| CVE-2024-26719 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26712 |
In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kasan: Fix addr error caused by page alignment\n\nIn kasan_init_region, when k_start is not page aligned, at the begin of\nfor loop, k_cur = k_start & PAGE_MASK is less than k_start, and then\n`va = block + k_cur - k_start` is less than block, the addr va is invalid,\nbecause the memory address space from va to block is not alloced by\nmemblock_alloc, which will not be reserved by memblock_reserve later, it\nwill be used by other places.\n\nAs a result, memory overwriting occurs.\n\nfor example:\nint __init __weak kasan_init_region(void *start, size_t size)\n{\n[...]\n /* if say block(dcd97000) k_start(feef7400) k_end(feeff3fe) */\n block = memblock_alloc(k_end - k_start, PAGE_SIZE);\n [...]\n for (k_cur = k_start & PAGE_MASK; k_cur < k_end; k_cur += PAGE_SIZE) {\n /* at the begin of for loop\n * block(dcd97000) va(dcd96c00) k_cur(feef7000) k_start(feef7400)\n * va(dcd96c00) is less than block(dcd97000), va is invalid\n */\n void *va = block + k_cur - k_start;\n [...]\n }\n[...]\n}\n\nTherefore, page alignment is performed on k_start before\nmemblock_alloc() to ensure the validity of the VA address. |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26707 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2024-26706 |
In the Linux kernel, the following vulnerability has been resolved:\n\nparisc: Fix random data corruption from exception handler\n\nThe current exception handler implementation, which assists when accessing\nuser space memory, may exhibit random data corruption if the compiler decides\nto use a different register than the specified register %r29 (defined in\nASM_EXCEPTIONTABLE_REG) for the error code. If the compiler choose another\nregister, the fault handler will nevertheless store -EFAULT into %r29 and thus\ntrash whatever this register is used for.\nLooking at the assembly I found that this happens sometimes in emulate_ldd().\n\nTo solve the issue, the easiest solution would be if it somehow is\npossible to tell the fault handler which register is used to hold the error\ncode. Using %0 or %1 in the inline assembly is not posssible as it will show\nup as e.g. %r29 (with the "%r" prefix), which the GNU assembler can not\nconvert to an integer.\n\nThis patch takes another, better and more flexible approach:\nWe extend the __ex_table (which is out of the execution path) by one 32-word.\nIn this word we tell the compiler to insert the assembler instruction\n"or %r0,%r0,%reg", where %reg references the register which the compiler\nchoosed for the error return code.\nIn case of an access failure, the fault handler finds the __ex_table entry and\ncan examine the opcode. The used register is encoded in the lowest 5 bits, and\nthe fault handler can then store -EFAULT into this register.\n\nSince we extend the __ex_table to 3 words we can't use the BUILDTIME_TABLE_SORT\nconfig option any longer. |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26702 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26700 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26699 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26695 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26684 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26680 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26663 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26662 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26648 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26647 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26646 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2024-26594 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52919 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52918 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52915 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52913 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52907 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52887 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52871 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52867 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52853 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52846 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52844 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52841 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52833 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52831 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52829 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52826 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52825 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52821 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52819 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52818 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52816 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52812 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52808 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52806 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52766 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52763 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52761 |
