搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-22033 | ARM64:不要在do_compat_alignment_fixup()(CVE-2025-22033)中调用NULL | 2025-04-16 | ||
| AVD-2025-22032 | wifi:MT76:MT7921:由于无效指针删除而修复内核恐慌(CVE-2025-22032) | 2025-04-16 | ||
| AVD-2025-22031 | PCI/BWCTRL:修复NULL指针对总线编号耗尽(CVE-2025-22031) | 2025-04-16 | ||
| AVD-2025-22030 | MM:ZSWAP:FIX CRYPTO_FREE_ACOMP()ZSWAP_CPU_COMP_DEAD()(CVE-2025-22030) | 2025-04-16 | ||
| AVD-2025-22028 | 媒体:VIMC:SKIP .S_STREAM()用于停止实体(CVE-2025-22028) | 2025-04-16 | ||
| AVD-2025-22027 | 媒体:StreamZap:修复设备断开连接和URB回调之间的竞赛(CVE-2025-22027) | 2025-04-16 | ||
| AVD-2025-22026 | NFSD:不要忽略svc_proc_register()(CVE-2025-22026)的返回代码 | 2025-04-16 | ||
| AVD-2025-22025 | NFSD:如果无法排队DL_RECALL(CVE-2025-22025),请放置DL_STID | 2025-04-16 | ||
| AVD-2025-22024 | NFSD:侦听器运输的修复管理(CVE-2025-22024) | 2025-04-16 | ||
| AVD-2024-58097 | WiFi:ATH11K:在收获监视器目的地戒指时修复RCU摊位(CVE-2024-58097) | 2025-04-16 | ||
| AVD-2024-58096 | wifi:ath11k:添加srng-> ath11k_hal_srng_*在监视器模式下(CVE-2024-58096) | 2025-04-16 | ||
| AVD-2024-58095 | JFS:在TXBeginanon()呼叫(CVE-2024-58095)之前添加仅读取读取 | 2025-04-16 | ||
| AVD-2024-58094 | JFS:在JFS_TRUNCATE_NOLOCK()(CVE-2024-58094)中的截断之前添加读取仅读取 | 2025-04-16 | ||
| AVD-2024-58093 | PCI/ASPM:修复链路状态退出在上游函数删除期间(CVE-2024-58093) | 2025-04-16 | ||
| AVD-2023-53034 | NTB_HW_SWITCHTEC:修复switchTec_ntb_ntb_mw_set_trans中的偏移(CVE-2023-53034) | 2025-04-16 | ||
| AVD-2025-22023 | USB:XHCI:不要跳过停止 - 长度无效(CVE-2025-22023) | 2025-04-16 | ||
| AVD-2025-22022 | USB:XHCI:在NEC ISOC端点(CVE-2025-22022)上应用链接链怪异 | 2025-04-16 | ||
| AVD-2025-22021 | NETFILTER:插座:IPv6 SNAT的查找Orig Tuple(CVE-2025-22021) | 2025-04-16 | ||
| AVD-2025-22020 | memstick:rtsx_usb_ms:修复rtsx_usb_ms_drv_remove中的slab-use-use-free-free-free-free-free-free-free-free-free。 | 2025-04-16 | ||
| AVD-2025-22019 | BCACHEFS:BCH2_IOCTL_SUBVOLUME_DESTROY()修复(CVE-2025-22019) | 2025-04-16 | ||
| AVD-2024-58092 | NFSD:修复旧客户跟踪初始化(CVE-2024-58092) | 2025-04-16 | ||
| AVD-2025-22018 | ATM:修复NULL指针解除(CVE-2025-22018) | 2025-04-16 | ||
| AVD-2025-3423 | IBM Aspera Faspex 5跨站点脚本(CVE-2025-3423) | 2025-04-13 | ||
| AVD-2025-1095 | IBM个人通信命令执行(CVE-2025-1095) | 2025-04-09 | ||
| AVD-2025-22017 | DevLink:修复XA_ALLOC_CYCLIC()错误处理(CVE-2025-22017) | 2025-04-08 | ||
| AVD-2025-22016 | DPLL:修复XA_ALLOC_CYCLIC()错误处理(CVE-2025-22016) | 2025-04-08 | ||
| AVD-2025-22015 | MM/迁移:修复迁移期间的SHMEM XARRAY更新(CVE-2025-22015) | 2025-04-08 | ||
| AVD-2025-22014 | SOC:QCOM:PDR:修复潜在的僵局(CVE-2025-22014) | 2025-04-08 | ||
| AVD-2025-22013 | KVM:ARM64:无条件保存+冲洗主机FPSIMD/SVE/SME状态(CVE-2025-22013) | 2025-04-08 | ||
| AVD-2025-22012 | 还原“ ARM64:DTS:QCOM:SDM845:APPS_SMMU上的肯定IDR0.CCTW”(CVE-2025-22012) | 2025-04-08 |