搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38616 | TLS:处理从TLS ULP下消失的数据(CVE-2025-38616) | 2025-08-22 | ||
| AVD-2024-58239 | Linux kernel 安全漏洞(CVE-2024-58239) | 2025-08-22 | ||
| AVD-2025-38615 | FS/NTFS3:删除名称失败后的Cancle设置不良inode(CVE-2025-38615) | 2025-08-20 | ||
| AVD-2025-38614 | EventPoll:修复半无调的递归(CVE-2025-38614) | 2025-08-20 | ||
| AVD-2025-38613 | 分期:GPIB:修复未设定的填充字段复制回用户空间(CVE-2025-38613) | 2025-08-20 | ||
| AVD-2025-38612 | 登台:FBTFT:修复fbtft_framebuffer_alloc()(CVE-2025-38612)中的潜在内存泄漏 | 2025-08-20 | ||
| AVD-2025-38610 | PowerCap:DTPM_CPU:修复null指针在get_pd_power_uw()(CVE-2025-38610)中 | 2025-08-20 | ||
| AVD-2025-38609 | PM / DEVFREQ:使用州长 - >名称(CVE-2025-38609)之前检查州长 | 2025-08-20 | ||
| AVD-2025-38608 | BPF,KTLS:在KTLS中使用BPF_MSG_POP_DATA(CVE-2025-38608)时,请修复数据损坏 | 2025-08-20 | ||
| AVD-2025-38607 | BPF:将JSET(如果A&B ...)作为CFG计算中的跳跃(CVE-2025-38607) | 2025-08-20 | ||
| AVD-2025-38606 | wifi:ath12k:避免在信标小姐(CVE-2025-38606)期间访问非初始化的arvif-> ar | 2025-08-20 | ||
| AVD-2025-38605 | wifi:ath12k:将ab指针直接传递给ath12k_dp_tx_get_encap_type()(CVE-2025-38605) | 2025-08-20 | ||
| AVD-2025-38604 | WiFi:RTL818X:清除TX状态队列前杀死URB(CVE-2025-38604) | 2025-08-20 | ||
| AVD-2025-38602 | iwlwifi:添加缺失的检查Alloc_ordered_workqueue(CVE-2025-38602) | 2025-08-20 | ||
| AVD-2025-38601 | WiFi:ATH11K:Deinit-ED SRNG列表的清除初始化标志(CVE-2025-38601) | 2025-08-20 | ||
| AVD-2025-38600 | WiFi:MT76:MT7925:MT7925_MCU_HW_SCAN()(CVE-2025-38600)中的一个修复 | 2025-08-20 | ||
| AVD-2025-38599 | WiFi:MT76:MT7996:修复MT7996_TX()(CVE-2025-38599)中可能的OOB访问 | 2025-08-20 | ||
| AVD-2025-38598 | DRM/AMDGPU:AMDGPU_USERQ_SUSPEND中的无用时修复使用+0x51A/0x5A0(CVE-2025-38598) | 2025-08-20 | ||
| AVD-2025-38597 | DRM/Rockchip:VOP2:如果缺少视频港的主要平面(CVE-2025-38597),则失败。 | 2025-08-20 | ||
| AVD-2025-38596 | drm/panthor:panthor_gem_create_with_handle()debugfs代码(CVE-2025-38596) | 2025-08-20 | ||
| AVD-2025-38595 | XEN:DMABUF_EXP_FROM_PAGES()(CVE-2025-38595)中修复UAF | 2025-08-20 | ||
| AVD-2025-38594 | iOmmu/VT-D:将UAF固定在SVA上,请使用已待定的IOPF(CVE-2025-38594) | 2025-08-20 | ||
| AVD-2025-38593 | 蓝牙:hci_sync:'hci_discovery_filter_clear()'(CVE-2025-38593) | 2025-08-20 | ||
| AVD-2025-38592 | 蓝牙:hci_devcd_dump:通过dev_coredumpv(cve-2025-38592)修复越野外 | 2025-08-20 | ||
| AVD-2025-38591 | BPF:拒绝窄访问指针CTX字段(CVE-2025-38591) | 2025-08-20 | ||
| AVD-2025-38590 | NET/MLX5E:如果找不到XFRM状态,请删除SKB SECPATH(CVE-2025-38590) | 2025-08-20 | ||
| AVD-2025-38589 | 邻居:在newn_flush_dev()中修复null-ptr-deref。 (CVE-2025-38589) | 2025-08-20 | ||
| AVD-2025-38588 | IPv6:在RT6_NLMSG_SIZE()(CVE-2025-38588)中预防无限环路 | 2025-08-20 | ||
| AVD-2025-38587 | IPv6:修复fib6_info_uses_dev()(CVE-2025-38587)中可能的无限环路 | 2025-08-20 | ||
| AVD-2025-38586 | BPF,ARM64:修复异常边界的FP初始化(CVE-2025-38586) | 2025-08-20 |