搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-21745 | blk-croup:修复类 @block_class的子系统重新计算泄漏(CVE-2025-21745) | 2025-02-27 | ||
| AVD-2025-21744 | wifi:brcmfmac:修复brcmf_txfinalize()(CVE-2025-21744)中的null指针删除 | 2025-02-27 | ||
| AVD-2025-21743 | USBNET:IPHETH:修复DPE长度检查中可能的溢出(CVE-2025-21743) | 2025-02-27 | ||
| AVD-2025-21742 | USBNET:IPHETH:使用URB中的静态NDP16位置(CVE-2025-21742) | 2025-02-27 | ||
| AVD-2025-21741 | USBNET:IPHETH:修复DPE OOB阅读(CVE-2025-21741) | 2025-02-27 | ||
| AVD-2025-21739 | SCSI:UFS:核心:在INIT错误中免费修复使用后使用并删除路径(CVE-2025-21739) | 2025-02-27 | ||
| AVD-2025-21738 | ATA:LIBATA-SFF:确保我们不能在分配的缓冲区外写(CVE-2025-21738) | 2025-02-27 | ||
| AVD-2025-21736 | NILFS2:修复NILFS_FIEMAP()(CVE-2025-21736)中可能的INT溢出 | 2025-02-27 | ||
| AVD-2025-21735 | NFC:NCI:在NCI_HCI_CREATE_PIPE()(CVE-2025-21735)中添加界限检查 | 2025-02-27 | ||
| AVD-2025-21734 | MISC:FASTRPC:修复复制缓冲区页面大小(CVE-2025-21734) | 2025-02-27 | ||
| AVD-2025-21733 | 跟踪/osnoise:修复跟踪点的重置(CVE-2025-21733) | 2025-02-27 | ||
| AVD-2025-21732 | RDMA/MLX5:修复ODP MR的比赛,该竞赛导致CQE错误(CVE-2025-21732) | 2025-02-27 | ||
| AVD-2024-58020 | HID:Multitouch:在MT_INPUT_CONFIGURED中添加NULL检查(CVE-2024-58020) | 2025-02-27 | ||
| AVD-2024-58019 | NVKM/GSP:正确推进GSP消息队列的读取指针(CVE-2024-58019) | 2025-02-27 | ||
| AVD-2024-58018 | NVKM:正确计算GSP CMDQ缓冲区的可用空间(CVE-2024-58018) | 2025-02-27 | ||
| AVD-2024-58017 | printk:定义log_buf_len_max(CVE-2024-58017)时修复签名的整数溢出 | 2025-02-27 | ||
| AVD-2024-58016 | SAFESETID:策略写入尺寸(CVE-2024-58016) | 2025-02-27 | ||
| AVD-2024-58015 | wifi:ath12k:解决边界外访问错误(CVE-2024-58015) | 2025-02-27 | ||
| AVD-2024-58014 | WiFi:BRCMSMAC:添加增益范围检查到WLC_PHY_IQCAL_GAINPARAMS_NPHY()(CVE-2024-58014) | 2025-02-27 | ||
| AVD-2024-58013 | 蓝牙:mgmt:修复板条 - 使用后免费阅读,请阅读mgmt_remove_adv_monitor_sync(CVE-2024-58013) | 2025-02-27 | ||
| AVD-2024-58012 | ASOC:SOF:INTEL:HDA-DAI:确保DAI小部件在参数期间有效(CVE-2024-58012) | 2025-02-27 | ||
| AVD-2024-58011 | 平台/X86:INT3472:检查ADEV == NULL(CVE-2024-58011) | 2025-02-27 | ||
| AVD-2024-58010 | BINFMT_FLAT:修复32位系统上的整数溢出错误(CVE-2024-58010) | 2025-02-27 | ||
| AVD-2024-58009 | 蓝牙:L2CAP:在L2CAP_SOCK_ALLOC(CVE-2024-58009)中处理Null Sock指针 | 2025-02-27 | ||
| AVD-2024-58008 | 密钥:值得信赖:DCP:FIX不正确的SG与config_vmap_stack = y(CVE-2024-58008) | 2025-02-27 | ||
| AVD-2024-58007 | SOC:QCOM:SOCINFO:避免阅读序列号的界限(CVE-2024-58007) | 2025-02-27 | ||
| AVD-2024-58006 | PCI:DWC:EP:在PCI_EPC_SET_BAR()(CVE-2024-58006)中预防更改条尺寸/标志 | 2025-02-27 | ||
| AVD-2024-58005 | TPM:在EventLog/acpi.c(CVE-2024-58005)中更改为kvalloc() | 2025-02-27 | ||
| AVD-2024-58004 | 媒体:Intel/ipu6:删除错误QOS QOS请求(CVE-2024-58004) | 2025-02-27 | ||
| AVD-2024-58003 | 媒体:I2C:DS90UB9X3:修复Extra Fwnode_handle_put()(CVE-2024-58003) | 2025-02-27 |