搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38659 | GFS2:不再自我恢复(CVE-2025-38659) | 2025-08-23 | ||
| AVD-2025-38658 | NVMET:PCI-EPF:如果NVMET_REQ_INIT()失败(CVE-2025-38658),请勿完成两次命令 | 2025-08-23 | ||
| AVD-2025-38657 | wifi:rtw89:MCC:防止rtw89_core_mlsr_switch()(CVE-2025-38657)中的移动包装 | 2025-08-23 | ||
| AVD-2025-38656 | wifi:iwlwifi:修复IWL_OP_MODE_DVM_START()(CVE-2025-38656)中的错误代码 | 2025-08-23 | ||
| AVD-2025-38655 | Pinctrl:迦南:K230:在DT Parse中添加Null检查(CVE-2025-38655) | 2025-08-23 | ||
| AVD-2025-38654 | Pinctrl:迦南:K230:DT Parse和Pinctrl登记册的固定顺序(CVE-2025-38654) | 2025-08-23 | ||
| AVD-2025-38651 | 内陆:库尼特测试的修复警告(CVE-2025-38651) | 2025-08-23 | ||
| AVD-2025-38649 | ARM64:DTS:QCOM:QCS615:修复由Coresight无限循环引起的崩溃问题(CVE-2025-38649) | 2025-08-23 | ||
| AVD-2025-38648 | SPI:STM32:在STM32_SPI_PROBE中查看CFG可用性(CVE-2025-38648) | 2025-08-23 | ||
| AVD-2025-38647 | wifi:rtw89:sar:rtw89_set_sar_sar_from_acpi(CVE-2025-38647)中的Drop LockDep断言 | 2025-08-23 | ||
| AVD-2025-38646 | wifi:rtw89:避免在不支持6 GHz频段的Rx问题数据包时避免取消解释(CVE-2025-38646) | 2025-08-23 | ||
| AVD-2025-38643 | WiFi:CFG80211:添加CFG80211_CHECK_AND_END_CAC()中的缺失锁(CVE-2025-38643) | 2025-08-23 | ||
| AVD-2025-38642 | WiFi:MAC80211:修复某些设备上的Monitor模式(CVE-2025-38642) | 2025-08-23 | ||
| AVD-2025-38641 | 蓝牙:BTUSB:修复kmalloc失败的潜在无效解释(CVE-2025-38641) | 2025-08-23 | ||
| AVD-2025-38640 | BPF:nf_hook_run_bpf()中禁用迁移。 (CVE-2025-38640) | 2025-08-23 | ||
| AVD-2025-38638 | IPv6:在Net6_rt_notify()(CVE-2025-38638)中添加重试逻辑 | 2025-08-23 | ||
| AVD-2025-38636 | RV:在DA监视器中使用字符点(CVE-2025-38636) | 2025-08-23 | ||
| AVD-2025-38633 | CLK:空间:Mark K1 PLL1_D8作为关键(CVE-2025-38633) | 2025-08-23 | ||
| AVD-2025-38632 | pinmux:修复竞赛,导致mux_owner null使用Active Mux_usecount(CVE-2025-38632) | 2025-08-23 | ||
| AVD-2025-38631 | CLK:IMX95-BLK-CTL:修复同步中止(CVE-2025-38631) | 2025-08-23 | ||
| AVD-2025-38629 | ALSA:USB:Scarlett2:修复缺失的空检查(CVE-2025-38629) | 2025-08-23 | ||
| AVD-2025-38628 | VDPA/MLX5:修复了错误路径上非初始化资源的发布(CVE-2025-38628) | 2025-08-23 | ||
| AVD-2025-38627 | F2FS:压缩:F2FS_FREE_DIC中的F2FS_INODE_INFO的UAF(CVE-2025-38627) | 2025-08-23 | ||
| AVD-2025-38626 | F2FS:在lfs模式下(CVE-2025-38626)在F2FS_MAP_BLOCKS()期间触发前景GC() | 2025-08-23 | ||
| AVD-2025-38625 | VFIO/PDS:修复缺少DISTACH_IOAS OP(CVE-2025-38625) | 2025-08-23 | ||
| AVD-2025-38621 | MD:使RDEV_ADD可用于RCU模式(CVE-2025-38621) | 2025-08-23 | ||
| AVD-2025-38620 | Zloop:修复标签集的Kasan无用的使用(CVE-2025-38620) | 2025-08-23 | ||
| AVD-2025-38619 | 媒体:TI:J721E-CSI2RX:FIX LIST_DEL腐败(CVE-2025-38619) | 2025-08-23 | ||
| AVD-2025-38616 | TLS:处理从TLS ULP下消失的数据(CVE-2025-38616) | 2025-08-22 | ||
| AVD-2024-58239 | Linux kernel 安全漏洞(CVE-2024-58239) | 2025-08-22 |