In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: VMAP_STACK overflow detection thread-safe\n\ncommit 31da94c25aea ("riscv: add VMAP_STACK overflow detection") added\nsupport for CONFIG_VMAP_STACK. If overflow is detected, CPU switches to\n`shadow_stack` temporarily before switching finally to per-cpu\n`overflow_stack`.\n\nIf two CPUs/harts are racing and end up in over flowing kernel stack, one\nor both will end up corrupting each other state because `shadow_stack` is\nnot per-cpu. This patch optimizes per-cpu overflow stack switch by\ndirectly picking per-cpu `overflow_stack` and gets rid of `shadow_stack`.\n\nFollowing are the changes in this patch\n\n - Defines an asm macro to obtain per-cpu symbols in destination\n register.\n - In entry.S, when overflow is detected, per-cpu overflow stack is\n located using per-cpu asm macro. Computing per-cpu symbol requires\n a temporary register. x31 is saved away into CSR_SCRATCH\n (CSR_SCRATCH is anyways zero since we're in kernel).\n\nPlease see Links for additional relevant disccussion and alternative\nsolution.\n\nTested by `echo EXHAUST_STACK > /sys/kernel/debug/provoke-crash/DIRECT`\nKernel crash log below\n\n Insufficient stack space to handle exception!/debug/provoke-crash/DIRECT\n Task stack: [0xff20000010a98000..0xff20000010a9c000]\n Overflow stack: [0xff600001f7d98370..0xff600001f7d99370]\n CPU: 1 PID: 205 Comm: bash Not tainted 6.1.0-rc2-00001-g328a1f96f7b9 #34\n Hardware name: riscv-virtio,qemu (DT)\n epc : __memset+0x60/0xfc\n ra : recursive_loop+0x48/0xc6 [lkdtm]\n epc : ffffffff808de0e4 ra : ffffffff0163a752 sp : ff20000010a97e80\n gp : ffffffff815c0330 tp : ff600000820ea280 t0 : ff20000010a97e88\n t1 : 000000000000002e t2 : 3233206874706564 s0 : ff20000010a982b0\n s1 : 0000000000000012 a0 : ff20000010a97e88 a1 : 0000000000000000\n a2 : 0000000000000400 a3 : ff20000010a98288 a4 : 0000000000000000\n a5 : 0000000000000000 a6 : fffffffffffe43f0 a7 : 00007fffffffffff\n s2 : ff20000010a97e88 s3 : ffffffff01644680 s4 : ff20000010a9be90\n s5 : ff600000842ba6c0 s6 : 00aaaaaac29e42b0 s7 : 00fffffff0aa3684\n s8 : 00aaaaaac2978040 s9 : 0000000000000065 s10: 00ffffff8a7cad10\n s11: 00ffffff8a76a4e0 t3 : ffffffff815dbaf4 t4 : ffffffff815dbaf4\n t5 : ffffffff815dbab8 t6 : ff20000010a9bb48\n status: 0000000200000120 badaddr: ff20000010a97e88 cause: 000000000000000f\n Kernel panic - not syncing: Kernel stack overflow\n CPU: 1 PID: 205 Comm: bash Not tainted 6.1.0-rc2-00001-g328a1f96f7b9 #34\n Hardware name: riscv-virtio,qemu (DT)\n Call Trace:\n [<ffffffff80006754>] dump_backtrace+0x30/0x38\n [<ffffffff808de798>] show_stack+0x40/0x4c\n [<ffffffff808ea2a8>] dump_stack_lvl+0x44/0x5c\n [<ffffffff808ea2d8>] dump_stack+0x18/0x20\n [<ffffffff808dec06>] panic+0x126/0x2fe\n [<ffffffff800065ea>] walk_stackframe+0x0/0xf0\n [<ffffffff0163a752>] recursive_loop+0x48/0xc6 [lkdtm]\n SMP: stopping secondary CPUs\n ---[ end Kernel panic - not syncing: Kernel stack overflow ]--- |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52755 |
In the Linux kernel, the following vulnerability has been resolved: |
Important |
kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-11-22 |
2025-12-11 |
| CVE-2023-52753 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52752 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52751 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52749 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52747 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52746 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52743 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52737 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52732 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52701 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52698 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52696 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52694 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52691 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52677 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52676 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52673 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52671 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52664 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52660 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52657 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52650 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52641 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52640 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52638 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52637 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52634 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52633 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52632 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52627 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52621 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52596 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
是 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52593 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52589 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52588 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52586 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52585 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52584 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52573 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52572 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52569 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52561 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52524 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52517 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52511 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52510 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52508 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52494 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52493 |
In the Linux kernel, the following vulnerability has been resolved: |
Moderate |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52491 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52484 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52481 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52479 |
In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix uaf in smb20_oplock_break_ack\n\ndrop reference after use opinfo. |
Moderate |
kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-22 |
| CVE-2023-52475 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |
| CVE-2023-52467 |
In the Linux kernel, the following vulnerability has been resolved: |
Low |
kernel:6.6, kernel:4.19, kernel:5.10 |
否 |
完成修复 |
2024-11-22 |
2026-01-25 |