搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38722 | HABANALABS:fix_dmabuf()(CVE-2025-38722)中修复UAF | 2025-09-05 | ||
| AVD-2025-38720 | 网络:Hibmcge:修复RTNL僵局问题(CVE-2025-38720) | 2025-09-05 | ||
| AVD-2025-38719 | 网络:hibmcge:通过零问题修复该部门(CVE-2025-38719) | 2025-09-05 | ||
| AVD-2025-38717 | 网络:KCM:kcm_unattach()(CVE-2025-38717)中修复比赛条件 | 2025-09-05 | ||
| AVD-2025-38716 | HFS:HFS_FIND_INIT()(CVE-2025-38716)中的固定通用保护故障 | 2025-09-05 | ||
| AVD-2025-38710 | GFS2:验证I_DEPTH为ERENASH目录(CVE-2025-38710) | 2025-09-05 | ||
| AVD-2025-38709 | 循环:避免在独家所有者(CVE-2025-38709)下更新块大小 | 2025-09-05 | ||
| AVD-2025-38705 | DRM/AMD/PM:修复Null指针访问(CVE-2025-38705) | 2025-09-05 | ||
| AVD-2025-38704 | RCU/NOCB:修复可能无效的RDP'S-> nocb_cb_kthread指针访问(CVE-2025-38704) | 2025-09-05 | ||
| AVD-2025-38703 | DRM/XE:使DMA范围符合安全访问规则(CVE-2025-38703) | 2025-09-05 | ||
| AVD-2025-38692 | exfat:添加群集链环检查DIR(CVE-2025-38692) | 2025-09-05 | ||
| AVD-2025-38690 | DRM/XE/迁移:预防无限递归(CVE-2025-38690) | 2025-09-05 | ||
| AVD-2025-38689 | x86/fpu:修复AVX512_STATUS()(CVE-2025-38689)中的null dereference | 2025-09-05 | ||
| AVD-2025-38688 | iommufd:Deskion Align()溢出(CVE-2025-38688) | 2025-09-05 | ||
| AVD-2025-38686 | UserFaultFD:在PMD为迁移条目时(CVE-2025-38686),请在UFFDIO_MOVE中修复崩溃 | 2025-09-05 | ||
| AVD-2025-38682 | I2C:核心:i2C_UNREGISTER_DEVICE()(CVE-2025-38682)中的FWNODE双重修复。 | 2025-09-05 | ||
| AVD-2025-38678 | NETFILTER:NF_TABLES:拒绝更新上的重复设备(CVE-2025-38678) | 2025-09-03 | ||
| AVD-2025-23315 | NVIDIA Nemo Framework<2.4.0 代码注入漏洞(CVE-2025-23315) | 2025-08-27 | ||
| AVD-2025-52451 | Salesforce Tableau Server 安全漏洞(CVE-2025-52451) | 2025-08-23 | ||
| AVD-2025-52450 | Salesforce Tableau Server 安全漏洞(CVE-2025-52450) | 2025-08-23 | ||
| AVD-2025-26497 | Salesforce Tableau Server 安全漏洞(CVE-2025-26497) | 2025-08-23 | ||
| AVD-2025-38675 | XFRM:状态:XFRM_STATE_FIND(CVE-2025-38675)中早期初始化state_ptrs | 2025-08-23 | ||
| AVD-2025-38674 | 还原“ DRM/Prime:使用GEM Object实例中的DMA_BUF”(CVE-2025-38674) | 2025-08-23 | ||
| AVD-2025-38673 | 还原“ DRM/GEM-FRAMEBUFFER:使用GEM Object实例中的DMA_BUF”(CVE-2025-38673) | 2025-08-23 | ||
| AVD-2025-38672 | 还原“ DRM/GEM-DMA:使用GEM Object实例中的DMA_BUF”(CVE-2025-38672) | 2025-08-23 | ||
| AVD-2025-38669 | 还原“ drm/gem-shmem:使用gem对象实例中的dma_buf”(CVE-2025-38669) | 2025-08-23 | ||
| AVD-2025-38667 | IIO:修复潜在的界外写作(CVE-2025-38667) | 2025-08-23 | ||
| AVD-2025-38662 | ASOC:MediAtek:MT8365-DAI-I2S:将正确的大小传递给MT8365_DAI_SET_PRIV(CVE-2025-38662) | 2025-08-23 | ||
| AVD-2025-38661 | 平台/x86:alienware-wmi-wmax:修复`dmi_system_id`阵列(CVE-2025-38661) | 2025-08-23 | ||
| AVD-2025-38660 | [ceph] parse_longname():strrchr()期望nul终止的字符串(CVE-2025-38660) | 2025-08-23 |