搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38058 | __legitimize_mnt():检查MNT_SYNC_UMOUNT应在Mount_lock(CVE-2025-38058)下 | 2025-06-18 | ||
| AVD-2025-38057 | ESPINTCP:修复SKB泄漏(CVE-2025-38057) | 2025-06-18 | ||
| AVD-2025-38056 | ASOC:SOF:Intel:HDA:重新加载模块时修复UAF(CVE-2025-38056) | 2025-06-18 | ||
| AVD-2025-38055 | perf/x86/intel:用sample_freq(CVE-2025-38055)使用PEB-VIA-PT修复SegFault | 2025-06-18 | ||
| AVD-2025-38054 | PTP:OCP:摘要输出功能中的限制信号/FREQ计数(CVE-2025-38054) | 2025-06-18 | ||
| AVD-2025-38053 | IDPF:fix null-ptr-deref中的iDPF_FEATURES_CHECK(CVE-2025-38053) | 2025-06-18 | ||
| AVD-2025-38052 | net/tipc:修复板条无后用来阅读tipc_aead_encrypt_done(CVE-2025-38052) | 2025-06-18 | ||
| AVD-2025-38051 | SMB:客户端:CIFS_FILL_DIRENT中的不使用时使用(CVE-2025-38051) | 2025-06-18 | ||
| AVD-2025-38050 | MM/hugetlb:修复内核无指针取消替换自由hugetlb作用(CVE-2025-38050) | 2025-06-18 | ||
| AVD-2025-38048 | virtio_ring:通过标记event_ trigger作为kcsan的racy(CVE-2025-38048)来修复数据竞赛 | 2025-06-18 | ||
| AVD-2025-38047 | X86/FRED:FRED启用S4简历期间的修复系统挂起(CVE-2025-38047) | 2025-06-18 | ||
| AVD-2025-38045 | wifi:iwlwifi:修复调试动作顺序(CVE-2025-38045) | 2025-06-18 | ||
| AVD-2025-38044 | 媒体:CX231XX:设置417(CVE-2025-38044)的设置Device_caps | 2025-06-18 | ||
| AVD-2025-38043 | 固件:ARM_FFA:为FFA设备设置DMA_MASK(CVE-2025-38043) | 2025-06-18 | ||
| AVD-2025-38042 | dmaengine:ti:k3-udma-glue:k3_udma_glue_reset_rx_chn(CVE-2025-38042)的Drop SKIP_FDQ参数 | 2025-06-18 | ||
| AVD-2025-38041 | CLK:SUNXI-NG:H616:在频率变化期间修复GPU时钟(CVE-2025-38041) | 2025-06-18 | ||
| AVD-2025-38040 | 序列:MCTRL_GPIO:将Disable_ms分为同步和NO_SYNC API(CVE-2025-38040) | 2025-06-18 | ||
| AVD-2025-38039 | NET/MLX5E:使用启用HTB卸载MQPRIO时避免使用WARN_ON(CVE-2025-38039) | 2025-06-18 | ||
| AVD-2025-38038 | CPUFREQ:AMD-PSTATE:set_boost中删除不必要的驱动程序_lock(CVE-2025-38038) | 2025-06-18 | ||
| AVD-2025-38037 | VXLAN:注释FDB数据竞赛(CVE-2025-38037) | 2025-06-18 | ||
| AVD-2025-38036 | DRM/XE/VF:执行早期GT MMIO初始化以读取GMDID(CVE-2025-38036) | 2025-06-18 | ||
| AVD-2025-38035 | NVMET-TCP:不要恢复NULL SK_STATE_CHANGE(CVE-2025-38035) | 2025-06-18 | ||
| AVD-2025-38034 | BTRFS:在BTRFS__PRELIM_REF(CVE-2025-38034)中更正PRELIM_REF参数的顺序 | 2025-06-18 | ||
| AVD-2025-38033 | x86/kconfig:制作cfi_auto_default取决于!生锈或生锈> = 1.88(CVE-2025-38033) | 2025-06-18 | ||
| AVD-2025-38032 | MR:合并IPMR_CAN_FREE_TABLE()检查。 (CVE-2025-38032) | 2025-06-18 | ||
| AVD-2025-38031 | PADATA:请勿在Reorder_work(CVE-2025-38031)中泄漏重新数 | 2025-06-18 | ||
| AVD-2025-38029 | Kasan:避免从原子上下文(CVE-2025-38029)避免可睡页分配 | 2025-06-18 | ||
| AVD-2025-38028 | NFS/localio:修复NFS_LOCAL_OPEN_FH()(CVE-2025-38028)中的比赛 | 2025-06-18 | ||
| AVD-2025-38027 | 调节器:Max20086:修复无效的内存访问(CVE-2025-38027) | 2025-06-18 | ||
| AVD-2025-38025 | IIO:ADC:AD7606:在调用SW_MODE_CONFIG()(CVE-2025-38025)之前检查NULL | 2025-06-18 |