搜索结果
关于「kernel」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2025-38234 | Sched/RT:FIX RACE中的push_rt_task(CVE-2025-38234) | 2025-07-04 | ||
AVD-2025-38211 | RDMA/IWCM:CM_ID破坏后修复工作对象(CVE-2025-38211)之后 | 2025-07-04 | ||
AVD-2025-38200 | I40E:修复MMIO写入i40e_clear_hw中无效页面(CVE-2025-38200) | 2025-07-04 | ||
AVD-2025-38159 | WiFi:RTW88:修复“ Para”缓冲区大小,以避免读取范围(CVE-2025-38159) | 2025-07-03 | ||
AVD-2025-38124 | NET:从Frag_list拉动后修复UDP GSO SKB_SEGEMS(CVE-2025-38124) | 2025-07-03 | ||
AVD-2025-38110 | NET/MDIOBUS:修复潜在的界外条款45读/写入访问(CVE-2025-38110) | 2025-07-03 | ||
AVD-2025-38089 | SUNRPC:SVC_GARBAGE在SVC Auth Processing期间作为验证错误(CVE-2025-38089) | 2025-06-30 | ||
AVD-2025-38087 | net/sched:在taprio_dev_notifier(cve-2025-38087)中使用fix-frie-free-free-free-free-free-free-free-free-free-free-fime | 2025-06-30 | ||
AVD-2025-38086 | 网络:CH9200:修复MII_NWAY_RESTART期间的非初始化访问(CVE-2025-38086) | 2025-06-28 | ||
AVD-2025-38085 | mm/hugetlb:修复bumet_pmd_unshare()vs vs gup-fast Race(CVE-2025-38085) | 2025-06-28 | ||
AVD-2025-38084 | mm/hugetlb:在VMA拆分期间的解开页面表,而不是在(CVE-2025-38084)之前 | 2025-06-28 | ||
AVD-2025-3773 | Trellix System Information Reporter 安全漏洞(CVE-2025-3773) | 2025-06-26 | ||
AVD-2025-3863 | 张贴Carousel滑块,用于Elementor <= 1.6.0-验证(订户+)通过process_wbelps_promo_form函数(CVE-2025-3863)丢失授权。 | 2025-06-26 | ||
AVD-2025-2172 | N/A | 2025-06-23 | ||
AVD-2025-2171 | N/A | 2025-06-23 | ||
AVD-2024-4994 | Gitlab(CVE-2024-4994)的跨站点伪造(CSRF) | 2025-06-21 | ||
AVD-2025-38083 | net_sched:prio:修复prio_tune()(CVE-2025-38083)中的比赛 | 2025-06-20 | ||
AVD-2022-50095 | POSIX-CPU-TIMERS:清理CPU计时器,然后再在执行期间释放它们(CVE-2022-50095) | 2025-06-18 | ||
AVD-2022-50092 | DM Thin:dm_sm_register_threshold_callback(CVE-2022-50092) | 2025-06-18 | ||
AVD-2022-50087 | 固件:ARM_SCPI:如果探测失败,请确保未分配SCPI_INFO(CVE-2022-50087) | 2025-06-18 | ||
AVD-2022-50066 | 网络:大西洋:修复AQ_VEC索引超出范围错误(CVE-2022-50066) | 2025-06-18 | ||
AVD-2022-50055 | IAVF:修复AdminQ错误处理(CVE-2022-50055) | 2025-06-18 | ||
AVD-2022-50030 | SCSI:LPFC:防止用畸形的用户输入(CVE-2022-50030)在DEBUGF中进行缓冲溢出崩溃 | 2025-06-18 | ||
AVD-2022-50020 | EXT4:避免大小到部分簇大小(CVE-2022-50020) | 2025-06-18 | ||
AVD-2022-50000 | NetFilter:Flowtable:由于待处理工作(CVE-2022-50000),修复了固定流量。 | 2025-06-18 | ||
AVD-2022-49985 | BPF:不要在阵列范围内使用tnum_range检查oke描述符(CVE-2022-49985) | 2025-06-18 | ||
AVD-2022-49977 | ftrace:frace ftrace死亡时,请在is_ftrace_trampoline中修复null指针删除(CVE-2022-49977) | 2025-06-18 | ||
AVD-2022-49938 | CIFS:修复SMB2_NEGOTIATE()(CVE-2022-49938)中的小备忘录泄漏 | 2025-06-18 | ||
AVD-2025-38082 | GPIO:VIRTUSER:修复潜在的界外写作(CVE-2025-38082) | 2025-06-18 | ||
AVD-2025-38079 | 加密:algif_hash- hash_accept(CVE-2025-38079)中的双重修复双免费修复 | 2025-06-18 |