搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-52450 | Salesforce Tableau Server 安全漏洞(CVE-2025-52450) | 2025-08-23 | ||
| AVD-2025-26497 | Salesforce Tableau Server 安全漏洞(CVE-2025-26497) | 2025-08-23 | ||
| AVD-2025-38675 | XFRM:状态:XFRM_STATE_FIND(CVE-2025-38675)中早期初始化state_ptrs | 2025-08-23 | ||
| AVD-2025-38674 | 还原“ DRM/Prime:使用GEM Object实例中的DMA_BUF”(CVE-2025-38674) | 2025-08-23 | ||
| AVD-2025-38673 | 还原“ DRM/GEM-FRAMEBUFFER:使用GEM Object实例中的DMA_BUF”(CVE-2025-38673) | 2025-08-23 | ||
| AVD-2025-38672 | 还原“ DRM/GEM-DMA:使用GEM Object实例中的DMA_BUF”(CVE-2025-38672) | 2025-08-23 | ||
| AVD-2025-38671 | I2C:QUP:在超时的情况下跳出循环(CVE-2025-38671) | 2025-08-23 | ||
| AVD-2025-38670 | ARM64/条目:cpu_switch_to()中的蒙版daif(call_on_irq_stack()(CVE-2025-38670) | 2025-08-23 | ||
| AVD-2025-38669 | 还原“ drm/gem-shmem:使用gem对象实例中的dma_buf”(CVE-2025-38669) | 2025-08-23 | ||
| AVD-2025-38668 | 调节器:核心:修复因固定耦合数据引起的无链接的无链接(CVE-2025-38668) | 2025-08-23 | ||
| AVD-2025-38667 | IIO:修复潜在的界外写作(CVE-2025-38667) | 2025-08-23 | ||
| AVD-2025-38666 | 网络:appletalk:修复AARP代理探针中无用的使用(CVE-2025-38666) | 2025-08-23 | ||
| AVD-2025-38665 | can:netlink:can_changelink():修复结构can_priv :: do_set_mode的null指针deref(cve-2025-38665) | 2025-08-23 | ||
| AVD-2025-38664 | ICE:修复ICE_COPY_AND_INIT_PKG()(CVE-2025-38664)中的无零指针取消。 | 2025-08-23 | ||
| AVD-2025-38663 | NILFS2:阅读Inodes时拒绝无效的文件类型(CVE-2025-38663) | 2025-08-23 | ||
| AVD-2025-38662 | ASOC:MediAtek:MT8365-DAI-I2S:将正确的大小传递给MT8365_DAI_SET_PRIV(CVE-2025-38662) | 2025-08-23 | ||
| AVD-2025-38661 | 平台/x86:alienware-wmi-wmax:修复`dmi_system_id`阵列(CVE-2025-38661) | 2025-08-23 | ||
| AVD-2025-38660 | [ceph] parse_longname():strrchr()期望nul终止的字符串(CVE-2025-38660) | 2025-08-23 | ||
| AVD-2025-38659 | GFS2:不再自我恢复(CVE-2025-38659) | 2025-08-23 | ||
| AVD-2025-38658 | NVMET:PCI-EPF:如果NVMET_REQ_INIT()失败(CVE-2025-38658),请勿完成两次命令 | 2025-08-23 | ||
| AVD-2025-38657 | wifi:rtw89:MCC:防止rtw89_core_mlsr_switch()(CVE-2025-38657)中的移动包装 | 2025-08-23 | ||
| AVD-2025-38656 | wifi:iwlwifi:修复IWL_OP_MODE_DVM_START()(CVE-2025-38656)中的错误代码 | 2025-08-23 | ||
| AVD-2025-38655 | Pinctrl:迦南:K230:在DT Parse中添加Null检查(CVE-2025-38655) | 2025-08-23 | ||
| AVD-2025-38654 | Pinctrl:迦南:K230:DT Parse和Pinctrl登记册的固定顺序(CVE-2025-38654) | 2025-08-23 | ||
| AVD-2025-38653 | PROC:使用相同的处理来检查proc_lseek与proc_read_iter et.al的proc_lseek(CVE-2025-38653) | 2025-08-23 | ||
| AVD-2025-38652 | F2FS:修复以避免在devs.pat.path(CVE-2025-38652)中避免实行范围的访问 | 2025-08-23 | ||
| AVD-2025-38651 | 内陆:库尼特测试的修复警告(CVE-2025-38651) | 2025-08-23 | ||
| AVD-2025-38650 | HFSPlus:删除Mutex_lock检查HFSPLUS_FREE_EXTENTS(CVE-2025-38650) | 2025-08-23 | ||
| AVD-2025-38649 | ARM64:DTS:QCOM:QCS615:修复由Coresight无限循环引起的崩溃问题(CVE-2025-38649) | 2025-08-23 | ||
| AVD-2025-38648 | SPI:STM32:在STM32_SPI_PROBE中查看CFG可用性(CVE-2025-38648) | 2025-08-23 |