搜索结果
关于「linux_kernel」的漏洞数据
AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
---|---|---|---|---|
AVD-2025-21959 | NetFilter:nf_conncount:在insert_tree()(CVE-2025-21959)中完全初始化struct nf_conncount_tuple | 2025-04-02 | ||
AVD-2025-21957 | SCSI:QLA1280:在调试级别> 2(CVE-2025-21957)时修复内核OOPS | 2025-04-02 | ||
AVD-2025-21953 | 网络:法力:debugfs_remove之后的清理法力结构()(CVE-2025-21953) | 2025-04-02 | ||
AVD-2025-21951 | 总线:MHI:主机:PCI_GENERIC:使用PCI_TRY_RESET_FUNCTICT()避免死锁(CVE-2025-21951) | 2025-04-02 | ||
AVD-2025-21949 | loongarch:设置hugetlb mmap基础地址与PMD大小对齐(CVE-2025-21949) | 2025-04-02 | ||
AVD-2025-21948 | HID:Appleir:修复RAW事件手柄上的潜在无效解释(CVE-2025-21948) | 2025-04-02 | ||
AVD-2025-21947 | KSMBD:使用IPC_MSG_SEND_REQUEST(CVE-2025-21947)时,通过种族条件进行修复类型混乱 | 2025-04-02 | ||
AVD-2025-21945 | KSMBD:在SMB2_LOCK(CVE-2025-21945)中无用的修复使用。 | 2025-04-02 | ||
AVD-2025-21943 | GPIO:聚合器:保护驱动程序attry处理程序免受模块卸载(CVE-2025-21943) | 2025-04-02 | ||
AVD-2025-21941 | drm/amd/display:fix null检查pipe_ctx-> plane_state in Resource_build_scaling_params(CVE-2025-21941) | 2025-04-02 | ||
AVD-2025-21940 | DRM/AMDKFD:修复KFD队列中的null指针取消(CVE-2025-21940) | 2025-04-02 | ||
AVD-2025-21937 | 蓝牙:在mgmt_remote_name()(CVE-2025-21937)中添加检查MGMT_ALLOC_SKB() | 2025-04-02 | ||
AVD-2025-21936 | 蓝牙:在mgmt_device_connected()(CVE-2025-21936)中添加MGMT_ALLOC_SKB() | 2025-04-02 | ||
AVD-2025-21934 | Rapidio:修复RIO_ADD_NET()失败时修复API误解(CVE-2025-21934) | 2025-04-02 | ||
AVD-2025-21933 | ARM:PGTable:修复Null指针解除问题(CVE-2025-21933) | 2025-04-02 | ||
AVD-2025-21930 | wifi:iwlwifi:MVM:不要尝试与死固件交谈(CVE-2025-21930) | 2025-04-02 | ||
AVD-2025-21929 | HID:Intel-ish-HID:HID_ISHTP_CL_REMOVE()(CVE-2025-21929) | 2025-04-02 | ||
AVD-2025-21928 | HID:Intel-ish-HID:在ISHTP_HID_REMOVE()(CVE-2025-21928)中修复无用的问题 | 2025-04-02 | ||
AVD-2025-21927 | NVME-TCP:修复NVME_TCP_RECV_PDU()(CVE-2025-21927)中的潜在内存损坏 | 2025-04-02 | ||
AVD-2025-21923 | HID:HID-Steam:拆卸设备时不使用时(CVE-2025-21923) | 2025-04-02 | ||
AVD-2025-21922 | PPP:使用BPF(CVE-2025-21922)修复KMSAN UNINIT-VALUE警告 | 2025-04-02 | ||
AVD-2025-21920 | VLAN:强制执行基础设备类型(CVE-2025-21920) | 2025-04-02 | ||
AVD-2025-21919 | 调度/公平:修复Child_cfs_rq_on_list中的潜在内存损坏(CVE-2025-21919) | 2025-04-02 | ||
AVD-2025-21918 | USB:Typec:UCSI:修复Null指针访问(CVE-2025-21918) | 2025-04-02 | ||
AVD-2025-21917 | USB:RENESAS_USBHS:刷新notify_hotplug_work(CVE-2025-21917) | 2025-04-02 | ||
AVD-2025-21915 | CDX:修复driver_override_show()(CVE-2025-21915)中可能的UAF错误 | 2025-04-02 | ||
AVD-2025-21912 | GPIO:RCAR:使用RAW_SPINLOCK保护注册访问(CVE-2025-21912) | 2025-04-02 | ||
AVD-2025-21911 | DRM/Imagination:避免围栏释放僵局(CVE-2025-21911) | 2025-04-02 | ||
AVD-2025-21908 | NFS:FIX NFS_RELEASE_FOLIO()通过Kcompactd写下(CVE-2025-21908)而不是僵局 | 2025-04-02 | ||
AVD-2025-21905 | wifi:iwlwifi:限制FW文件的打印字符串(CVE-2025-21905) | 2025-04-02 |