搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38732 | NETFILTER:NF_REXPENT:不要泄漏DST重新汇编回路数据包(CVE-2025-38732) | 2025-09-06 | ||
| AVD-2025-38731 | DRM/XE:修复VM_BIND_IOCTL双免费错误(CVE-2025-38731) | 2025-09-06 | ||
| AVD-2025-38730 | io_uring/net:在重试(CVE-2025-38730)上进行部分缓冲区 | 2025-09-05 | ||
| AVD-2025-38729 | ALSA:USB-audio:验证UAC3功率域描述符(CVE-2025-38729) | 2025-09-05 | ||
| AVD-2025-38728 | SMB3:修复了板的固定,从安装座上到KSMBD(CVE-2025-38728) | 2025-09-05 | ||
| AVD-2025-38727 | Netlink:避免在Netlink_unicast()(CVE-2025-38727)中避免无限重试循环 | 2025-09-05 | ||
| AVD-2025-38726 | 网络:ftgmac100:修复ftgmac100_phy_disconnect中的潜在null指针访问(CVE-2025-38726) | 2025-09-05 | ||
| AVD-2025-38725 | 网络:USB:ASIX_DEVICES:添加AX88772 MDIO BUS(CVE-2025-38725)的phy_mask | 2025-09-05 | ||
| AVD-2025-38724 | NFSD:whand get_client_locked()失败nfsd4_setclientid_confirm()(CVE-2025-38724) | 2025-09-05 | ||
| AVD-2025-38723 | LOONGARCH:BPF:FIELCALL中的修复跳跃偏移计算(CVE-2025-38723) | 2025-09-05 | ||
| AVD-2025-38722 | HABANALABS:fix_dmabuf()(CVE-2025-38722)中修复UAF | 2025-09-05 | ||
| AVD-2025-38721 | NETFILTER:CTNETLINK:FIX REFCOUNT在表转储(CVE-2025-38721)上泄漏 | 2025-09-05 | ||
| AVD-2025-38720 | 网络:Hibmcge:修复RTNL僵局问题(CVE-2025-38720) | 2025-09-05 | ||
| AVD-2025-38719 | 网络:hibmcge:通过零问题修复该部门(CVE-2025-38719) | 2025-09-05 | ||
| AVD-2025-38718 | SCTP:SCTP_RCV中的克隆的GSO数据包(CVE-2025-38718) | 2025-09-05 | ||
| AVD-2025-38717 | 网络:KCM:kcm_unattach()(CVE-2025-38717)中修复比赛条件 | 2025-09-05 | ||
| AVD-2025-38716 | HFS:HFS_FIND_INIT()(CVE-2025-38716)中的固定通用保护故障 | 2025-09-05 | ||
| AVD-2025-38715 | HFS:修复HFS_BNODE_READ()(CVE-2025-38715)中的束缚板 | 2025-09-05 | ||
| AVD-2025-38714 | HFSPlus:修复HFSPLUS_BNODE_READ()(CVE-2025-38714) | 2025-09-05 | ||
| AVD-2025-38713 | HFSPlus:修复hfsplus_uni2asc()(CVE-2025-38713)中读取的板块。 | 2025-09-05 | ||
| AVD-2025-38712 | HFSPlus:请勿在HFSPLUS_CREATE_ATTRIBUTES_FILE()(CVE-2025-38712)中使用Bug_on()() | 2025-09-05 | ||
| AVD-2025-38711 | SMB/服务器:与替换Fifexists链接时避免僵局(CVE-2025-38711) | 2025-09-05 | ||
| AVD-2025-38710 | GFS2:验证I_DEPTH为ERENASH目录(CVE-2025-38710) | 2025-09-05 | ||
| AVD-2025-38709 | 循环:避免在独家所有者(CVE-2025-38709)下更新块大小 | 2025-09-05 | ||
| AVD-2025-38708 | DRBD:在handle_write_conflicts中添加缺少的kref_get(CVE-2025-38708) | 2025-09-05 | ||
| AVD-2025-38707 | FS/NTFS3:添加SANITY检查文件名(CVE-2025-38707) | 2025-09-05 | ||
| AVD-2025-38706 | ASOC:核心:检查rtd == null中的null中的snd_soc_remove_pcm_runtime()(CVE-2025-38706) | 2025-09-05 | ||
| AVD-2025-38705 | DRM/AMD/PM:修复Null指针访问(CVE-2025-38705) | 2025-09-05 | ||
| AVD-2025-38704 | RCU/NOCB:修复可能无效的RDP'S-> nocb_cb_kthread指针访问(CVE-2025-38704) | 2025-09-05 | ||
| AVD-2025-38703 | DRM/XE:使DMA范围符合安全访问规则(CVE-2025-38703) | 2025-09-05 |