搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-52448 | N/A | 2025-07-26 | ||
| AVD-2025-52447 | N/A | 2025-07-26 | ||
| AVD-2025-52446 | N/A | 2025-07-26 | ||
| AVD-2025-38467 | DRM/exynos:exynos7_drm_decon:添加vblank检查IRQ处理(CVE-2025-38467) | 2025-07-26 | ||
| AVD-2025-38466 | perf:恢复为UPROBES的CAP_SYS_ADMIN(CVE-2025-38466) | 2025-07-26 | ||
| AVD-2025-38465 | Netlink:修复SK-> SK_RMEM_ALLOC的环绕式。 (CVE-2025-38465) | 2025-07-26 | ||
| AVD-2025-38464 | TIPC:在TIPC_CONN_CLOSE()中修复无用的使用。 (CVE-2025-38464) | 2025-07-26 | ||
| AVD-2025-38463 | TCP:SKB剩余空间计算中的正确签名(CVE-2025-38463) | 2025-07-26 | ||
| AVD-2025-38462 | VSOCK:FIX TRANSLACT_ {G2H,H2G} TOCTOU(CVE-2025-38462) | 2025-07-26 | ||
| AVD-2025-38461 | VSOCK:FIX TRANSLACT_* TOCTOU(CVE-2025-38461) | 2025-07-26 | ||
| AVD-2025-38460 | ATM:剪辑:在to_atmarpd()中修复潜在的null-ptr-deref。 (CVE-2025-38460) | 2025-07-26 | ||
| AVD-2025-38459 | ATM:剪辑:修复clip_push()的无限递归调用。 (CVE-2025-38459) | 2025-07-26 | ||
| AVD-2025-38458 | ATM:剪辑:修复vcc_sendmsg()(CVE-2025-38458)中的null指针取消。 | 2025-07-26 | ||
| AVD-2025-38457 | net/sched:如果父类不存在(CVE-2025-38457) | 2025-07-26 | ||
| AVD-2025-38456 | IPMI:MSGHANDLER:修复IPMI_CREATE_USER中的潜在内存损坏()(CVE-2025-38456) | 2025-07-26 | ||
| AVD-2025-38455 | KVM:SVM:如果VCPU创建在飞行中(CVE-2025-38455),则拒绝sev {-es} intra主机迁移 | 2025-07-26 | ||
| AVD-2025-38454 | ALSA:AD1816A:修复snd_card_ad1816a_pnp()(CVE-2025-38454)中的潜在null指针DEREF DEREF | 2025-07-26 | ||
| AVD-2025-38453 | io_uring/msg_ring:确保将io_kiocb freeing推迟到RCU(CVE-2025-38453) | 2025-07-26 | ||
| AVD-2025-38452 | 网络:以太网:rtsn:修复rtsn_probe()(CVE-2025-38452)中的无效指针删除 | 2025-07-26 | ||
| AVD-2025-38451 | MD/MD-BITMAP:FIX GPF在BITMAP_GET_STATS()(CVE-2025-38451)中 | 2025-07-26 | ||
| AVD-2025-38450 | WiFi:MT76:MT7925:预防NULL指针在MT7925_STA_SET_SET_DECAP_OFFLOAD()(CVE-2025-38450)中 | 2025-07-26 | ||
| AVD-2025-38449 | DRM/GEM:获取有关框架的宝石手柄的参考(CVE-2025-38449) | 2025-07-26 | ||
| AVD-2025-38448 | USB:小工具:U_Serial:在TTY Wakeup中修复比赛条件(CVE-2025-38448) | 2025-07-26 | ||
| AVD-2025-38447 | mm/rmap:修复批处理UNMAP期间的潜在潜在的页面表访问(CVE-2025-38447) | 2025-07-26 | ||
| AVD-2025-38446 | CLK:IMX:修复dispmix_csr_clk_dev_data(CVE-2025-38446)中的无界访问 | 2025-07-26 | ||
| AVD-2025-38445 | MD/RAID1:修复堆栈内存使用后,返回RAID1_RESHAPE(CVE-2025-38445) | 2025-07-26 | ||
| AVD-2025-38444 | RAID10:RAID10_MAKE_REQUEST(CVE-2025-38444)清理MEMLEAK | 2025-07-26 | ||
| AVD-2025-38443 | NBD:在NBD_GENL_CONNECT()错误路径(CVE-2025-38443)中修复UAF | 2025-07-26 | ||
| AVD-2025-38442 | 块:禁用THP时拒绝BS> PS块设备(CVE-2025-38442) | 2025-07-26 | ||
| AVD-2025-38441 | NetFilter:FlowTable:NF_FLOW_PPPOE_PROTO()(CVE-2025-38441)中的以太网标头帐户 | 2025-07-26 |