搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2026-23411 | Linux AppArmor 竞态释放漏洞(CVE-2026-23411) | 2026-04-01 | ||
| AVD-2026-23410 | Linux内核AppArmor UAF漏洞(CVE-2026-23410) | 2026-04-01 | ||
| AVD-2026-23409 | Linux内核AppArmor策略解析DoS漏洞(CVE-2026-23409) | 2026-04-01 | ||
| AVD-2026-23408 | Linux内核AppArmor双重释放漏洞(CVE-2026-23408) | 2026-04-01 | ||
| AVD-2026-23407 | Linux内核AppArmor DFA校验越界漏洞(CVE-2026-23407) | 2026-04-01 | ||
| AVD-2026-23406 | Linux内核AppArmor宏副作用越界读取漏洞(CVE-2026-23406) | 2026-04-01 | ||
| AVD-2026-23405 | Linux Kernel AppArmor 策略命名空间递归资源耗尽漏洞(CVE-2026-23405) | 2026-04-01 | ||
| AVD-2026-23404 | AppArmor深度嵌套配置文件删除栈溢出漏洞(CVE-2026-23404) | 2026-04-01 | ||
| AVD-2026-23403 | Linux AppArmor 内存泄漏漏洞(CVE-2026-23403) | 2026-04-01 | ||
| AVD-2026-23269 | Linux Kernel AppArmor DFA状态越界读取漏洞(CVE-2026-23269) | 2026-03-19 | ||
| AVD-2026-23268 | Linux内核AppArmor本地权限提升漏洞(CVE-2026-23268) | 2026-03-19 | ||
| AVD-2025-13350 | Ubuntu Linux 内核 6.8 AF_UNIX UAF提权漏洞(CVE-2025-13350) | 2026-03-06 | ||
| AVD-2025-1272 | Kernel: secure boot does not automatically enable kernel lockdown (CVE-2025-1272) | 2026-02-19 | ||
| AVD-2026-23021 | net: usb: pegasus: fix memory leak in update_eth_regs_async() (CVE-2026-23021) | 2026-01-31 | ||
| AVD-2026-23020 | net: 3com: 3c59x: fix possible null dereference in vortex_probe1() (CVE-2026-23020) | 2026-01-31 | ||
| AVD-2026-23019 | net: marvell: prestera: fix NULL dereference on devlink_alloc() failure (CVE-2026-23019) | 2026-01-31 | ||
| AVD-2025-71182 | can: j1939: make j1939_session_activate() fail if device is no longer registered (CVE-2025-71182) | 2026-01-31 | ||
| AVD-2025-71180 | counter: interrupt-cnt: Drop IRQF_NO_THREAD flag (CVE-2025-71180) | 2026-01-31 | ||
| AVD-2025-71136 | media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (CVE-2025-71136) | 2026-01-14 | ||
| AVD-2025-71133 | RDMA/irdma: avoid invalid read in irdma_net_event (CVE-2025-71133) | 2026-01-14 | ||
| AVD-2025-71132 | smc91x: fix broken irq-context in PREEMPT_RT (CVE-2025-71132) | 2026-01-14 | ||
| AVD-2025-71131 | crypto: seqiv - Do not use req->iv after crypto_aead_encrypt (CVE-2025-71131) | 2026-01-14 | ||
| AVD-2025-71127 | wifi: mac80211: Discard Beacon frames to non-broadcast address (CVE-2025-71127) | 2026-01-14 | ||
| AVD-2025-71125 | tracing: Do not register unsupported perf events (CVE-2025-71125) | 2026-01-14 | ||
| AVD-2025-71120 | SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (CVE-2025-71120) | 2026-01-14 | ||
| AVD-2025-71118 | ACPICA: Avoid walking the Namespace if start_node is NULL (CVE-2025-71118) | 2026-01-14 | ||
| AVD-2025-71116 | libceph: make decode_pool() more resilient against corrupted osdmaps (CVE-2025-71116) | 2026-01-14 | ||
| AVD-2025-71114 | via_wdt: fix critical boot hang due to unnamed resource allocation (CVE-2025-71114) | 2026-01-14 | ||
| AVD-2025-71112 | net: hns3: add VLAN id validation before using (CVE-2025-71112) | 2026-01-14 | ||
| AVD-2025-71111 | hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (CVE-2025-71111) | 2026-01-14 |