搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2023-53531 | null_blk:修复投票请求超时处理(CVE-2023-53531) | 2025-10-01 | ||
| AVD-2023-53530 | SCSI:QLA2XXX:使用RAW_SMP_PROCESSOR_ID()代替SMP_PROCESSOR_ID()(CVE-2023-53530) | 2025-10-01 | ||
| AVD-2023-53528 | RDMA/RXE:修复不安全的排水队列队列代码(CVE-2023-53528) | 2025-10-01 | ||
| AVD-2023-53527 | Thunderbolt:修复内存泄漏tb_handle_dp_bandwidth_request()(CVE-2023-53527) | 2025-10-01 | ||
| AVD-2023-53526 | JBD2:从检查点删除(CVE-2023-53526)之前,请检查'JH-> B_Transaction' | 2025-10-01 | ||
| AVD-2023-53523 | CAN:GS_USB:修复时间戳记反初始化(CVE-2023-53523) | 2025-10-01 | ||
| AVD-2023-53520 | 蓝牙:修复HCI_SUSPEND_SYNC崩溃(CVE-2023-53520) | 2025-10-01 | ||
| AVD-2023-53519 | 媒体:V4L2-MEM2MEM:添加锁定以保护参数num_rdy(CVE-2023-53519) | 2025-10-01 | ||
| AVD-2023-53518 | PM / DEVFREQ:修复DevFreq_Dev_Release()(CVE-2023-53518)中的修复泄漏 | 2025-10-01 | ||
| AVD-2023-53516 | MacVlan:为IFLA_MACVLAN_BC_CUTOFF(CVE-2023-53516)添加忘记的NLA_POLICY | 2025-10-01 | ||
| AVD-2023-53515 | Virtio-Mio:不要打破VM_DEV的生命周期(CVE-2023-53515) | 2025-10-01 | ||
| AVD-2023-53513 | NBD:修复IOCTL ARG的不完整验证(CVE-2023-53513) | 2025-10-01 | ||
| AVD-2023-53510 | SCSI:UFS:核心:LRBP-> CMD的修复处理(CVE-2023-53510) | 2025-10-01 | ||
| AVD-2023-53508 | UBLK:如果排队设置中断,则无法启动设备(CVE-2023-53508) | 2025-10-01 | ||
| AVD-2023-53507 | NET/MLX5:如果接口降低,请登录DevLink参数(CVE-2023-53507) | 2025-10-01 | ||
| AVD-2023-53506 | UDF:不要打扰将很长的范围(CVE-2023-53506)合并 | 2025-10-01 | ||
| AVD-2023-53505 | CLK:TEGRA:TEGRA124-EMC:修复潜在内存泄漏(CVE-2023-53505) | 2025-10-01 | ||
| AVD-2023-53504 | rdma/bnxt_re:正确订购ib_device_unalloc()避免使用UAF(CVE-2023-53504) | 2025-10-01 | ||
| AVD-2023-53501 | iOmmu/amd/iommu_v2:修复Pasid_state重新计数DEC命中0警告Pasid Unbind(CVE-2023-53501) | 2025-10-01 | ||
| AVD-2023-53500 | XFRM:在Decode_session6(CVE-2023-53500)中修复不使用板 | 2025-10-01 | ||
| AVD-2023-53496 | x86/platform/uv:使用套接字的替代源到节点数据(CVE-2023-53496) | 2025-10-01 | ||
| AVD-2023-53495 | 网络:以太网:mvpp2_main:修复可能的OOB写入MVPP2_ETHTOOL_GET_RXNFC()(CVE-2023-53495) | 2025-10-01 | ||
| AVD-2023-53494 | 加密:XTS-正确处理eBusy(CVE-2023-53494) | 2025-10-01 | ||
| AVD-2023-53493 | ACCEL/QAIC:拧紧在decode_message()(CVE-2023-53493)中进行检查的界限 | 2025-10-01 | ||
| AVD-2023-53492 | NETFILTER:NF_TABLES:通过ID查找链(CVE-2023-53492)时不要忽略GenMask | 2025-10-01 | ||
| AVD-2023-53491 | start_kernel:添加__no_stack_protector函数属性(CVE-2023-53491) | 2025-10-01 | ||
| AVD-2023-53490 | MPTCP:修复断开与接受竞赛(CVE-2023-53490) | 2025-10-01 | ||
| AVD-2023-53489 | TCP/UDP:使用TX Timestamp修复SK和Zerocopy SKB的Memleaks。 (CVE-2023-53489) | 2025-10-01 | ||
| AVD-2023-53488 | IB/HFI1:在热插管时修复可能的恐慌(CVE-2023-53488) | 2025-10-01 | ||
| AVD-2023-53487 | POWERPC/RTAS_FLASH:允许用户复制到Flash Block缓存对象(CVE-2023-53487) | 2025-10-01 |