搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2023-53520 | 蓝牙:修复HCI_SUSPEND_SYNC崩溃(CVE-2023-53520) | 2025-10-01 | ||
| AVD-2023-53519 | 媒体:V4L2-MEM2MEM:添加锁定以保护参数num_rdy(CVE-2023-53519) | 2025-10-01 | ||
| AVD-2023-53518 | PM / DEVFREQ:修复DevFreq_Dev_Release()(CVE-2023-53518)中的修复泄漏 | 2025-10-01 | ||
| AVD-2023-53517 | 提示:如果MTU谈判太小,请勿更新MTU(CVE-2023-53517) | 2025-10-01 | ||
| AVD-2023-53516 | MacVlan:为IFLA_MACVLAN_BC_CUTOFF(CVE-2023-53516)添加忘记的NLA_POLICY | 2025-10-01 | ||
| AVD-2023-53515 | Virtio-Mio:不要打破VM_DEV的生命周期(CVE-2023-53515) | 2025-10-01 | ||
| AVD-2023-53514 | GPU:HOST1X:修复设备名称的内存泄漏(CVE-2023-53514) | 2025-10-01 | ||
| AVD-2023-53513 | NBD:修复IOCTL ARG的不完整验证(CVE-2023-53513) | 2025-10-01 | ||
| AVD-2023-53512 | SCSI:MPT3SAS:修复内存泄漏(CVE-2023-53512) | 2025-10-01 | ||
| AVD-2023-53511 | io_uring:修复FGET泄漏时FS不支持NOTAIT缓冲读取(CVE-2023-53511) | 2025-10-01 | ||
| AVD-2023-53510 | SCSI:UFS:核心:LRBP-> CMD的修复处理(CVE-2023-53510) | 2025-10-01 | ||
| AVD-2023-53509 | QED:允许在QED_MCP_TRACE_DUMP()(CVE-2023-53509)中睡觉 | 2025-10-01 | ||
| AVD-2023-53508 | UBLK:如果排队设置中断,则无法启动设备(CVE-2023-53508) | 2025-10-01 | ||
| AVD-2023-53507 | NET/MLX5:如果接口降低,请登录DevLink参数(CVE-2023-53507) | 2025-10-01 | ||
| AVD-2023-53506 | UDF:不要打扰将很长的范围(CVE-2023-53506)合并 | 2025-10-01 | ||
| AVD-2023-53505 | CLK:TEGRA:TEGRA124-EMC:修复潜在内存泄漏(CVE-2023-53505) | 2025-10-01 | ||
| AVD-2023-53504 | rdma/bnxt_re:正确订购ib_device_unalloc()避免使用UAF(CVE-2023-53504) | 2025-10-01 | ||
| AVD-2023-53503 | ext4:允许ext4_get_group_info()失败(CVE-2023-53503) | 2025-10-01 | ||
| AVD-2023-53501 | iOmmu/amd/iommu_v2:修复Pasid_state重新计数DEC命中0警告Pasid Unbind(CVE-2023-53501) | 2025-10-01 | ||
| AVD-2023-53500 | XFRM:在Decode_session6(CVE-2023-53500)中修复不使用板 | 2025-10-01 | ||
| AVD-2023-53499 | virtio_net:修复XDP初始化的解释(CVE-2023-53499) | 2025-10-01 | ||
| AVD-2023-53498 | DRM/AMD/显示:修复潜在的无效解释(CVE-2023-53498) | 2025-10-01 | ||
| AVD-2023-53497 | 媒体:VSP1:用VB2_START_STREAMING_CALLED()替换VB2_IS_STREAMING()(CVE-2023-53497) | 2025-10-01 | ||
| AVD-2023-53496 | x86/platform/uv:使用套接字的替代源到节点数据(CVE-2023-53496) | 2025-10-01 | ||
| AVD-2023-53495 | 网络:以太网:mvpp2_main:修复可能的OOB写入MVPP2_ETHTOOL_GET_RXNFC()(CVE-2023-53495) | 2025-10-01 | ||
| AVD-2023-53494 | 加密:XTS-正确处理eBusy(CVE-2023-53494) | 2025-10-01 | ||
| AVD-2023-53493 | ACCEL/QAIC:拧紧在decode_message()(CVE-2023-53493)中进行检查的界限 | 2025-10-01 | ||
| AVD-2023-53492 | NETFILTER:NF_TABLES:通过ID查找链(CVE-2023-53492)时不要忽略GenMask | 2025-10-01 | ||
| AVD-2023-53491 | start_kernel:添加__no_stack_protector函数属性(CVE-2023-53491) | 2025-10-01 | ||
| AVD-2023-53490 | MPTCP:修复断开与接受竞赛(CVE-2023-53490) | 2025-10-01 |