搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2023-53642 | x86:修复clear_user_rep_good() 异常处理注释 (CVE-2023-53642) | 2025-10-08 | ||
| AVD-2023-53638 | OCTEON_EP:取消探针错误路径(CVE-2023-53638)中的取消队列作品 | 2025-10-08 | ||
| AVD-2023-53635 | NetFilter:Conntrack:修复错误的CT->超时值(CVE-2023-53635) | 2025-10-08 | ||
| AVD-2023-53634 | BPF,ARM64:返回修补功能时修复了BTI错误(CVE-2023-53634) | 2025-10-08 | ||
| AVD-2023-53633 | ACCEL/QAIC:修复MAP_USER_PAGES()(CVE-2023-53633)中的泄漏 | 2025-10-08 | ||
| AVD-2023-53632 | NET/MLX5E:在调用XDP_SET_FEATURES()(CVE-2023-53632)之前,请在需要时取RTNL锁 | 2025-10-08 | ||
| AVD-2023-53631 | platform/x86:dell-sysman:修复引用泄漏 (CVE-2023-53631) | 2025-10-08 | ||
| AVD-2023-53626 | ext4:修复移动目录时可能出现的双重解锁 (CVE-2023-53626) | 2025-10-08 | ||
| AVD-2023-53624 | net/sched:sch_fq:修复“credit”的整数溢出(CVE-2023-53624) | 2025-10-08 | ||
| AVD-2023-53623 | mm/swap:修复swap_info_struct竞赛在swapoff和get_swap_pages()(CVE-2023-53623)之间 | 2025-10-08 | ||
| AVD-2023-53622 | GFS2:修复GFS2_SHOW_OPTIONS()(CVE-2023-53622)中可能的数据竞赛 | 2025-10-08 | ||
| AVD-2023-53621 | memcontrol:确保正确设置 id 获取的 memcg (CVE-2023-53621) | 2025-10-08 | ||
| AVD-2023-53620 | md:修复 status_resync 中的软锁定 (CVE-2023-53620) | 2025-10-08 | ||
| AVD-2023-53619 | NETFILTER:CONNTRACK:避免免费使用NF_CT_HELPER_HASH使用(CVE-2023-53619) | 2025-10-08 | ||
| AVD-2023-53618 | BTRFS:拒绝使用堆栈转储(CVE-2023-53618)的无效的重新安装树根键 | 2025-10-08 | ||
| AVD-2023-53617 | soc:aspeed:socinfo:为 kstrdup 添加 kfree (CVE-2023-53617) | 2025-10-08 | ||
| AVD-2022-50543 | RDMA/rxe:修复 mr->map 双释放 (CVE-2022-50543) | 2025-10-08 | ||
| AVD-2022-50516 | FS:DLM:修复SB_LVBPTR(CVE-2022-50516)的无效延期 | 2025-10-08 | ||
| AVD-2023-53616 | JFS:修复无效的JFS_IP(IPIMAP) - > i_imap in Diunmount(CVE-2023-53616) | 2025-10-05 | ||
| AVD-2023-53615 | SCSI:QLA2XXX:修复删除竞赛条件(CVE-2023-53615) | 2025-10-05 | ||
| AVD-2023-53613 | DAX:FIX DAX_MAPPED_RELEASE()免费使用后使用(CVE-2023-53613) | 2025-10-05 | ||
| AVD-2023-53611 | ipmi_si:修复try_smi_init()(CVE-2023-53611)中的memleak | 2025-10-05 | ||
| AVD-2023-53610 | IRQCHIP:Platform_IRQCHIP_PROBE(CVE-2023-53610)中的修复重新数泄漏 | 2025-10-05 | ||
| AVD-2023-53606 | NFSD:清理潜在的NFSD_FILE重新汇编泄漏(CVE-2023-53606) | 2025-10-05 | ||
| AVD-2023-53604 | DM完整性:dm_integrity_init()错误路径(CVE-2023-53604)中调用kmem_cache_destroy() | 2025-10-05 | ||
| AVD-2023-53603 | SCSI:QLA2XXX:避免FCPORT指针退出(CVE-2023-53603) | 2025-10-05 | ||
| AVD-2023-53602 | WiFi:ATH11K:修复WMI固件统计数据中的内存泄漏(CVE-2023-53602) | 2025-10-05 | ||
| AVD-2023-53601 | 键合:不要假设设置了SKB MAC_HEADER(CVE-2023-53601) | 2025-10-05 | ||
| AVD-2023-53600 | 隧道:生成IPv4 PMTU错误时修复Kasan Splat(CVE-2023-53600) | 2025-10-05 | ||
| AVD-2023-53599 | 加密:AF_ALG-修复缺少初始化影响GCM-AES-S390(CVE-2023-53599) | 2025-10-05 |