搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-39948 | ICE:修复RX页面泄漏在多缓冲器框架上(CVE-2025-39948) | 2025-10-04 | ||
| AVD-2025-39947 | NET/MLX5E:与设备Unbind的硬链路NetDev访问(CVE-2025-39947) | 2025-10-04 | ||
| AVD-2025-39946 | TLS:如果标头是虚假的,请确保中止流(CVE-2025-39946) | 2025-10-04 | ||
| AVD-2025-39945 | CNIC:在CNIC_DELETE_TASK中修复无用的错误(CVE-2025-39945) | 2025-10-04 | ||
| AVD-2025-39944 | OCTEONTX2-PF:在OTX2_SYNC_TSTAMP()(CVE-2025-39944)中修复无用的错误 | 2025-10-04 | ||
| AVD-2025-39940 | DM-Stripe:修复可能的整数溢出(CVE-2025-39940) | 2025-10-04 | ||
| AVD-2025-39938 | ASOC:QCOM:Q6APM-LPASS-DAIS:修复NULL指针如果源图失败(CVE-2025-39938) | 2025-10-04 | ||
| AVD-2025-39937 | 网络:RFKILL:GPIO:由于退出非初始化指针而引起的崩溃(CVE-2025-39937) | 2025-10-04 | ||
| AVD-2025-39934 | DRM:桥:Anx7625:用早期IRQ(CVE-2025-39934)修复Null指针取消。 | 2025-10-04 | ||
| AVD-2025-39933 | SMB:客户端:让recv_done验证data_offset,data_length和剩余的_data_length(CVE-2025-39933) | 2025-10-04 | ||
| AVD-2025-39932 | SMB:客户端:让SMBD_DESTROY()呼叫disable_work_sync(&info-> post_send_credits_work)(CVE-2025-39932) | 2025-10-04 | ||
| AVD-2025-39931 | 加密:af_alg-将合并设置为af_alg_sendmsg(CVE-2025-39931) | 2025-10-04 | ||
| AVD-2025-39929 | SMB:客户端:修复SMBDIRECT_RECV_IO在SMBD_NEGOTIATE()错误路径(CVE-2025-39929)中 | 2025-10-04 | ||
| AVD-2023-53531 | null_blk:修复投票请求超时处理(CVE-2023-53531) | 2025-10-01 | ||
| AVD-2023-53530 | SCSI:QLA2XXX:使用RAW_SMP_PROCESSOR_ID()代替SMP_PROCESSOR_ID()(CVE-2023-53530) | 2025-10-01 | ||
| AVD-2023-53528 | RDMA/RXE:修复不安全的排水队列队列代码(CVE-2023-53528) | 2025-10-01 | ||
| AVD-2023-53527 | Thunderbolt:修复内存泄漏tb_handle_dp_bandwidth_request()(CVE-2023-53527) | 2025-10-01 | ||
| AVD-2023-53526 | JBD2:从检查点删除(CVE-2023-53526)之前,请检查'JH-> B_Transaction' | 2025-10-01 | ||
| AVD-2023-53523 | CAN:GS_USB:修复时间戳记反初始化(CVE-2023-53523) | 2025-10-01 | ||
| AVD-2023-53520 | 蓝牙:修复HCI_SUSPEND_SYNC崩溃(CVE-2023-53520) | 2025-10-01 | ||
| AVD-2023-53519 | 媒体:V4L2-MEM2MEM:添加锁定以保护参数num_rdy(CVE-2023-53519) | 2025-10-01 | ||
| AVD-2023-53518 | PM / DEVFREQ:修复DevFreq_Dev_Release()(CVE-2023-53518)中的修复泄漏 | 2025-10-01 | ||
| AVD-2023-53516 | MacVlan:为IFLA_MACVLAN_BC_CUTOFF(CVE-2023-53516)添加忘记的NLA_POLICY | 2025-10-01 | ||
| AVD-2023-53515 | Virtio-Mio:不要打破VM_DEV的生命周期(CVE-2023-53515) | 2025-10-01 | ||
| AVD-2023-53513 | NBD:修复IOCTL ARG的不完整验证(CVE-2023-53513) | 2025-10-01 | ||
| AVD-2023-53510 | SCSI:UFS:核心:LRBP-> CMD的修复处理(CVE-2023-53510) | 2025-10-01 | ||
| AVD-2023-53508 | UBLK:如果排队设置中断,则无法启动设备(CVE-2023-53508) | 2025-10-01 | ||
| AVD-2023-53507 | NET/MLX5:如果接口降低,请登录DevLink参数(CVE-2023-53507) | 2025-10-01 | ||
| AVD-2023-53506 | UDF:不要打扰将很长的范围(CVE-2023-53506)合并 | 2025-10-01 | ||
| AVD-2023-53505 | CLK:TEGRA:TEGRA124-EMC:修复潜在内存泄漏(CVE-2023-53505) | 2025-10-01 |