搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38194 | JFFS2:在撰写摘要之前,请检查原始节点是否已预先分配(CVE-2025-38194) | 2025-07-04 | ||
| AVD-2025-38193 | net_sched:sch_sfq:拒绝无效的扰动周期(CVE-2025-38193) | 2025-07-04 | ||
| AVD-2025-38192 | NET:更改SKB协议时清除DST(CVE-2025-38192) | 2025-07-04 | ||
| AVD-2025-38191 | KSMBD:修复零件指针在destroy_previous_session(CVE-2025-38191)中 | 2025-07-04 | ||
| AVD-2025-38190 | ATM:REVERT ATM_ACCOUNT_TX()如果COPY_FROM_ITER_FULL()失败。 (CVE-2025-38190) | 2025-07-04 | ||
| AVD-2025-38189 | DRM/V3D:避免在`v3d_job_update_stats()`(cve-2025-38189)中避免null指针解除。 | 2025-07-04 | ||
| AVD-2025-38188 | DRM/MSM/A7XX:调用CP_RESET_CONTEXT_STATE(CVE-2025-38188) | 2025-07-04 | ||
| AVD-2025-38187 | DRM/NOUVEAU:修复R535_GSP_RPC_PUSH()(CVE-2025-38187)中的无用时使用。 | 2025-07-04 | ||
| AVD-2025-38186 | bnxt_en:修复bnxt_ulp_stop()/bnxt_ulp_start()(CVE-2025-38186)的双重调用 | 2025-07-04 | ||
| AVD-2025-38185 | ATM:ATMTCP:ATMTCP_C_SEND()中的免费无效长度SKB。 (CVE-2025-38185) | 2025-07-04 | ||
| AVD-2025-38184 | 提示:在获取以太网携带者的远程IP时修复Null-Ptr-Deref(CVE-2025-38184) | 2025-07-04 | ||
| AVD-2025-38183 | NET:LAN743X:修复潜在的界外写作在LAN743X_PTP_IO_EVENT_CLOCK_GET()(CVE-2025-38183)中 | 2025-07-04 | ||
| AVD-2025-38182 | UBLK:添加设备时从用户空间中的参数(CVE-2025-38182)化。 | 2025-07-04 | ||
| AVD-2025-38181 | Calipso:在Calipso_req_ {set,del} attry()中修复null-ptr-deref。 (CVE-2025-38181) | 2025-07-04 | ||
| AVD-2025-38180 | 网络:ATM:FIX/PROC/NET/ATM/LEC处理(CVE-2025-38180) | 2025-07-04 | ||
| AVD-2025-38179 | SMB:客户端:fix max_sge溢出smb_extract_folioq_to_rdma()(CVE-2025-38179) | 2025-07-04 | ||
| AVD-2025-38177 | SCH_HFSC:MAKE HFSC_QLEN_NOTIFY()IDEMPOTENT(CVE-2025-38177) | 2025-07-04 | ||
| AVD-2025-38176 | 活页夹:binderfs_evict_inode()(CVE-2025-38176)中的fix-frie-fre-fre-fre-fre-fre-fre-fre-fre-frie-fre-frie- | 2025-07-04 | ||
| AVD-2025-38175 | 活页夹:修复Binder_devices中的另一个UAF(CVE-2025-38175) | 2025-07-04 | ||
| AVD-2025-38174 | Thunderbolt:请勿将配置请求(CVE-2025-38174)倍增 | 2025-07-04 | ||
| AVD-2025-38173 | 加密:Marvell/CESA-处理零长度Skcipher请求(CVE-2025-38173) | 2025-07-03 | ||
| AVD-2025-38172 | EROF:避免使用具有不同类型的多个设备(CVE-2025-38172) | 2025-07-03 | ||
| AVD-2025-38171 | 电源:供应:Max77705:修复探针中的工作按摩误差(CVE-2025-38171) | 2025-07-03 | ||
| AVD-2025-38170 | ARM64/FPSIMD:处理中小型企业陷阱时丢弃陈旧的CPU状态(CVE-2025-38170) | 2025-07-03 | ||
| AVD-2025-38169 | ARM64/fpsimd:避免使用SMSTOP(CVE-2025-38169)的内核fpsimd状态 | 2025-07-03 | ||
| AVD-2025-38168 | perf:Arm-Ni:探针失败的Register PMU(CVE-2025-38168) | 2025-07-03 | ||
| AVD-2025-38167 | FS/NTFS3:处理HDR_FIRST_DE()返回值(CVE-2025-38167) | 2025-07-03 | ||
| AVD-2025-38166 | BPF:用sockmap(CVE-2025-38166)解决KTLS恐慌 | 2025-07-03 | ||
| AVD-2025-38165 | BPF,Sockmap:调用SKB_Linearize时解决恐慌(CVE-2025-38165) | 2025-07-03 | ||
| AVD-2025-38164 | F2FS:区域:修复以避免SIT和SSA之间的不一致(CVE-2025-38164) | 2025-07-03 |