搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-21826 | NETFILTER:NF_TABLES:拒绝field_len的不匹配和设置密钥长度(CVE-2025-21826) | 2025-03-07 | ||
| AVD-2025-21825 | BPF:通过preempt_rt(CVE-2025-21825)取消运行的BPF_Timer | 2025-03-07 | ||
| AVD-2024-58075 | 加密:Tegra- Tegra Init失败时请勿转移REQ(CVE-2024-58075) | 2025-03-07 | ||
| AVD-2024-58072 | wifi:rtlwifi:删除未使用的check_buddy_priv(CVE-2024-58072) | 2025-03-07 | ||
| AVD-2024-58071 | 团队:防止添加已经是团队设备较低的设备(CVE-2024-58071) | 2025-03-07 | ||
| AVD-2024-58070 | BPF:bpf_local_storage:始终在preempt_rt中使用bpf_mem_alloc(CVE-2024-58070) | 2025-03-07 | ||
| AVD-2024-58069 | RTC:PCF85063:修复潜在的OOB写入PCF85063 NVMEM读取(CVE-2024-58069) | 2025-03-07 | ||
| AVD-2024-58068 | OPP:FIX DEV_PM_OPP_FIND_BW _*()未初始化带宽表(CVE-2024-58068) | 2025-03-07 | ||
| AVD-2024-58063 | wifi:rtlwifi:修复记忆泄漏和探针错误路径的无效访问(CVE-2024-58063) | 2025-03-07 | ||
| AVD-2024-58062 | wifi:iwlwifi:MVM:避免零指针解除(CVE-2024-58062) | 2025-03-07 | ||
| AVD-2024-58061 | WiFi:MAC80211:禁止停用所有链接(CVE-2024-58061) | 2025-03-07 | ||
| AVD-2024-58060 | BPF:拒绝使用模块PTR和模块BTF_ID的struct_ops注册(CVE-2024-58060) | 2025-03-07 | ||
| AVD-2024-58058 | UBIFS:Zroot为Null时跳过倾倒TNC树(CVE-2024-58058) | 2025-03-07 | ||
| AVD-2024-58057 | IDPF:转换为未绑定的工作类别(CVE-2024-58057) | 2025-03-07 | ||
| AVD-2024-58056 | remoteproc:核心:未分配时修复IDA_FRE通话(CVE-2024-58056) | 2025-03-07 | ||
| AVD-2024-58055 | USB:小工具:F_TCM:不要立即释放命令(CVE-2024-58055) | 2025-03-07 | ||
| AVD-2024-58054 | 登台:媒体:Max96712:删除模块时修复内核oops(CVE-2024-58054) | 2025-03-07 | ||
| AVD-2024-58053 | RXRPC:修复接收连接的处理(CVE-2024-58053) | 2025-03-07 | ||
| AVD-2024-58052 | DRM/AMDGPU:修复Atomctrl_get_smc_sclk_range_table(CVE-2024-58052)中的潜在null指针取消指示 | 2025-03-07 | ||
| AVD-2024-58051 | IPMI:IPMB:添加检查DEVM_KASPRINTF()返回值(CVE-2024-58051) | 2025-03-07 | ||
| AVD-2024-5667 | 多个插件<=(各种版本) - 通过Featherlight.js JavaScript库(CVE-2024-5667)的基于DOM的跨站点脚本存储的(贡献者+)存储的跨站点脚本 | 2025-03-05 | ||
| AVD-2025-21823 | 蝙蝠侠-ADV:丢弃非托管的ELP公制工作者(CVE-2025-21823) | 2025-02-28 | ||
| AVD-2025-21821 | FBDEV:OMAP:使用螺纹IRQ进行LCD DMA(CVE-2025-21821) | 2025-02-28 | ||
| AVD-2025-21820 | tty:xilinx_uartps:Split sysrq处理(CVE-2025-21820) | 2025-02-28 | ||
| AVD-2025-21819 | 还原“ DRM/AMD/DISPAINAL:使用HW锁MGR用于PSR1”(CVE-2025-21819) | 2025-02-28 | ||
| AVD-2025-21817 | 块:标记GFP_NOIO围绕SYSFS-> Store()(CVE-2025-21817) | 2025-02-28 | ||
| AVD-2025-21816 | HRTIMERS:在CPUHP_AP_HRTIMERS_DYING(CVE-2025-21816)之后排队迁移HRTIMERS迁移。 | 2025-02-28 | ||
| AVD-2025-21815 | mm/压实:修复乌巴桑跨越局部警告(CVE-2025-21815) | 2025-02-28 | ||
| AVD-2025-21814 | PTP:确保info->始终设置启用回调(CVE-2025-21814) | 2025-02-28 | ||
| AVD-2025-21813 | 计时器/迁移:修复逐一的根部错误连接(CVE-2025-21813) | 2025-02-28 |