搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38269 | BTRFS:btrfs_convert_extent_bit()(CVE-2025-38269)的状态插入失败后退出 | 2025-07-10 | ||
| AVD-2025-38265 | 序列:JSM:在JSM_UART_PORT_INIT(CVE-2025-38265)期间修复NPE | 2025-07-10 | ||
| AVD-2025-38264 | NVME-TCP:消毒请求列表处理(CVE-2025-38264) | 2025-07-09 | ||
| AVD-2025-38263 | BCACHE:修复cache_set_flush()(CVE-2025-38263)中的null指针 | 2025-07-09 | ||
| AVD-2025-38262 | TTY:串行:UARTLITE:INIT中注册UART驱动程序(CVE-2025-38262) | 2025-07-09 | ||
| AVD-2025-38260 | BTRFS:正确处理CSUM树错误= ibadroot正确(CVE-2025-38260) | 2025-07-09 | ||
| AVD-2025-38259 | ASOC:编解码器:WCD9335:修复缺失没有调节器供应的缺失(CVE-2025-38259) | 2025-07-09 | ||
| AVD-2025-38258 | mm/damon/sysfs-schemes:免费旧的damon_sysfs_scheme_filter-> memcg_path(cve-2025-38258) | 2025-07-09 | ||
| AVD-2025-38257 | S390/pkey:防止MEMDUP_USER()(CVE-2025-38257)的尺寸计算溢出 | 2025-07-09 | ||
| AVD-2025-38255 | lib/group_cpus:修复null指针从group_cpus_evenly()(CVE-2025-38255) | 2025-07-09 | ||
| AVD-2025-38253 | HID:WACOM:wacom_aes_battery_handler()(CVE-2025-38253)中的修复崩溃 | 2025-07-09 | ||
| AVD-2025-38251 | ATM:剪辑:在clip_push()(CVE-2025-38251)中防止null deref | 2025-07-09 | ||
| AVD-2025-38250 | 蓝牙:HCI_CORE:在VHCI_FLUSH()(CVE-2025-38250)中使用无用的情况 | 2025-07-09 | ||
| AVD-2025-38249 | ALSA:USB-Audio:修复距离读取的案例读取snd_usb_get_audioformat_uac3()(CVE-2025-38249) | 2025-07-09 | ||
| AVD-2025-38248 | 桥梁:mcast:在路由器端口配置(CVE-2025-38248)期间修复无用时使用。 | 2025-07-09 | ||
| AVD-2025-38246 | BNXT:正确齐平XDP重定向列表(CVE-2025-38246) | 2025-07-09 | ||
| AVD-2025-38245 | ATM:在atm_dev_deregister()中删除procf之后,将atm_dev_mutex发布。 (CVE-2025-38245) | 2025-07-09 | ||
| AVD-2025-38244 | SMB:客户:重新连接通道时修复潜在的僵局(CVE-2025-38244) | 2025-07-09 | ||
| AVD-2025-38239 | SCSI:MEGARAID_SAS:修复无效节点索引(CVE-2025-38239) | 2025-07-09 | ||
| AVD-2024-36357 | AMD:CVE-2025-36357 L1 数据队列中的瞬态调度程序攻击 | 2025-07-09 | ||
| AVD-2024-36350 | AMD:CVE-2024-36350 存储队列中的瞬态调度程序攻击 | 2025-07-09 | ||
| AVD-2025-38237 | 媒体:平台:exynos4-is:添加硬件同步等待到fimc_is_hw_change_mode()(CVE-2025-38237) | 2025-07-08 | ||
| AVD-2025-38236 | AF_UNIX:不要连续消耗的OOB SKB。 (CVE-2025-38236) | 2025-07-08 | ||
| AVD-2025-38232 | NFSD:修复NFSD注册和Exports_Proc之间的比赛(CVE-2025-38232) | 2025-07-04 | ||
| AVD-2025-38231 | NFSD:在Laundromat_work之前初始化SSC,以防止null解释(CVE-2025-38231) | 2025-07-04 | ||
| AVD-2025-38230 | JFS:DBMount()中验证AG参数以防止崩溃(CVE-2025-38230) | 2025-07-04 | ||
| AVD-2025-38229 | 媒体:CXUSB:写入失败时不再判断RBUF(CVE-2025-38229) | 2025-07-04 | ||
| AVD-2025-38227 | 媒体:VIDTV:终止初始化失败的后续过程(CVE-2025-38227) | 2025-07-04 | ||
| AVD-2025-38226 | 媒体:生动:更改组成的siize(CVE-2025-38226) | 2025-07-04 | ||
| AVD-2025-38225 | 媒体:IMX-JPEG:分配错误后清理(CVE-2025-38225) | 2025-07-04 |