| CVE-2024-42283 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-42276 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-42239 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-42236 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-42161 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-42145 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-42143 |
** REJECT \** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Moderate |
kernel:4.19, kernel:5.10, kernel |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-42095 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-42082 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-41081 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-41050 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-41045 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-41027 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-41004 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-40980 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-40953 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-40947 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-40905 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-39489 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-39480 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-38780 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-38612 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-38601 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-38577 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-38543 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-36936 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-36894 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-36031 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-36015 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35991 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35990 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-35984 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35976 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35950 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-35922 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35904 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35879 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35840 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-35833 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-35826 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35822 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-22 |
| CVE-2024-35797 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-35791 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-35247 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-31449 |
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Important |
redis, redis:6 |
否 |
完成修复 |
2024-12-19 |
2026-01-04 |
| CVE-2024-27408 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-27405 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-27403 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-27389 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-27037 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-27004 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-27002 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-27000 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26988 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26970 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26969 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26965 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26893 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26877 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26866 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26845 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26814 |
In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/fsl-mc: Block calling interrupt handler without trigger\n\nThe eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is\ninitially NULL and may become NULL if the user sets the trigger\neventfd to -1. The interrupt handler itself is guaranteed that\ntrigger is always valid between request_irq() and free_irq(), but\nthe loopback testing mechanisms to invoke the handler function\nneed to test the trigger. The triggering and setting ioctl paths\nboth make use of igate and are therefore mutually exclusive.\n\nThe vfio-fsl-mc driver does not make use of irqfds, nor does it\nsupport any sort of masking operations, therefore unlike vfio-pci\nand vfio-platform, the flow can remain essentially unchanged. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26813 |
In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/platform: Create persistent IRQ handlers\n\nThe vfio-platform SET_IRQS ioctl currently allows loopback triggering of\nan interrupt before a signaling eventfd has been configured by the user,\nwhich thereby allows a NULL pointer dereference.\n\nRather than register the IRQ relative to a valid trigger, register all\nIRQs in a disabled state in the device open path. This allows mask\noperations on the IRQ to nest within the overall enable state governed\nby a valid eventfd signal. This decouples @masked, protected by the\n@locked spinlock from @trigger, protected via the @igate mutex.\n\nIn doing so, it's guaranteed that changes to @trigger cannot race the\nIRQ handlers because the IRQ handler is synchronously disabled before\nmodifying the trigger, and loopback triggering of the IRQ via ioctl is\nsafe due to serialization with trigger changes via igate.\n\nFor compatibility, request_irq() failures are maintained to be local to\nthe SET_IRQS ioctl rather than a fatal error in the open device path.\nThis allows, for example, a userspace driver with polling mode support\nto continue to work regardless of moving the request_irq() call site.\nThis necessarily blocks all SET_IRQS access to the failed index. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26812 |
In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Create persistent INTx handler\n\nA vulnerability exists where the eventfd for INTx signaling can be\ndeconfigured, which unregisters the IRQ handler but still allows\neventfds to be signaled with a NULL context through the SET_IRQS ioctl\nor through unmask irqfd if the device interrupt is pending.\n\nIdeally this could be solved with some additional locking; the igate\nmutex serializes the ioctl and config space accesses, and the interrupt\nhandler is unregistered relative to the trigger, but the irqfd path\nruns asynchronous to those. The igate mutex cannot be acquired from the\natomic context of the eventfd wake function. Disabling the irqfd\nrelative to the eventfd registration is potentially incompatible with\nexisting userspace.\n\nAs a result, the solution implemented here moves configuration of the\nINTx interrupt handler to track the lifetime of the INTx context object\nand irq_type configuration, rather than registration of a particular\ntrigger eventfd. Synchronization is added between the ioctl path and\neventfd_signal() wrapper such that the eventfd trigger can be\ndynamically updated relative to in-flight interrupts or irqfd callbacks. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26790 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26788 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26782 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26778 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26777 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26771 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26747 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26746 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26736 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26718 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26715 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26668 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26641 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2024-26630 |
In the Linux kernel, the following vulnerability has been resolved:\n\nmm: cachestat: fix folio read-after-free in cache walk\n\nIn cachestat, we access the folio from the page cache's xarray to compute\nits page offset, and check for its dirty and writeback flags. However, we\ndo not hold a reference to the folio before performing these actions,\nwhich means the folio can concurrently be released and reused as another\nfolio/page/slab.\n\nGet around this altogether by just using xarray's existing machinery for\nthe folio page offsets and dirty/writeback states.\n\nThis changes behavior for tmpfs files to now always report zeroes in their\ndirty and writeback counters. This is okay as tmpfs doesn't follow\nconventional writeback cache behavior: its pages get "cleaned" during\nswapout, after which they're no longer resident etc. |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26629 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26598 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2024-26591 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52917 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10, kernel |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2023-52910 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2023-52906 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-19 |
| CVE-2023-52899 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52894 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52889 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52885 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52882 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52875 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52874 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52873 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52870 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52869 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52865 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52863 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52858 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52836 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52759 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10, kernel |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |
| CVE-2023-52693 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-12-19 |
2026-01-23 |