搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38347 | F2FS:修复理智的INO和XNID(CVE-2025-38347) | 2025-07-10 | ||
| AVD-2025-38346 | ftrace:在ftrace禁用后查找kallsym时修复UAF(CVE-2025-38346) | 2025-07-10 | ||
| AVD-2025-38345 | ACPICA:修复DSWSTATE.C(CVE-2025-38345)的ACPI操作数缓存泄漏 | 2025-07-10 | ||
| AVD-2025-38344 | ACPICA:修复ACPI Parse和Parseext缓存泄漏(CVE-2025-38344) | 2025-07-10 | ||
| AVD-2025-38343 | WiFi:MT76:MT7996:带有多播或广播RA的掉落片段(CVE-2025-38343) | 2025-07-10 | ||
| AVD-2025-38342 | 软件节点:在software_node_get_reference_args()(CVE-2025-38342)中更正OOB检查 | 2025-07-10 | ||
| AVD-2025-38341 | ETH:FBNIC:失败DMA-MAP FW MSG(CVE-2025-38341)时避免双倍免费 | 2025-07-10 | ||
| AVD-2025-38338 | fs/nfs/read:修复nfs_return_empty_folio()(CVE-2025-38338)中的双锁定错误 | 2025-07-10 | ||
| AVD-2025-38337 | JBD2:jbd2_journal_dirty_metadata(CVE-2025-38337)中的data-race和null-ptr-deref | 2025-07-10 | ||
| AVD-2025-38336 | ATA:PATA_VIA:VT6415/VT6330(CVE-2025-38336)上ATAPI设备的强制PIO | 2025-07-10 | ||
| AVD-2025-38335 | 输入:gpio-keys-用preempt_rt(CVE-2025-38335)修复睡眠 | 2025-07-10 | ||
| AVD-2025-38334 | X86/SGX:防止尝试回收有毒页面(CVE-2025-38334) | 2025-07-10 | ||
| AVD-2025-38332 | SCSI:LPFC:使用memcpy()用于BIOS版本(CVE-2025-38332) | 2025-07-10 | ||
| AVD-2025-38331 | 网络:以太网:Cortina:在所有TCP上使用脚趾/TSO(CVE-2025-38331) | 2025-07-10 | ||
| AVD-2025-38328 | JFFS2:检查JFFS2_PREALLOC_RAW_NODE_REFS()会导致其他地方(CVE-2025-38328) | 2025-07-10 | ||
| AVD-2025-38326 | AOE:aoedev_downdev()(CVE-2025-38326)中的清洁设备RQ_LIST | 2025-07-10 | ||
| AVD-2025-38324 | MPLS:在mpls_route_input_rcu()中使用rcu_dereference_rtnl()。 (CVE-2025-38324) | 2025-07-10 | ||
| AVD-2025-38323 | 网络:ATM:添加LEC_MUTEX(CVE-2025-38323) | 2025-07-10 | ||
| AVD-2025-38322 | perf/x86/intel:修复ICL_UPDATE_TOPDOWN_EVENT()(CVE-2025-38322)中的崩溃 | 2025-07-10 | ||
| AVD-2025-38321 | SMB:在COLLES_ALL_CACHED_DIRS失败时记录错误(CVE-2025-38321) | 2025-07-10 | ||
| AVD-2025-38320 | ARM64/ptrace:修复堆叠式绑定在regs_get_kernel_stack_nth()(CVE-2025-38320)中 | 2025-07-10 | ||
| AVD-2025-38319 | DRM/AMD/pp:修复Atomctrl_initialize中的潜在零指针删除率 | 2025-07-10 | ||
| AVD-2025-38318 | perf:arm-ni:修复缺失的platform_set_drvdata()(CVE-2025-38318) | 2025-07-10 | ||
| AVD-2025-38315 | 蓝牙:btintel:从EFI变量(CVE-2025-38315)检查DSBR大小 | 2025-07-10 | ||
| AVD-2025-38313 | 巴士:FSL-MC:MC_DEV上的双重修复(CVE-2025-38313) | 2025-07-10 | ||
| AVD-2025-38312 | FBDEV:核心:fbcvt:避免在fb_cvt_hperiod()(CVE-2025-38312)中避免除以0 | 2025-07-10 | ||
| AVD-2025-38310 | SEG6:NexThop地址的修复验证(CVE-2025-38310) | 2025-07-10 | ||
| AVD-2025-38307 | ASOC:Intel:AVS:验证由PARSE_INT_ARRAY返回的内容()(CVE-2025-38307) | 2025-07-10 | ||
| AVD-2025-38306 | fs/fhandle.c:修复has_locked_children()(CVE-2025-38306)的竞赛 | 2025-07-10 | ||
| AVD-2025-38305 | PTP:删除ptp-> n_vclocks检查ptp_vclock_in_use()(CVE-2025-38305)中的逻辑 | 2025-07-10 |