搜索结果
关于「kernel」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2025-38060 | BPF:copy_verifier_state()应复制'loop_entry'字段(CVE-2025-38060) | 2025-06-18 | ||
AVD-2025-38058 | __legitimize_mnt():检查MNT_SYNC_UMOUNT应在Mount_lock(CVE-2025-38058)下 | 2025-06-18 | ||
AVD-2025-38055 | perf/x86/intel:用sample_freq(CVE-2025-38055)使用PEB-VIA-PT修复SegFault | 2025-06-18 | ||
AVD-2025-38053 | IDPF:fix null-ptr-deref中的iDPF_FEATURES_CHECK(CVE-2025-38053) | 2025-06-18 | ||
AVD-2025-38052 | net/tipc:修复板条无后用来阅读tipc_aead_encrypt_done(CVE-2025-38052) | 2025-06-18 | ||
AVD-2025-38051 | SMB:客户端:CIFS_FILL_DIRENT中的不使用时使用(CVE-2025-38051) | 2025-06-18 | ||
AVD-2025-38048 | virtio_ring:通过标记event_ trigger作为kcsan的racy(CVE-2025-38048)来修复数据竞赛 | 2025-06-18 | ||
AVD-2025-38040 | 序列:MCTRL_GPIO:将Disable_ms分为同步和NO_SYNC API(CVE-2025-38040) | 2025-06-18 | ||
AVD-2025-38039 | NET/MLX5E:使用启用HTB卸载MQPRIO时避免使用WARN_ON(CVE-2025-38039) | 2025-06-18 | ||
AVD-2025-38038 | CPUFREQ:AMD-PSTATE:set_boost中删除不必要的驱动程序_lock(CVE-2025-38038) | 2025-06-18 | ||
AVD-2025-38037 | VXLAN:注释FDB数据竞赛(CVE-2025-38037) | 2025-06-18 | ||
AVD-2025-38031 | PADATA:请勿在Reorder_work(CVE-2025-38031)中泄漏重新数 | 2025-06-18 | ||
AVD-2025-38024 | rdma/rxe:修复板条 - 使用后免费阅读rxe_queue_cleanup bug(CVE-2025-38024) | 2025-06-18 | ||
AVD-2025-38023 | NFS:nfs_get_lock_context在解锁路径中的操作故障(CVE-2025-38023) | 2025-06-18 | ||
AVD-2025-38022 | RDMA/CORE:修复“ Kasan:IB_REGISTER_DEVICE”中的“ KASAN:SLAB-RES-use-free-fefter-fefter”问题(CVE-2025-38022) | 2025-06-18 | ||
AVD-2025-38020 | NET/MLX5E:禁用MACSEC卸载用于上行链路代表配置文件(CVE-2025-38020) | 2025-06-18 | ||
AVD-2025-38018 | NET/TLS:Alloc_page失败时修复内核恐慌(CVE-2025-38018) | 2025-06-18 | ||
AVD-2025-38016 | HID:BPF:如果设备被销毁(CVE-2025-38016),则流产调度 | 2025-06-18 | ||
AVD-2025-38009 | WiFi:MT76:驾驶员拆除的NAPI(CVE-2025-38009) | 2025-06-18 | ||
AVD-2025-38008 | mm/page_alloc:在未接受的内存处理中修复比赛条件(CVE-2025-38008) | 2025-06-18 | ||
AVD-2025-38005 | DMAENGINE:TI:K3-UDMA:添加缺失的锁定(CVE-2025-38005) | 2025-06-18 | ||
AVD-2025-3774 | 明智的聊天<= 3.3.4-未经身份验证的存储的跨站点脚本通过x-forwhered-for-header(CVE-2025-3774) | 2025-06-17 | ||
AVD-2025-4748 | ZIP中的绝对路径遍历:UNZIP/1,2(CVE-2025-4748) | 2025-06-16 | ||
AVD-2025-38004 | CAN:BCM:为BCM_OP运行时更新(CVE-2025-38004)添加锁定 | 2025-06-08 | ||
AVD-2025-38003 | CAN:BCM:添加缺少的RCU阅读Procfs Content(CVE-2025-38003) | 2025-06-08 | ||
AVD-2025-38001 | net_sched:HFSC:地址重新入口辅助式将类添加到Eltree两次(CVE-2025-38001) | 2025-06-06 | ||
AVD-2025-38000 | SCH_HFSC:在HFSC_ENQUEUE()中使用PEEK(CVE-2025-38000)时修复QLEN会计错误 | 2025-06-06 | ||
AVD-2025-37998 | OpenVswitch:fix upput_userspace()(CVE-2025-37998)中的不安全属性解析 | 2025-05-29 | ||
AVD-2025-37997 | NetFilter:IPSET:修复区域锁定在哈希类型中(CVE-2025-37997) | 2025-05-29 | ||
AVD-2025-37995 | 模块:确保Kobject_put()对于模块类型Kobjects(CVE-2025-37995)安全 | 2025-05-29 |