搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38347 | F2FS:修复理智的INO和XNID(CVE-2025-38347) | 2025-07-10 | ||
| AVD-2025-38346 | ftrace:在ftrace禁用后查找kallsym时修复UAF(CVE-2025-38346) | 2025-07-10 | ||
| AVD-2025-38345 | ACPICA:修复DSWSTATE.C(CVE-2025-38345)的ACPI操作数缓存泄漏 | 2025-07-10 | ||
| AVD-2025-38344 | ACPICA:修复ACPI Parse和Parseext缓存泄漏(CVE-2025-38344) | 2025-07-10 | ||
| AVD-2025-38342 | 软件节点:在software_node_get_reference_args()(CVE-2025-38342)中更正OOB检查 | 2025-07-10 | ||
| AVD-2025-38337 | JBD2:jbd2_journal_dirty_metadata(CVE-2025-38337)中的data-race和null-ptr-deref | 2025-07-10 | ||
| AVD-2025-38336 | ATA:PATA_VIA:VT6415/VT6330(CVE-2025-38336)上ATAPI设备的强制PIO | 2025-07-10 | ||
| AVD-2025-38335 | 输入:gpio-keys-用preempt_rt(CVE-2025-38335)修复睡眠 | 2025-07-10 | ||
| AVD-2025-38332 | SCSI:LPFC:使用memcpy()用于BIOS版本(CVE-2025-38332) | 2025-07-10 | ||
| AVD-2025-38328 | JFFS2:检查JFFS2_PREALLOC_RAW_NODE_REFS()会导致其他地方(CVE-2025-38328) | 2025-07-10 | ||
| AVD-2025-38326 | AOE:aoedev_downdev()(CVE-2025-38326)中的清洁设备RQ_LIST | 2025-07-10 | ||
| AVD-2025-38324 | MPLS:在mpls_route_input_rcu()中使用rcu_dereference_rtnl()。 (CVE-2025-38324) | 2025-07-10 | ||
| AVD-2025-38323 | 网络:ATM:添加LEC_MUTEX(CVE-2025-38323) | 2025-07-10 | ||
| AVD-2025-38320 | ARM64/ptrace:修复堆叠式绑定在regs_get_kernel_stack_nth()(CVE-2025-38320)中 | 2025-07-10 | ||
| AVD-2025-38319 | DRM/AMD/pp:修复Atomctrl_initialize中的潜在零指针删除率 | 2025-07-10 | ||
| AVD-2025-38313 | 巴士:FSL-MC:MC_DEV上的双重修复(CVE-2025-38313) | 2025-07-10 | ||
| AVD-2025-38312 | FBDEV:核心:fbcvt:避免在fb_cvt_hperiod()(CVE-2025-38312)中避免除以0 | 2025-07-10 | ||
| AVD-2025-38310 | SEG6:NexThop地址的修复验证(CVE-2025-38310) | 2025-07-10 | ||
| AVD-2025-38305 | PTP:删除ptp-> n_vclocks检查ptp_vclock_in_use()(CVE-2025-38305)中的逻辑 | 2025-07-10 | ||
| AVD-2025-38298 | EDAC/SKX_COMMON:固定通用保护故障(CVE-2025-38298) | 2025-07-10 | ||
| AVD-2025-38293 | wifi:ath11k:修复ar-> arvifs列表中的节点腐败(CVE-2025-38293) | 2025-07-10 | ||
| AVD-2025-38286 | PINCTRL:AT91:修复可能的耗时访问(CVE-2025-38286) | 2025-07-10 | ||
| AVD-2025-38285 | BPF:fix warn()在get_bpf_raw_tp_regs(CVE-2025-38285)中 | 2025-07-10 | ||
| AVD-2025-38280 | BPF:避免__BPF_PROG_RET0_WARN JIT失败时(CVE-2025-38280) | 2025-07-10 | ||
| AVD-2025-38273 | 网络:TIPC:tipc_aead_encrypt(CVE-2025-38273)中的FIX重新计算警告 | 2025-07-10 | ||
| AVD-2025-38263 | BCACHE:修复cache_set_flush()(CVE-2025-38263)中的null指针 | 2025-07-09 | ||
| AVD-2025-38262 | TTY:串行:UARTLITE:INIT中注册UART驱动程序(CVE-2025-38262) | 2025-07-09 | ||
| AVD-2025-38257 | S390/pkey:防止MEMDUP_USER()(CVE-2025-38257)的尺寸计算溢出 | 2025-07-09 | ||
| AVD-2025-38251 | ATM:剪辑:在clip_push()(CVE-2025-38251)中防止null deref | 2025-07-09 | ||
| AVD-2025-38249 | ALSA:USB-Audio:修复距离读取的案例读取snd_usb_get_audioformat_uac3()(CVE-2025-38249) | 2025-07-09 |