搜索结果
关于「kernel」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2025-21979 | WiFi:CFG80211:取消WIPHY_WORK,释放Wiphy(CVE-2025-21979) | 2025-04-02 | ||
AVD-2025-21976 | FBDEV:HyperV_FB:允许优美地删除Framebuffer(CVE-2025-21976) | 2025-04-02 | ||
AVD-2025-21975 | NET/MLX5:MLX5_CHAINS_CREATE_TABLE()(CVE-2025-21975)中的错误错误 | 2025-04-02 | ||
AVD-2025-21971 | net_sched:防止使用TC_H_ROOT(CVE-2025-21971)创建类 | 2025-04-02 | ||
AVD-2025-21970 | NET/MLX5:桥梁,修复滞后状态检查引起的崩溃(CVE-2025-21970) | 2025-04-02 | ||
AVD-2025-21969 | 蓝牙:L2CAP:修复l2CAP_SEND_CMD中的无板 - 使用板(CVE-2025-21969) | 2025-04-02 | ||
AVD-2025-21966 | DM-Flakey:修复内存损坏中的可选rustal_bio_byte功能(CVE-2025-21966) | 2025-04-02 | ||
AVD-2025-21964 | CIFS:处理ACREGMAX安装选项时修复整数溢出(CVE-2025-21964) | 2025-04-02 | ||
AVD-2025-21963 | CIFS:处理Acdirmax安装选项时修复整数溢出(CVE-2025-21963) | 2025-04-02 | ||
AVD-2025-21962 | CIFS:修复整数溢出时,处理ClosetimeO安装选项(CVE-2025-21962) | 2025-04-02 | ||
AVD-2025-21961 | ETH:BNXT:为MB-XDP-PASS案例(CVE-2025-21961)修复Truesize | 2025-04-02 | ||
AVD-2025-21959 | NetFilter:nf_conncount:在insert_tree()(CVE-2025-21959)中完全初始化struct nf_conncount_tuple | 2025-04-02 | ||
AVD-2025-21957 | SCSI:QLA1280:在调试级别> 2(CVE-2025-21957)时修复内核OOPS | 2025-04-02 | ||
AVD-2025-21956 | drm/amd/display:分配归一化_pix_clk颜色深度= 14(CVE-2025-21956) | 2025-04-02 | ||
AVD-2025-21949 | loongarch:设置hugetlb mmap基础地址与PMD大小对齐(CVE-2025-21949) | 2025-04-02 | ||
AVD-2025-21948 | HID:Appleir:修复RAW事件手柄上的潜在无效解释(CVE-2025-21948) | 2025-04-02 | ||
AVD-2025-21943 | GPIO:聚合器:保护驱动程序attry处理程序免受模块卸载(CVE-2025-21943) | 2025-04-02 | ||
AVD-2025-21941 | drm/amd/display:fix null检查pipe_ctx-> plane_state in Resource_build_scaling_params(CVE-2025-21941) | 2025-04-02 | ||
AVD-2025-21938 | MPTCP:修复MPTCP_PM_NL_APPEND_NEW_LOCAL_ADDR(CVE-2025-21938)中的“安排原子” | 2025-04-02 | ||
AVD-2025-21935 | Rapidio:在RIO_SCAN_ALLOC_NET()(CVE-2025-21935)中添加rio_add_net() | 2025-04-02 | ||
AVD-2025-21934 | Rapidio:修复RIO_ADD_NET()失败时修复API误解(CVE-2025-21934) | 2025-04-02 | ||
AVD-2025-21931 | HWPOISON,MONEME_HOTPLUG:锁定作品集之前锁定hwpoison folio(CVE-2025-21931) | 2025-04-02 | ||
AVD-2025-21928 | HID:Intel-ish-HID:在ISHTP_HID_REMOVE()(CVE-2025-21928)中修复无用的问题 | 2025-04-02 | ||
AVD-2025-21927 | NVME-TCP:修复NVME_TCP_RECV_PDU()(CVE-2025-21927)中的潜在内存损坏 | 2025-04-02 | ||
AVD-2025-21926 | 网络:GSO:__UDP_GSO_SEMENG中的修复所有权(CVE-2025-21926) | 2025-04-02 | ||
AVD-2025-21925 | LLC:在dev_queue_xmit()(CVE-2025-21925)之前请勿使用skb_get() | 2025-04-02 | ||
AVD-2025-21922 | PPP:使用BPF(CVE-2025-21922)修复KMSAN UNINIT-VALUE警告 | 2025-04-02 | ||
AVD-2025-21920 | VLAN:强制执行基础设备类型(CVE-2025-21920) | 2025-04-02 | ||
AVD-2025-21919 | 调度/公平:修复Child_cfs_rq_on_list中的潜在内存损坏(CVE-2025-21919) | 2025-04-02 | ||
AVD-2025-21917 | USB:RENESAS_USBHS:刷新notify_hotplug_work(CVE-2025-21917) | 2025-04-02 |