搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38024 | rdma/rxe:修复板条 - 使用后免费阅读rxe_queue_cleanup bug(CVE-2025-38024) | 2025-06-18 | ||
| AVD-2025-38023 | NFS:nfs_get_lock_context在解锁路径中的操作故障(CVE-2025-38023) | 2025-06-18 | ||
| AVD-2025-38022 | RDMA/CORE:修复“ Kasan:IB_REGISTER_DEVICE”中的“ KASAN:SLAB-RES-use-free-fefter-fefter”问题(CVE-2025-38022) | 2025-06-18 | ||
| AVD-2025-38021 | drm/amd/display:fix pipe_ctx-> plane_state for Update_dchubp_dpp(CVE-2025-38021) | 2025-06-18 | ||
| AVD-2025-38020 | NET/MLX5E:禁用MACSEC卸载用于上行链路代表配置文件(CVE-2025-38020) | 2025-06-18 | ||
| AVD-2025-38019 | MLXSW:spectrum_router:删除GRE NET设备时无用的使用(CVE-2025-38019) | 2025-06-18 | ||
| AVD-2025-38018 | NET/TLS:Alloc_page失败时修复内核恐慌(CVE-2025-38018) | 2025-06-18 | ||
| AVD-2025-38017 | FS/eventpoll:超时后修复无尽的繁忙循环(CVE-2025-38017) | 2025-06-18 | ||
| AVD-2025-38016 | HID:BPF:如果设备被销毁(CVE-2025-38016),则流产调度 | 2025-06-18 | ||
| AVD-2025-38015 | DMAENGINE:IDXD:修复IDXD_ALLOC的错误处理路径中的内存泄漏(CVE-2025-38015) | 2025-06-18 | ||
| AVD-2025-38014 | DMAENGINE:IDXD:用IDXD_CLEANUP()助手删除呼叫(CVE-2025-38014) | 2025-06-18 | ||
| AVD-2025-38013 | WiFi:MAC80211:分配结构CFG80211_SCAN_REQUEST(CVE-2025-38013)之后设置N_CHANNEL | 2025-06-18 | ||
| AVD-2025-38012 | sched_ext:bpf_iter_scx_dsq_new()应始终初始化迭代器(CVE-2025-38012) | 2025-06-18 | ||
| AVD-2025-38011 | DRM/AMDGPU:CSA UMAP使用不间断锁(CVE-2025-38011) | 2025-06-18 | ||
| AVD-2025-38010 | PHY:TEGRA:XUSB:使用BitMask进行UTMI PAD POWER状态跟踪(CVE-2025-38010) | 2025-06-18 | ||
| AVD-2025-38009 | WiFi:MT76:驾驶员拆除的NAPI(CVE-2025-38009) | 2025-06-18 | ||
| AVD-2025-38008 | mm/page_alloc:在未接受的内存处理中修复比赛条件(CVE-2025-38008) | 2025-06-18 | ||
| AVD-2025-38007 | HID:uclogic:添加null检查uclogic_input_configured()(CVE-2025-38007) | 2025-06-18 | ||
| AVD-2025-38006 | NET:MCTP:丢失时请勿访问IFA_INDEX(CVE-2025-38006) | 2025-06-18 | ||
| AVD-2025-38005 | DMAENGINE:TI:K3-UDMA:添加缺失的锁定(CVE-2025-38005) | 2025-06-18 | ||
| AVD-2025-30399 | .NET和Visual Studio远程代码执行漏洞(CVE-2025-30399) | 2025-06-13 | ||
| AVD-2025-38004 | CAN:BCM:为BCM_OP运行时更新(CVE-2025-38004)添加锁定 | 2025-06-08 | ||
| AVD-2025-38003 | CAN:BCM:添加缺少的RCU阅读Procfs Content(CVE-2025-38003) | 2025-06-08 | ||
| AVD-2025-38002 | io_uring/fdinfo:grab ctx-> uring_lock in io_urn_show_show_fdinfo()(CVE-2025-38002) | 2025-06-06 | ||
| AVD-2025-38001 | net_sched:HFSC:地址重新入口辅助式将类添加到Eltree两次(CVE-2025-38001) | 2025-06-06 | ||
| AVD-2025-38000 | SCH_HFSC:在HFSC_ENQUEUE()中使用PEEK(CVE-2025-38000)时修复QLEN会计错误 | 2025-06-06 | ||
| AVD-2025-37999 | fs/erofs/fileio:在bio_add_folio()(CVE-2025-37999)之后呼叫erofs_onlinefolio_split() | 2025-05-29 | ||
| AVD-2025-37998 | OpenVswitch:fix upput_userspace()(CVE-2025-37998)中的不安全属性解析 | 2025-05-29 | ||
| AVD-2025-37997 | NetFilter:IPSET:修复区域锁定在哈希类型中(CVE-2025-37997) | 2025-05-29 | ||
| AVD-2025-37996 | KVM:ARM64:修复USER_MEM_ABORT()(CVE-2025-37996)中的非专业化memcache指针 | 2025-05-29 |