搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-37967 | USB:Typec:UCSI:DisplayPort:修复死锁(CVE-2025-37967) | 2025-05-21 | ||
| AVD-2025-37964 | X86/mm:消除可能会无意跳过的TLB冲洗的窗口(CVE-2025-37964) | 2025-05-21 | ||
| AVD-2025-37963 | ARM64:BPF:仅缓解无特权用户加载的CBPF程序(CVE-2025-37963) | 2025-05-21 | ||
| AVD-2025-37958 | mm/gumet_memory:修复解释无效的PMD迁移条目(CVE-2025-37958) | 2025-05-21 | ||
| AVD-2025-37949 | Xenbus:使用KREF跟踪REQ寿命(CVE-2025-37949) | 2025-05-21 | ||
| AVD-2025-37948 | ARM64:BPF:在CBPF计划的结论中添加BHB缓解措施(CVE-2025-37948) | 2025-05-21 | ||
| AVD-2025-37940 | ftrace:将cond_resched()添加到ftrace_graph_set_hash()(CVE-2025-37940) | 2025-05-21 | ||
| AVD-2025-37937 | OBJTOOL,媒体:DIB8000:DIB8000_SET_DDS()(CVE-2025-37937)中的防止分隔为零 | 2025-05-21 | ||
| AVD-2025-37932 | sch_htb:make htb_qlen_notify()idempotent(CVE-2025-37932) | 2025-05-21 | ||
| AVD-2025-37930 | drm/nouveau:nouveau_fence_context_kill()(cve-2025-37930)中的warn_on fix warn_on | 2025-05-21 | ||
| AVD-2025-37927 | IOMMU/AMD:修复PARSE_IVRS_ACPIHID中的潜在缓冲区溢出(CVE-2025-37927) | 2025-05-21 | ||
| AVD-2025-37923 | 跟踪:修复OOB写入Trace_seq_to_buffer()(CVE-2025-37923) | 2025-05-21 | ||
| AVD-2025-37915 | net_sched:drr:修复双列表与netem as Child qdisc(CVE-2025-37915)添加类别 | 2025-05-21 | ||
| AVD-2025-37914 | net_sched:ETS:FIX Double List与Netem as Child Qdisc(CVE-2025-37914)添加添加类 | 2025-05-21 | ||
| AVD-2025-37913 | net_sched:QFQ:修复双列表添加与netem as Child QDISC(CVE-2025-37913)添加类 | 2025-05-21 | ||
| AVD-2025-37912 | ICE:在ICE_VC_ADD_FDIR_FLTR()(CVE-2025-37912)中查看VF VSI指针值 | 2025-05-21 | ||
| AVD-2025-37911 | BNXT_EN:ETHTOOL -W期间修复距离内memcpy()(CVE-2025-37911) | 2025-05-21 | ||
| AVD-2025-37909 | 网络:LAN743X:启用GSO时修复Memleak问题(CVE-2025-37909) | 2025-05-21 | ||
| AVD-2025-37905 | 固件:ARM_SCMI:销毁设备时的平衡设备重新数(CVE-2025-37905) | 2025-05-21 | ||
| AVD-2025-37892 | MTD:INFTLCORE:添加错误检查INFTL_READ_OOB()(CVE-2025-37892) | 2025-05-20 | ||
| AVD-2025-37891 | ALSA:UMP:在UMP Sysex消息转换处修复缓冲区溢出(CVE-2025-37891) | 2025-05-19 | ||
| AVD-2025-37890 | NET_SCHED:HFSC:使用NetEM作为儿童QDISC(CVE-2025-37890)在类中修复UAF漏洞 | 2025-05-16 | ||
| AVD-2023-53146 | 媒体:DW2102:修复DW2102_I2C_TRANSFER()(CVE-2023-53146)中的null-ptr-deref | 2025-05-14 | ||
| AVD-2023-53145 | 蓝牙:BTSDIO:由于种族条件而在BTSDIO_REMOVE中免费使用后修复使用(CVE-2023-53145) | 2025-05-10 | ||
| AVD-2025-37889 | PCI/MSI:正确处理所有PCI/MSI后端(CVE-2025-37889)的NOMASK标志 | 2025-05-09 | ||
| AVD-2025-37888 | net/mlx5:mlx5_create_ {innin _,} ttc_table()(CVE-2025-37888)中的null-ptr-deref | 2025-05-09 | ||
| AVD-2025-37887 | PDS_CORE:处理未支撑的PDS_CORE_CMD_FW_CONTROL结果(CVE-2025-3787) | 2025-05-09 | ||
| AVD-2025-37886 | pds_core:q_info的wait_context部分(CVE-2025-3786) | 2025-05-09 | ||
| AVD-2025-37885 | KVM:X86:如果 *新 *路线不可邮寄(CVE-2025-37885),请重置IRTE托管控制 | 2025-05-09 | ||
| AVD-2025-37884 | BPF:修复rcu_tasks_trace和event_mutex之间的僵局。 (CVE-2025-37884) | 2025-05-09 |