搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38241 | mm/shmem,交换:用MTHP Swapin(CVE-2025-38241)修复软锁 | 2025-07-09 | ||
| AVD-2025-38239 | SCSI:MEGARAID_SAS:修复无效节点索引(CVE-2025-38239) | 2025-07-09 | ||
| AVD-2025-38238 | SCSI:FNIC:FNIC_WQ_CMPL_HANDLER中的崩溃时,FDMI times Out(CVE-2025-38238) | 2025-07-09 | ||
| AVD-2025-27369 | 沃森信息披露(CVE-2025-27369)的IBM开放页面 | 2025-07-09 | ||
| AVD-2025-27367 | IBM开放页面,沃森不当输入验证(CVE-2025-27367) | 2025-07-09 | ||
| AVD-2024-49784 | 沃森信息披露(CVE-2024-49784)的IBM OpenPages | 2025-07-09 | ||
| AVD-2024-49783 | 沃森信息披露(CVE-2024-49783)的IBM开放页面 | 2025-07-09 | ||
| AVD-2025-3630 | IBM Sterling B2B集成器和IBM Sterling文件网关跨站点脚本(CVE-2025-3630) | 2025-07-08 | ||
| AVD-2025-2827 | IBM Sterling文件网关信息披露(CVE-2025-2827) | 2025-07-08 | ||
| AVD-2025-2793 | IBM Sterling B2B积分器和IBM Sterling File Gateway跨站点脚本(CVE-2025-2793) | 2025-07-08 | ||
| AVD-2025-38237 | 媒体:平台:exynos4-is:添加硬件同步等待到fimc_is_hw_change_mode()(CVE-2025-38237) | 2025-07-08 | ||
| AVD-2025-38236 | AF_UNIX:不要连续消耗的OOB SKB。 (CVE-2025-38236) | 2025-07-08 | ||
| AVD-2025-38235 | HID:appletb-kbd:修复“ appletb_backlight”背光设备参考计数(CVE-2025-38235) | 2025-07-06 | ||
| AVD-2025-38234 | Sched/RT:FIX RACE中的push_rt_task(CVE-2025-38234) | 2025-07-04 | ||
| AVD-2025-38233 | PowerPC64/ftrace:LivePatching期间修复了Clobbered R15(CVE-2025-38233) | 2025-07-04 | ||
| AVD-2025-38232 | NFSD:修复NFSD注册和Exports_Proc之间的比赛(CVE-2025-38232) | 2025-07-04 | ||
| AVD-2025-38231 | NFSD:在Laundromat_work之前初始化SSC,以防止null解释(CVE-2025-38231) | 2025-07-04 | ||
| AVD-2025-38230 | JFS:DBMount()中验证AG参数以防止崩溃(CVE-2025-38230) | 2025-07-04 | ||
| AVD-2025-38229 | 媒体:CXUSB:写入失败时不再判断RBUF(CVE-2025-38229) | 2025-07-04 | ||
| AVD-2025-38228 | 媒体:想象力:修复E5010_Probe()(CVE-2025-38228)中的潜在内存泄漏 | 2025-07-04 | ||
| AVD-2025-38227 | 媒体:VIDTV:终止初始化失败的后续过程(CVE-2025-38227) | 2025-07-04 | ||
| AVD-2025-38226 | 媒体:生动:更改组成的siize(CVE-2025-38226) | 2025-07-04 | ||
| AVD-2025-38225 | 媒体:IMX-JPEG:分配错误后清理(CVE-2025-38225) | 2025-07-04 | ||
| AVD-2025-38224 | CAN:KVASER_PCIEFD:PRIFINE错误易于echo_skb_max处理逻辑(CVE-2025-38224) | 2025-07-04 | ||
| AVD-2025-38223 | CEPH:避免使用未对准的文件大小的内核错误(CVE-2025-38223) | 2025-07-04 | ||
| AVD-2025-38222 | EXT4:内联:FIX LEN OVERFLOW中的Ext4_prepare_inline_data(CVE-2025-38222) | 2025-07-04 | ||
| AVD-2025-38221 | EXT4:固定界限偏移量(CVE-2025-38221) | 2025-07-04 | ||
| AVD-2025-38220 | EXT4:只有在数据日记定期文件(CVE-2025-38220)时才肮脏的作品集(CVE-2025-38220) | 2025-07-04 | ||
| AVD-2025-38219 | F2FS:防止因损坏图像的负I_NLINK引起的内核警告(CVE-2025-38219) | 2025-07-04 | ||
| AVD-2025-38218 | F2FS:修复以进行理智检查SIT_BITMAP_SIZE(CVE-2025-38218) | 2025-07-04 |