搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2023-53439 | NET:SKB_PARTIAL_CSUM_SET()针对传输标头魔术值的修复(CVE-2023-53439) | 2025-09-19 | ||
| AVD-2023-53438 | X86/MCE:如果毒错误,请始终将CS寄存器保存在AMD ZEN上(CVE-2023-53438) | 2025-09-19 | ||
| AVD-2023-53437 | 媒体:UVCVIDEO:用无效的描述符处理摄像机(CVE-2023-53437) | 2025-09-19 | ||
| AVD-2023-53436 | SCSI:SNIC:修复可能的内存泄漏,如果Device_add()失败(CVE-2023-53436) | 2025-09-19 | ||
| AVD-2023-53435 | Cassini:修复CAS_INIT_ONE()(CVE-2023-53435)的错误处理路径中的内存泄漏 | 2025-09-19 | ||
| AVD-2023-53434 | remoteproc:imx_dsp_rproc:添加i.mx DSP内核的自定义内存副本实现(CVE-2023-53434) | 2025-09-19 | ||
| AVD-2023-53433 | net:添加vlan_get_protocol_and_depth()助手(CVE-2023-53433) | 2025-09-19 | ||
| AVD-2023-53432 | FIREWIRE:NET:在FWNET_FINISH_INCOMING_PACKET()(CVE-2023-53432)中免费免费使用后修复使用。 | 2025-09-19 | ||
| AVD-2023-53431 | SCSI:SES:如果外壳没有组件(CVE-2023-53431),请不要附加 | 2025-09-19 | ||
| AVD-2023-53430 | WiFi:MT76:DMA:修复内存泄漏运行MT76_DMA_TX_CLEANUP(CVE-2023-53430) | 2025-09-19 | ||
| AVD-2023-53429 | BTRFS:请勿在__extent_writepage(CVE-2023-53429)中检查PageError | 2025-09-19 | ||
| AVD-2023-53428 | PowerCap:ARM_SCMI:解析区域时删除递归(CVE-2023-53428) | 2025-09-19 | ||
| AVD-2023-53427 | CIFS:销毁MR列表时修复警告和UAF(CVE-2023-53427) | 2025-09-19 | ||
| AVD-2023-53426 | XSK:修复XSK_DIAG套接字清理期间的无用错误(CVE-2023-53426) | 2025-09-19 | ||
| AVD-2023-53425 | 媒体:平台:MediAtek:VPU:修复NULL PTR解码(CVE-2023-53425) | 2025-09-19 | ||
| AVD-2023-53424 | CLK:MediAtek:Fix of_iomap内存泄漏(CVE-2023-53424) | 2025-09-19 | ||
| AVD-2023-53423 | OBJTOOL:修复内存泄漏在Create_static_call_sections()(CVE-2023-53423)中 | 2025-09-19 | ||
| AVD-2023-53422 | wifi:iwlwifi:fw:修复debugfs中的内存泄漏(CVE-2023-53422) | 2025-09-19 | ||
| AVD-2023-53421 | blk-croup:reniT blkg_iostat_set在blkcg_reset_stats()中清除后(CVE-2023-53421) | 2025-09-19 | ||
| AVD-2023-53420 | NTFS:解决由NTFS_ListXATTR()(CVE-2023-53420)引起的板块的恐慌 | 2025-09-19 | ||
| AVD-2023-53419 | rcu:protect rcu_print_task_exp_stall() - > exp_tasks Access(CVE-2023-53419) | 2025-09-19 | ||
| AVD-2022-50419 | 蓝牙:HCI_SYSFS:修复尝试多次致电Device_Add(CVE-2022-50419) | 2025-09-19 | ||
| AVD-2022-50418 | WiFi:ATH11K:MHI:修复ATH11K_MHI_REGISTER中的潜在内存泄漏()(CVE-2022-50418) | 2025-09-19 | ||
| AVD-2022-50417 | DRM/Panfrost:修复GEM HANDS CREETION REF-COUSTING(CVE-2022-50417) | 2025-09-19 | ||
| AVD-2022-50416 | IRQCHIP/WPCM450:修复WPCM450_AIC_OF_INIT中的内存泄漏()(CVE-2022-50416) | 2025-09-19 | ||
| AVD-2022-50415 | PARISC:LED:在start_task()(CVE-2022-50415)中修复潜在的null-ptr-deref | 2025-09-19 | ||
| AVD-2022-50414 | SCSI:FCOE:FCOE:FCOE_IF_INIT()失败(CVE-2022-50414)时修复运输未达到 | 2025-09-19 | ||
| AVD-2022-50413 | WiFi:MAC80211:修复不使用时(CVE-2022-50413) | 2025-09-19 | ||
| AVD-2022-50412 | DRM:桥梁:Adv7511:CEC适配器后取消注册CEC I2C设备(CVE-2022-50412) | 2025-09-19 | ||
| AVD-2022-50411 | ACPICA:修复错误代码路径ACPI_DS_CALL_CONTROL_METHOD()(CVE-2022-50411) | 2025-09-19 |