搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-21720 | XFRM:在数据包卸载模式下删除中间SECPATH条目(CVE-2025-21720) | 2025-02-27 | ||
| AVD-2025-21719 | IPMR:请勿致电unres条目(CVE-2025-21719)的MR_MFC_USS_DEV() | 2025-02-27 | ||
| AVD-2025-21718 | 网络:玫瑰:修复计时器与用户线程的比赛(CVE-2025-21718) | 2025-02-27 | ||
| AVD-2025-21717 | net/mlx5e:在mlx5e_open_open_xdpredirect_sq(CVE-2025-21717)中添加缺失的cpu_to_node到kvzalloc_node | 2025-02-27 | ||
| AVD-2025-21716 | VXLAN:VXLAN_VNIFILTER_DUMP()(CVE-2025-21716)中的修复UnInit-Value | 2025-02-27 | ||
| AVD-2025-21715 | 网络:Davicom:修复DM9000_DRV_REMOVE中的UAF(CVE-2025-21715) | 2025-02-27 | ||
| AVD-2025-21714 | RDMA/MLX5:免费后修复隐式ODP使用(CVE-2025-21714) | 2025-02-27 | ||
| AVD-2025-21713 | POWERPC/PSERIES/IOMMU:如果从未设置过窗口(CVE-2025-21713),请勿拆开窗口 | 2025-02-27 | ||
| AVD-2025-21712 | MD/MD-BITMAP:与位图寿命(CVE-2025-21712)同步BitMap_get_stats() | 2025-02-27 | ||
| AVD-2025-21711 | 净/玫瑰:Rose_setsockopt中的防止整数溢出() | 2025-02-27 | ||
| AVD-2025-21710 | TCP:正确处理极端记忆挤压(CVE-2025-21710) | 2025-02-27 | ||
| AVD-2025-21709 | 内核:对DUP_MMAP()失败和UPROBE注册(CVE-2025-21709)请更加谨慎 | 2025-02-27 | ||
| AVD-2025-21708 | 网络:USB:RTL8150:启用基本端点检查(CVE-2025-21708) | 2025-02-27 | ||
| AVD-2025-21707 | MPTCP:合并次级状态(CVE-2025-21707) | 2025-02-27 | ||
| AVD-2025-21706 | MPTCP:PM:仅设置subflow Endp(CVE-2025-21706)的FullMesh | 2025-02-27 | ||
| AVD-2025-21705 | MPTCP:正确处理FastOpen断开连接(CVE-2025-21705) | 2025-02-27 | ||
| AVD-2024-58000 | io_uring:防止雷德特猜测(CVE-2024-58000) | 2025-02-27 | ||
| AVD-2024-57999 | POWERPC/PSERIES/IOMMU:IOMMU错误地标记了DDW中的MMIO范围(CVE-2024-57999) | 2025-02-27 | ||
| AVD-2024-57998 | OPP:添加索引检查以避免_read_freq()(CVE-2024-57998)中的缓冲区溢出 | 2025-02-27 | ||
| AVD-2024-57997 | WiFi:WCN36XX:修复通道调查记忆分配大小(CVE-2024-57997) | 2025-02-27 | ||
| AVD-2024-57996 | net_sched:sch_sfq:不允许1个数据包限制(CVE-2024-57996) | 2025-02-27 | ||
| AVD-2024-57995 | wifi:ath12k:修复在ATH12K_MAC_ASSIGN_VIF_TO_VDEV()(CVE-2024-57995)中免费读取指针。 | 2025-02-27 | ||
| AVD-2024-57994 | ptr_ring:请勿阻止ptr_ring_resize_multiple()(CVE-2024-57994)中的硬中断 | 2025-02-27 | ||
| AVD-2024-57993 | HID:HID-THRUSTMASTER:通过添加端点检查(CVE-2024-57993)在Throustmaster_probe中修复警告 | 2025-02-27 | ||
| AVD-2024-57992 | WiFi:WILC1000:仅在注册时取消登记Wiphy(CVE-2024-57992) | 2025-02-27 | ||
| AVD-2024-57991 | wifi:rtw89:chan:修复rtw89_entity_recalc_mgnt_roles()(CVE-2024-57991)中的软锁定 | 2025-02-27 | ||
| AVD-2024-57990 | WiFi:MT76:MT7925:MT7925_LOAD_CLC()(CVE-2024-57990)中的一个修复 | 2025-02-27 | ||
| AVD-2024-57989 | WiFi:MT76:MT7925:修复Null Deref检查MT7925_CHANGE_VIF_LINKS(CVE-2024-57989) | 2025-02-27 | ||
| AVD-2024-57988 | 蓝牙:BTBCM:修复null deref中的btbcm_get_board_name()(CVE-2024-57988) | 2025-02-27 | ||
| AVD-2024-57987 | 蓝牙:btrtl:在btrtl_setup_realtek()(CVE-2024-57987)中检查null | 2025-02-27 |