搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2023-53364 | 调节器:DA9063:最好用部分DT(CVE-2023-53364)修复Null Deref | 2025-09-17 | ||
| AVD-2023-53363 | PCI:PCI_BUS_RELEASE_DOMAIN_NR()(CVE-2023-53363) | 2025-09-17 | ||
| AVD-2023-53362 | 总线:FSL-MC:不要以为儿童设备都是FSL-MC设备(CVE-2023-53362) | 2025-09-17 | ||
| AVD-2023-53361 | loongarch:mm:添加p?d_leaf()定义(CVE-2023-53361) | 2025-09-17 | ||
| AVD-2023-53360 | NFSV4.2:read_plus的返工刮擦处理(再次)(CVE-2023-53360) | 2025-09-17 | ||
| AVD-2023-53359 | USB:使用使用debugfs_lookup()(CVE-2023-53359)修复内存泄漏 | 2025-09-17 | ||
| AVD-2023-53358 | KSMBD:Cocurrent SMB2树脱离连接下的修复问题(CVE-2023-53358) | 2025-09-17 | ||
| AVD-2023-53357 | MD/RAID10:在MD_BITMAP_GET_COUNTR(CVE-2023-53357)中检查板的板块 | 2025-09-17 | ||
| AVD-2023-53356 | USB:小工具:u_serial:添加null指针检查GSERIAL_SUSPEND(CVE-2023-53356) | 2025-09-17 | ||
| AVD-2023-53355 | 分期:PI433:使用Debugfs_lookup()(CVE-2023-53355)修复内存泄漏 | 2025-09-17 | ||
| AVD-2023-53354 | SKBUFF:SKB_SEMENG,在使用Skbuff Frags之前调用零复制功能(CVE-2023-53354) | 2025-09-17 | ||
| AVD-2023-53353 | ACCEL/HABANALABS:推迟MEM_MGR IDR破坏到Hpriv_Release()(CVE-2023-53353) | 2025-09-17 | ||
| AVD-2023-53352 | DRM/TTM:交换时访问零指针(CVE-2023-53352) | 2025-09-17 | ||
| AVD-2023-53351 | DRM/Sched:在致电超时处理之前检查调度程序工作队列(CVE-2023-53351) | 2025-09-17 | ||
| AVD-2023-53350 | 加速/QAIC:修复切片内存泄漏(CVE-2023-53350) | 2025-09-17 | ||
| AVD-2023-53349 | 媒体:OV2740:修复OV2740_INIT_CONTROLS()(CVE-2023-53349)中的memleak | 2025-09-17 | ||
| AVD-2023-53348 | BTRFS:解决僵局在使用SCRUB搬迁期间中止交易时(CVE-2023-53348) | 2025-09-17 | ||
| AVD-2023-53347 | NET/MLX5:通过上行链路UN/LOAD API(CVE-2023-53347)处理E-SWitch的配对 | 2025-09-17 | ||
| AVD-2023-53346 | 内核/fail_function:使用debugfs_lookup()(CVE-2023-53346)修复内存泄漏 | 2025-09-17 | ||
| AVD-2023-53345 | RXRPC:修复RXRPC_WAIT_TO_BE_CONNEDED()(CVE-2023-53345)中的潜在数据竞赛 | 2025-09-17 | ||
| AVD-2023-53344 | CAN:BCM:BCM_TX_SETUP():修复VFS_WRITE中的KMSAN UNINIT-VALUE(CVE-2023-53344) | 2025-09-17 | ||
| AVD-2023-53343 | ICMP6:ip6_null_entry-> rt6i_idev()中的IP6_NULL_ENTRY->修复NULL-PTR-DEREF()。 (CVE-2023-53343) | 2025-09-17 | ||
| AVD-2023-53342 | 网络:Marvell:Prestera:使用NHID(CVE-2023-53342)修复处理IPv4路线 | 2025-09-17 | ||
| AVD-2023-53341 | /fdt:运行SOC内存设置时 | 2025-09-17 | ||
| AVD-2023-53340 | NET/MLX5:收集仅针对已知命令的命令故障数据(CVE-2023-53340) | 2025-09-17 | ||
| AVD-2023-53339 | BTRFS:BTRFS_CANCEL_BALANCE(CVE-2023-53339)中的FIX BUG_ON条件 | 2025-09-17 | ||
| AVD-2023-53338 | LWT:BPF XMIT OPS的修复返回值(CVE-2023-53338) | 2025-09-17 | ||
| AVD-2023-53337 | NILFS2:脱落到只读后,请勿编写肮脏的数据(CVE-2023-53337) | 2025-09-17 | ||
| AVD-2023-53336 | 媒体:IPU-Bridge:修复Null指针DEREF在SSDB/PLD解析警告上(CVE-2023-5336) | 2025-09-17 | ||
| AVD-2023-53335 | RDMA/CXGB4:修复pass_establish()(CVE-2023-53335)中的潜在null-ptr-deref | 2025-09-17 |