搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49775 | TCP:CDG:允许TCP_CDG_RELEASE()多次调用(CVE-2022-49775) | 2025-05-01 | ||
| AVD-2022-49774 | KVM:X86/XEN:修复EventFD错误处理KVM_XEN_EVENTFD_ASSIGN()(CVE-2022-49774) | 2025-05-01 | ||
| AVD-2022-49773 | DRM/AMD/DISPLAY:fix optc2_configure警告DCN314(CVE-2022-49773) | 2025-05-01 | ||
| AVD-2022-49772 | ALSA:USB-AUDIO:SND_USBMIDI_OUTPUT_OPEN()(CVE-2022-49772)的DROV SND_BUG_ON() | 2025-05-01 | ||
| AVD-2022-49771 | DM ioctl:修复行为不当,如果List_versions与模块加载赛车(CVE-2022-49771) | 2025-05-01 | ||
| AVD-2022-49770 | CEPH:解码快照失败时避免将领域放置两次(CVE-2022-49770) | 2025-05-01 | ||
| AVD-2022-49769 | GFS2:阅读SuperBlock后检查SB_BSIZE_SHIFT(CVE-2022-49769) | 2025-05-01 | ||
| AVD-2022-49768 | 9p:trans_fd/p9_conn_cancel:较早的drop客户端锁(CVE-2022-49768) | 2025-05-01 | ||
| AVD-2022-49767 | 9p/trans_fd:始终使用O_NonBlock读/写(CVE-2022-49767) | 2025-05-01 | ||
| AVD-2022-49766 | NetLink:界限 - 检查结构NLMSGERR创建(CVE-2022-49766) | 2025-05-01 | ||
| AVD-2022-49765 | NET/9P:使用专用的Spinlock进行trans_fd(CVE-2022-49765) | 2025-05-01 | ||
| AVD-2022-49764 | BPF:防止原始跟踪探针的BPF程序递归(CVE-2022-49764) | 2025-05-01 | ||
| AVD-2022-49763 | NTFS:NTFS_ATTR_FIND()(CVE-2022-49763) | 2025-05-01 | ||
| AVD-2022-49762 | NTFS:迭代attr_records时检查溢出(CVE-2022-49762) | 2025-05-01 | ||
| AVD-2020-36790 | NVMET:修复内存泄漏(CVE-2020-36790) | 2025-05-01 | ||
| AVD-2025-37796 | WiFi:AT76C50X:在AT76_Disconnect免费访问后修复使用(CVE-2025-37796) | 2025-05-01 | ||
| AVD-2025-37795 | WiFi:MAC80211:更新IEEE80211_TX_DEQUEUE()中的SKB的控制块键(CVE-2025-37795) | 2025-05-01 | ||
| AVD-2025-37794 | WiFi:MAC80211:IEEE80211_DO_STOP()(CVE-2025-37794)中的Purge VIF TXQ | 2025-05-01 | ||
| AVD-2025-37793 | ASOC:Intel:AVS:AVS_COMPONENT_PROBE()(CVE-2025-37793)中的Null-Ptr-Deref | 2025-05-01 | ||
| AVD-2025-37792 | 蓝牙:btrtl:防止潜在的无效解雇(CVE-2025-37792) | 2025-05-01 | ||
| AVD-2025-37791 | EthTool:CMIS_CDB:在EthTool_CMIS_MODULE_POLL()(CVE-2025-37791)中使用正确的RPL大小 | 2025-05-01 | ||
| AVD-2025-37790 | NET:MCTP:SET SOCK_RCU_FREE(CVE-2025-37790) | 2025-05-01 | ||
| AVD-2025-37789 | NET:OpenVSwitch:固定嵌套的密钥长度验证()action(CVE-2025-37789) | 2025-05-01 | ||
| AVD-2025-37788 | CXGB4:修复内存泄漏CXGB4_INIT_ETHTOOL_FILTERS()错误路径(CVE-2025-37788) | 2025-05-01 | ||
| AVD-2025-37787 | 网络:DSA:MV88E6XXX:避免从未注册的DevLink区域(CVE-2025-37787) | 2025-05-01 | ||
| AVD-2025-37786 | 网络:DSA:探针故障的免费路由表(CVE-2025-37786) | 2025-05-01 | ||
| AVD-2025-37784 | net:ti:iCSS-iep:修复可能的null指针取消对每个请求(CVE-2025-37784) | 2025-05-01 | ||
| AVD-2025-37783 | DRM/MSM/DPU:DPU_PLANE_VIRTUAL_ATOMIC_CHECK中的修复错误指针(CVE-2025-37783) | 2025-05-01 | ||
| AVD-2025-37782 | HFS/HFSPlus:修复HFS_BNODE_READ_KEY中的BONBON-BONDS(CVE-2025-37782) | 2025-05-01 | ||
| AVD-2025-37781 | I2C:CROS-EC-TUNNEL:如果不存在父级EC(CVE-2025-37781),请延迟探测器 | 2025-05-01 |