搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-21714 | RDMA/MLX5:免费后修复隐式ODP使用(CVE-2025-21714) | 2025-02-27 | ||
| AVD-2025-21712 | MD/MD-BITMAP:与位图寿命(CVE-2025-21712)同步BitMap_get_stats() | 2025-02-27 | ||
| AVD-2025-21711 | 净/玫瑰:Rose_setsockopt中的防止整数溢出() | 2025-02-27 | ||
| AVD-2025-21710 | TCP:正确处理极端记忆挤压(CVE-2025-21710) | 2025-02-27 | ||
| AVD-2025-21709 | 内核:对DUP_MMAP()失败和UPROBE注册(CVE-2025-21709)请更加谨慎 | 2025-02-27 | ||
| AVD-2025-21708 | 网络:USB:RTL8150:启用基本端点检查(CVE-2025-21708) | 2025-02-27 | ||
| AVD-2025-21707 | MPTCP:合并次级状态(CVE-2025-21707) | 2025-02-27 | ||
| AVD-2025-21706 | MPTCP:PM:仅设置subflow Endp(CVE-2025-21706)的FullMesh | 2025-02-27 | ||
| AVD-2025-21705 | MPTCP:正确处理FastOpen断开连接(CVE-2025-21705) | 2025-02-27 | ||
| AVD-2024-57999 | POWERPC/PSERIES/IOMMU:IOMMU错误地标记了DDW中的MMIO范围(CVE-2024-57999) | 2025-02-27 | ||
| AVD-2024-57998 | OPP:添加索引检查以避免_read_freq()(CVE-2024-57998)中的缓冲区溢出 | 2025-02-27 | ||
| AVD-2024-57997 | WiFi:WCN36XX:修复通道调查记忆分配大小(CVE-2024-57997) | 2025-02-27 | ||
| AVD-2024-57996 | net_sched:sch_sfq:不允许1个数据包限制(CVE-2024-57996) | 2025-02-27 | ||
| AVD-2024-57995 | wifi:ath12k:修复在ATH12K_MAC_ASSIGN_VIF_TO_VDEV()(CVE-2024-57995)中免费读取指针。 | 2025-02-27 | ||
| AVD-2024-57994 | ptr_ring:请勿阻止ptr_ring_resize_multiple()(CVE-2024-57994)中的硬中断 | 2025-02-27 | ||
| AVD-2024-57993 | HID:HID-THRUSTMASTER:通过添加端点检查(CVE-2024-57993)在Throustmaster_probe中修复警告 | 2025-02-27 | ||
| AVD-2024-57990 | WiFi:MT76:MT7925:MT7925_LOAD_CLC()(CVE-2024-57990)中的一个修复 | 2025-02-27 | ||
| AVD-2024-57989 | WiFi:MT76:MT7925:修复Null Deref检查MT7925_CHANGE_VIF_LINKS(CVE-2024-57989) | 2025-02-27 | ||
| AVD-2024-57988 | 蓝牙:BTBCM:修复null deref中的btbcm_get_board_name()(CVE-2024-57988) | 2025-02-27 | ||
| AVD-2024-57987 | 蓝牙:btrtl:在btrtl_setup_realtek()(CVE-2024-57987)中检查null | 2025-02-27 | ||
| AVD-2024-57986 | HID:核心:修复假设,即分辨率乘数必须在逻辑集合中(CVE-2024-57986) | 2025-02-27 | ||
| AVD-2024-57985 | 固件:QCOM:SCM:探针故障上的清理全局'__scm'(CVE-2024-57985) | 2025-02-27 | ||
| AVD-2024-57984 | i3c:DW:由于种族条件而在DW_I3C_Master驱动程序中不使用时使用(CVE-2024-57984) | 2025-02-27 | ||
| AVD-2024-57982 | XFRM:状态:在查找过程中读取的修复外读取(CVE-2024-57982) | 2025-02-27 | ||
| AVD-2024-57981 | USB:XHCI:修复对某些命令中止的null指针解除(CVE-2024-57981) | 2025-02-27 | ||
| AVD-2024-57980 | 媒体:UVCVIDEO:修复双免费错误路径(CVE-2024-57980) | 2025-02-27 | ||
| AVD-2024-57979 | pps:修复UAF漏洞(CVE-2024-57979) | 2025-02-27 | ||
| AVD-2024-57978 | 媒体:IMX-JPEG:修复潜在的错误指针在distach_pm()(CVE-2024-57978)中取消指示 | 2025-02-27 | ||
| AVD-2024-57977 | MEMCG:修复OOM过程中的软锁定(CVE-2024-57977) | 2025-02-27 | ||
| AVD-2024-57976 | btrfs:cow_file_range()失败时进行适当的作品集清理(CVE-2024-57976) | 2025-02-27 |