搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38679 | 媒体:金星:修复OOB读取由于缺少有效载荷绑定检查(CVE-2025-38679)而读取 | 2025-09-05 | ||
| AVD-2025-38678 | NETFILTER:NF_TABLES:拒绝更新上的重复设备(CVE-2025-38678) | 2025-09-03 | ||
| AVD-2025-38677 | F2FS:修复以避免在DNODE页面(CVE-2025-38677)中避免界限访问 | 2025-08-30 | ||
| AVD-2024-58240 | tls:将非异步解密请求处理与异步分开(CVE-2024-58240) | 2025-08-28 | ||
| AVD-2025-2313 | CGM CLININET代码注入漏洞(CVE-2025-2313) | 2025-08-27 | ||
| AVD-2025-38676 | iOmmu/amd:避免从内核CMDLine(CVE-2025-38676)避免堆栈缓冲区溢出 | 2025-08-26 | ||
| AVD-2025-38675 | XFRM:状态:XFRM_STATE_FIND(CVE-2025-38675)中早期初始化state_ptrs | 2025-08-23 | ||
| AVD-2025-38671 | I2C:QUP:在超时的情况下跳出循环(CVE-2025-38671) | 2025-08-23 | ||
| AVD-2025-38670 | ARM64/条目:cpu_switch_to()中的蒙版daif(call_on_irq_stack()(CVE-2025-38670) | 2025-08-23 | ||
| AVD-2025-38668 | 调节器:核心:修复因固定耦合数据引起的无链接的无链接(CVE-2025-38668) | 2025-08-23 | ||
| AVD-2025-38666 | 网络:appletalk:修复AARP代理探针中无用的使用(CVE-2025-38666) | 2025-08-23 | ||
| AVD-2025-38665 | can:netlink:can_changelink():修复结构can_priv :: do_set_mode的null指针deref(cve-2025-38665) | 2025-08-23 | ||
| AVD-2025-38664 | ICE:修复ICE_COPY_AND_INIT_PKG()(CVE-2025-38664)中的无零指针取消。 | 2025-08-23 | ||
| AVD-2025-38663 | NILFS2:阅读Inodes时拒绝无效的文件类型(CVE-2025-38663) | 2025-08-23 | ||
| AVD-2025-38662 | ASOC:MediAtek:MT8365-DAI-I2S:将正确的大小传递给MT8365_DAI_SET_PRIV(CVE-2025-38662) | 2025-08-23 | ||
| AVD-2025-38660 | [ceph] parse_longname():strrchr()期望nul终止的字符串(CVE-2025-38660) | 2025-08-23 | ||
| AVD-2025-38659 | GFS2:不再自我恢复(CVE-2025-38659) | 2025-08-23 | ||
| AVD-2025-38658 | NVMET:PCI-EPF:如果NVMET_REQ_INIT()失败(CVE-2025-38658),请勿完成两次命令 | 2025-08-23 | ||
| AVD-2025-38656 | wifi:iwlwifi:修复IWL_OP_MODE_DVM_START()(CVE-2025-38656)中的错误代码 | 2025-08-23 | ||
| AVD-2025-38653 | PROC:使用相同的处理来检查proc_lseek与proc_read_iter et.al的proc_lseek(CVE-2025-38653) | 2025-08-23 | ||
| AVD-2025-38652 | F2FS:修复以避免在devs.pat.path(CVE-2025-38652)中避免实行范围的访问 | 2025-08-23 | ||
| AVD-2025-38650 | HFSPlus:删除Mutex_lock检查HFSPLUS_FREE_EXTENTS(CVE-2025-38650) | 2025-08-23 | ||
| AVD-2025-38648 | SPI:STM32:在STM32_SPI_PROBE中查看CFG可用性(CVE-2025-38648) | 2025-08-23 | ||
| AVD-2025-38646 | wifi:rtw89:避免在不支持6 GHz频段的Rx问题数据包时避免取消解释(CVE-2025-38646) | 2025-08-23 | ||
| AVD-2025-38645 | NET/MLX5:使用前检查设备内存指针(CVE-2025-38645) | 2025-08-23 | ||
| AVD-2025-38644 | WiFi:MAC80211:当站不关联时拒绝TDLS操作(CVE-2025-38644) | 2025-08-23 | ||
| AVD-2025-38643 | WiFi:CFG80211:添加CFG80211_CHECK_AND_END_CAC()中的缺失锁(CVE-2025-38643) | 2025-08-23 | ||
| AVD-2025-38640 | BPF:nf_hook_run_bpf()中禁用迁移。 (CVE-2025-38640) | 2025-08-23 | ||
| AVD-2025-38639 | NetFilter:XT_NFACCT:不要假设ACCT名称为无效(CVE-2025-38639) | 2025-08-23 | ||
| AVD-2025-38635 | CLK:Davinci:添加null检查Davinci_lpsc_clk_register()(CVE-2025-38635) | 2025-08-23 |