搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-21987 | DRM/AMDGPU:AMDGPU_TTM_CLEAR_BUFFER中的INIT返回值(CVE-2025-21987) | 2025-04-02 | ||
| AVD-2025-21986 | NET:SwitchDev:将封锁通知链转换为RAW链(CVE-2025-21986) | 2025-04-02 | ||
| AVD-2025-21985 | DRM/AMD/DISPAINAL:修复距离访问(CVE-2025-21985) | 2025-04-02 | ||
| AVD-2025-21984 | MM:修复userfaultfd_move遇到Swapcache时修复内核错误(CVE-2025-21984) | 2025-04-02 | ||
| AVD-2025-21983 | mm/slab/kvfree_rcu:切换到WQ_MEM_REAKLIAM WQ(CVE-2025-21983) | 2025-04-02 | ||
| AVD-2025-21982 | pinctrl:nuvoton:npcm8xx:添加null检查npcm8xx_gpio_fw(CVE-2025-21982) | 2025-04-02 | ||
| AVD-2025-21981 | ICE:修复重置后ARF中的内存泄漏(CVE-2025-21981) | 2025-04-02 | ||
| AVD-2025-21980 | 调度:地址在Gred调度程序中寻址潜在的无效指针解释。 (CVE-2025-21980) | 2025-04-02 | ||
| AVD-2025-21979 | WiFi:CFG80211:取消WIPHY_WORK,释放Wiphy(CVE-2025-21979) | 2025-04-02 | ||
| AVD-2025-21978 | DRM/HYPERV:删除Hyper-V DRM设备时修复地址空间泄漏(CVE-2025-21978) | 2025-04-02 | ||
| AVD-2025-21977 | FBDEV:HyperV_FB:在Hyper-V Gen 2 VM上(CVE-2025-21977)时,固定在kdump内核中 | 2025-04-02 | ||
| AVD-2025-21976 | FBDEV:HyperV_FB:允许优美地删除Framebuffer(CVE-2025-21976) | 2025-04-02 | ||
| AVD-2025-21975 | NET/MLX5:MLX5_CHAINS_CREATE_TABLE()(CVE-2025-21975)中的错误错误 | 2025-04-02 | ||
| AVD-2025-21974 | ETH:BNXT:返回失败如果接口在bnxt_queue_mem_alloc()(CVE-2025-21974)中 | 2025-04-02 | ||
| AVD-2025-21973 | eth:bnxt:修复bnxt_get_queue_stats中的内核恐慌{rx | TX}(CVE-2025-21973) | 2025-04-02 | ||
| AVD-2025-21972 | NET:MCTP:重新组装时解开包包(CVE-2025-21972) | 2025-04-02 | ||
| AVD-2025-21971 | net_sched:防止使用TC_H_ROOT(CVE-2025-21971)创建类 | 2025-04-02 | ||
| AVD-2025-21970 | NET/MLX5:桥梁,修复滞后状态检查引起的崩溃(CVE-2025-21970) | 2025-04-02 | ||
| AVD-2025-21969 | 蓝牙:L2CAP:修复l2CAP_SEND_CMD中的无板 - 使用板(CVE-2025-21969) | 2025-04-02 | ||
| AVD-2025-21968 | DRM/AMD/DISPLAY:在HDCP_Work上免费使用平板 - 使用板(CVE-2025-21968) | 2025-04-02 | ||
| AVD-2025-21967 | KSMBD:在KSMBD_FREE_WORK_STRUCT(CVE-2025-21967)中修复无用的使用。 | 2025-04-02 | ||
| AVD-2025-21966 | DM-Flakey:修复内存损坏中的可选rustal_bio_byte功能(CVE-2025-21966) | 2025-04-02 | ||
| AVD-2025-21965 | sched_ext:scx_bpf_select_cpu_dfl()(CVE-2025-21965)中的prev_cpu validate prev_cpu | 2025-04-02 | ||
| AVD-2025-21964 | CIFS:处理ACREGMAX安装选项时修复整数溢出(CVE-2025-21964) | 2025-04-02 | ||
| AVD-2025-21963 | CIFS:处理Acdirmax安装选项时修复整数溢出(CVE-2025-21963) | 2025-04-02 | ||
| AVD-2025-21962 | CIFS:修复整数溢出时,处理ClosetimeO安装选项(CVE-2025-21962) | 2025-04-02 | ||
| AVD-2025-21961 | ETH:BNXT:为MB-XDP-PASS案例(CVE-2025-21961)修复Truesize | 2025-04-02 | ||
| AVD-2025-21960 | ETH:BNXT:请勿在BNXT_XDP_BUILD_SKB()(CVE-2025-21960)中更新校验和 | 2025-04-02 | ||
| AVD-2025-21959 | NetFilter:nf_conncount:在insert_tree()(CVE-2025-21959)中完全初始化struct nf_conncount_tuple | 2025-04-02 | ||
| AVD-2025-21958 | 还原“ OpenVswitch:切换到Conntrack中的每项标签计数”(CVE-2025-21958) | 2025-04-02 |