搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38186 | bnxt_en:修复bnxt_ulp_stop()/bnxt_ulp_start()(CVE-2025-38186)的双重调用 | 2025-07-04 | ||
| AVD-2025-38185 | ATM:ATMTCP:ATMTCP_C_SEND()中的免费无效长度SKB。 (CVE-2025-38185) | 2025-07-04 | ||
| AVD-2025-38184 | 提示:在获取以太网携带者的远程IP时修复Null-Ptr-Deref(CVE-2025-38184) | 2025-07-04 | ||
| AVD-2025-38183 | NET:LAN743X:修复潜在的界外写作在LAN743X_PTP_IO_EVENT_CLOCK_GET()(CVE-2025-38183)中 | 2025-07-04 | ||
| AVD-2025-38182 | UBLK:添加设备时从用户空间中的参数(CVE-2025-38182)化。 | 2025-07-04 | ||
| AVD-2025-38181 | Calipso:在Calipso_req_ {set,del} attry()中修复null-ptr-deref。 (CVE-2025-38181) | 2025-07-04 | ||
| AVD-2025-38180 | 网络:ATM:FIX/PROC/NET/ATM/LEC处理(CVE-2025-38180) | 2025-07-04 | ||
| AVD-2025-38179 | SMB:客户端:fix max_sge溢出smb_extract_folioq_to_rdma()(CVE-2025-38179) | 2025-07-04 | ||
| AVD-2025-38177 | SCH_HFSC:MAKE HFSC_QLEN_NOTIFY()IDEMPOTENT(CVE-2025-38177) | 2025-07-04 | ||
| AVD-2025-38176 | 活页夹:binderfs_evict_inode()(CVE-2025-38176)中的fix-frie-fre-fre-fre-fre-fre-fre-fre-fre-frie-fre-frie- | 2025-07-04 | ||
| AVD-2025-38175 | 活页夹:修复Binder_devices中的另一个UAF(CVE-2025-38175) | 2025-07-04 | ||
| AVD-2025-38174 | Thunderbolt:请勿将配置请求(CVE-2025-38174)倍增 | 2025-07-04 | ||
| AVD-2025-38173 | 加密:Marvell/CESA-处理零长度Skcipher请求(CVE-2025-38173) | 2025-07-03 | ||
| AVD-2025-38172 | EROF:避免使用具有不同类型的多个设备(CVE-2025-38172) | 2025-07-03 | ||
| AVD-2025-38171 | 电源:供应:Max77705:修复探针中的工作按摩误差(CVE-2025-38171) | 2025-07-03 | ||
| AVD-2025-38170 | ARM64/FPSIMD:处理中小型企业陷阱时丢弃陈旧的CPU状态(CVE-2025-38170) | 2025-07-03 | ||
| AVD-2025-38169 | ARM64/fpsimd:避免使用SMSTOP(CVE-2025-38169)的内核fpsimd状态 | 2025-07-03 | ||
| AVD-2025-38168 | perf:Arm-Ni:探针失败的Register PMU(CVE-2025-38168) | 2025-07-03 | ||
| AVD-2025-38167 | FS/NTFS3:处理HDR_FIRST_DE()返回值(CVE-2025-38167) | 2025-07-03 | ||
| AVD-2025-38166 | BPF:用sockmap(CVE-2025-38166)解决KTLS恐慌 | 2025-07-03 | ||
| AVD-2025-38165 | BPF,Sockmap:调用SKB_Linearize时解决恐慌(CVE-2025-38165) | 2025-07-03 | ||
| AVD-2025-38164 | F2FS:区域:修复以避免SIT和SSA之间的不一致(CVE-2025-38164) | 2025-07-03 | ||
| AVD-2025-38163 | F2FS:修复理智检查SBI-> total_valid_block_count(CVE-2025-38163) | 2025-07-03 | ||
| AVD-2025-38162 | NetFilter:NFT_SET_PIPAPO:防止查找表分配中溢出(CVE-2025-38162) | 2025-07-03 | ||
| AVD-2025-38161 | RDMA/MLX5:RQ破坏固件故障时的修复错误流(CVE-2025-38161) | 2025-07-03 | ||
| AVD-2025-38160 | CLK:BCM:RPI:添加null检查raspberrypi_clk_register()(CVE-2025-38160) | 2025-07-03 | ||
| AVD-2025-38159 | WiFi:RTW88:修复“ Para”缓冲区大小,以避免读取范围(CVE-2025-38159) | 2025-07-03 | ||
| AVD-2025-38158 | HISI_ACC_VFIO_PCI:修复XQE DMA地址错误(CVE-2025-38158) | 2025-07-03 | ||
| AVD-2025-38157 | wifi:ath9k_htc:如果禁用了流中的软件信标(CVE-2025-38157) | 2025-07-03 | ||
| AVD-2025-38156 | WiFi:MT76:MT7996:修复Null-Ptr-Deref中的NULL-PTR-DEREF中的MT7996_MMIO_WED_INIT()(CVE-2025-38156) | 2025-07-03 |