 | net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (CVE-2026-23105) | 2026-02-05 | ||
| AVD-2026-23103 | ipvlan: Make the addrs_lock be per port (CVE-2026-23103) | 2026-02-05 | ||
| AVD-2026-23101 | leds: led-class: Only Add LED to leds_list when it is fully ready (CVE-2026-23101) | 2026-02-05 | ||
| AVD-2026-23099 | bonding: limit BOND_MODE_8023AD to Ethernet devices (CVE-2026-23099) | 2026-02-05 | ||
| AVD-2026-23097 | migrate: correct lock ordering for hugetlb file folios (CVE-2026-23097) | 2026-02-05 | ||
| AVD-2026-23095 | gue: Fix skb memleak with inner IP protocol 0. (CVE-2026-23095) | 2026-02-05 | ||
| AVD-2026-23086 | vsock/virtio: cap TX credit to local buffer size (CVE-2026-23086) | 2026-02-05 | ||
| AVD-2026-23085 | irqchip/gic-v3-its: Avoid truncating memory addresses (CVE-2026-23085) | 2026-02-05 | ||
| AVD-2026-23083 | fou: Don't allow 0 for FOU_ATTR_IPPROTO. (CVE-2026-23083) | 2026-02-05 | ||
| AVD-2026-23074 | net/sched: Enforce that teql can only be used as root qdisc (CVE-2026-23074) | 2026-02-05 | ||
| AVD-2026-23071 | regmap: Fix race condition in hwspinlock irqsave routine (CVE-2026-23071) | 2026-02-05 | ||
| AVD-2026-23069 | vsock/virtio: fix potential underflow in virtio_transport_get_credit() (CVE-2026-23069) | 2026-02-05 | ||
| AVD-2026-23060 | crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (CVE-2026-23060) | 2026-02-05 | ||
| AVD-2024-5386 | Lunary-ai/lunary 中通过密码重置令牌泄露的帐户劫持 (CVE-2024-5386) | 2026-02-02 | ||
| AVD-2026-23025 | mm/page_alloc: prevent pcp corruption with SMP=n (CVE-2026-23025) | 2026-01-31 | ||
| AVD-2026-23021 | net: usb: pegasus: fix memory leak in update_eth_regs_async() (CVE-2026-23021) | 2026-01-31 | ||
| AVD-2026-23011 | ipv4: ip_gre: make ipgre_header() robust (CVE-2026-23011) | 2026-01-25 | ||
| AVD-2026-23010 | ipv6: Fix use-after-free in inet6_addr_del(). (CVE-2026-23010) | 2026-01-25 |