搜索结果
关于「linux_kernel」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2024-58080 | CLK:QCOM:DESCCC-SM6350:为时钟添加缺失的parent_map(CVE-2024-58080) | 2025-03-07 | ||
AVD-2024-58076 | CLK:QCOM:GCC-SM6350:为两个时钟添加缺失的parent_map(CVE-2024-58076) | 2025-03-07 | ||
AVD-2024-58073 | DRM/MSM/DPU:检查有效SSPP(CVE-2024-58073)检查DPU_PLANE_ATOMIC_PRINT_STATE() | 2025-03-07 | ||
AVD-2024-58071 | 团队:防止添加已经是团队设备较低的设备(CVE-2024-58071) | 2025-03-07 | ||
AVD-2024-58070 | BPF:bpf_local_storage:始终在preempt_rt中使用bpf_mem_alloc(CVE-2024-58070) | 2025-03-07 | ||
AVD-2024-58069 | RTC:PCF85063:修复潜在的OOB写入PCF85063 NVMEM读取(CVE-2024-58069) | 2025-03-07 | ||
AVD-2024-58068 | OPP:FIX DEV_PM_OPP_FIND_BW _*()未初始化带宽表(CVE-2024-58068) | 2025-03-07 | ||
AVD-2024-58067 | CLK:MMP:PXA1908-MPMU:修复Null vs is_err()检查(CVE-2024-58067) | 2025-03-07 | ||
AVD-2024-58066 | CLK:MMP:PXA1908-APBCP:修复Null vs IS_ERR()检查(CVE-2024-58066) | 2025-03-07 | ||
AVD-2024-58065 | CLK:MMP:PXA1908-APBC:FIX NULL VS IS_ERR()检查(CVE-2024-58065) | 2025-03-07 | ||
AVD-2024-58064 | WiFi:CFG80211:测试:修复test_cfg80211_parse_colocated_ap()(CVE-2024-58064)中的潜在null取消率 | 2025-03-07 | ||
AVD-2024-58063 | wifi:rtlwifi:修复记忆泄漏和探针错误路径的无效访问(CVE-2024-58063) | 2025-03-07 | ||
AVD-2024-58062 | wifi:iwlwifi:MVM:避免零指针解除(CVE-2024-58062) | 2025-03-07 | ||
AVD-2024-58060 | BPF:拒绝使用模块PTR和模块BTF_ID的struct_ops注册(CVE-2024-58060) | 2025-03-07 | ||
AVD-2024-58059 | 媒体:UVCVIDEO:在UVC_Probe期间修复僵局(CVE-2024-58059) | 2025-03-07 | ||
AVD-2024-58058 | UBIFS:Zroot为Null时跳过倾倒TNC树(CVE-2024-58058) | 2025-03-07 | ||
AVD-2024-58055 | USB:小工具:F_TCM:不要立即释放命令(CVE-2024-58055) | 2025-03-07 | ||
AVD-2024-58052 | DRM/AMDGPU:修复Atomctrl_get_smc_sclk_range_table(CVE-2024-58052)中的潜在null指针取消指示 | 2025-03-07 | ||
AVD-2024-51954 | 未经授权访问ArcGIS服务器中的安全服务(CVE-2024-51954) | 2025-03-04 | ||
AVD-2022-49733 | ALSA:PCM:OSS:修复SNDCTL_DSP_SYNC的比赛(CVE-2022-49733) | 2025-03-02 | ||
AVD-2025-21824 | GPU:HOST1X:修复使用非初始化的Mutex(CVE-2025-21824) | 2025-02-28 | ||
AVD-2025-21820 | tty:xilinx_uartps:Split sysrq处理(CVE-2025-21820) | 2025-02-28 | ||
AVD-2025-21814 | PTP:确保info->始终设置启用回调(CVE-2025-21814) | 2025-02-28 | ||
AVD-2025-21812 | AX25:RCU Protect Dev-> AX25_PTR(CVE-2025-21812) | 2025-02-28 | ||
AVD-2025-21811 | NILFS2:保护对没有主动参考的缓冲区的访问(CVE-2025-21811) | 2025-02-28 | ||
AVD-2025-21809 | RXRPC,AFS:修复对等哈希锁定与RCU回调(CVE-2025-21809) | 2025-02-28 | ||
AVD-2025-21798 | FireWire:测试:修复FireWire Kunit测试中的潜在无效解释(CVE-2025-21798) | 2025-02-28 | ||
AVD-2024-58042 | Rhashtable:通过移动Schedue_work在锁外(CVE-2024-58042)来解决潜在的僵局 | 2025-02-28 | ||
AVD-2024-58034 | 内存:tegra20-emc:fix of tegra_emc_emc_find_node_by_ram_code()(CVE-2024-58034)中的节点参考错误 | 2025-02-28 | ||
AVD-2024-58022 | 邮箱:TH1520:修复null vs is_err()bug(CVE-2024-58022) | 2025-02-28 |