| dirmngr |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gnupg |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gnupg-utils |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gnupg2 |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gpg |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gpg-agent |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gpgconf |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gpgsm |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| gpgv |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| keyboxd |
CVE-2025-68973 |
高危 |
2.4.4-2ubuntu17.3 |
2.4.4-2ubuntu17.4 |
GnuPG: GnuPG: Information disclosure and potential arbitrary code execution via out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68973
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-28 17:16 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-22036 |
高危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: exfat: fix random stack corruption after get_block
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22036
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-37899 |
高危 |
6.8.0-79.79 |
|
kernel: ksmbd: fix use-after-free in session logoff
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37899
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-20 16:15 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-38118 |
高危 |
6.8.0-79.79 |
6.8.0-87.88 |
kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38118
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-03 09:15 修改: 2025-12-17 18:29
|
| linux-libc-dev |
CVE-2025-38352 |
高危 |
6.8.0-79.79 |
6.8.0-87.88 |
kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38352
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-22 08:15 修改: 2026-01-08 16:28
|
| linux-libc-dev |
CVE-2025-38666 |
高危 |
6.8.0-79.79 |
6.8.0-90.91 |
kernel: net: appletalk: Fix use-after-free in AARP proxy probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38666
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2026-01-07 17:31
|
| linux-libc-dev |
CVE-2025-39735 |
高危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: jfs: fix slab-out-of-bounds read in ea_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39735
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-03 20:18
|
| linux-libc-dev |
CVE-2025-40300 |
高危 |
6.8.0-79.79 |
6.8.0-87.88 |
kernel: x86/vmscape: Add conditional IBPB mitigation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40300
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-11 17:15 修改: 2026-01-16 20:25
|
| binutils-common |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils-common |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils-common |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| binutils-common |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| binutils-common |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| binutils-common |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| binutils-common |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| binutils-common |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| binutils-common |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| binutils-common |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| binutils-common |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| binutils-common |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| binutils-common |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| binutils-common |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| binutils-common |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils-common |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils-common |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| binutils-x86-64-linux-gnu |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils-x86-64-linux-gnu |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| binutils-x86-64-linux-gnu |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| binutils-x86-64-linux-gnu |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| binutils-x86-64-linux-gnu |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| binutils-x86-64-linux-gnu |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| binutils-x86-64-linux-gnu |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| binutils-x86-64-linux-gnu |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| binutils-x86-64-linux-gnu |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| binutils-x86-64-linux-gnu |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| binutils-x86-64-linux-gnu |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| binutils-x86-64-linux-gnu |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| binutils-x86-64-linux-gnu |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| binutils-x86-64-linux-gnu |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| binutils-x86-64-linux-gnu |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils-x86-64-linux-gnu |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils-x86-64-linux-gnu |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| cuda-compat-13-0 |
CVE-2025-23280 |
中危 |
580.82.07-0ubuntu1 |
580.95.05-0ubuntu0.24.04.2 |
NVIDIA Display Driver for Linux contains a vulnerability where an atta ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23280
镜像层: sha256:6e7fca69a642c3dfa6e52b07f4bb96c93c57dcf7e2ee4dd5d96682b1aaa9398c
发布日期: 2025-10-10 18:15 修改: 2025-10-14 19:36
|
| cuda-compat-13-0 |
CVE-2025-23282 |
中危 |
580.82.07-0ubuntu1 |
580.95.05-0ubuntu0.24.04.2 |
kvm: NVIDIA Display Driver vulnerability due to race condition leading to escalate privileges
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23282
镜像层: sha256:6e7fca69a642c3dfa6e52b07f4bb96c93c57dcf7e2ee4dd5d96682b1aaa9398c
发布日期: 2025-10-10 18:15 修改: 2025-10-14 19:36
|
| cuda-compat-13-0 |
CVE-2025-23300 |
中危 |
580.82.07-0ubuntu1 |
580.95.05-0ubuntu0.24.04.2 |
nvidia-display-driver: NVIDIA Display Driver Null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23300
镜像层: sha256:6e7fca69a642c3dfa6e52b07f4bb96c93c57dcf7e2ee4dd5d96682b1aaa9398c
发布日期: 2025-10-23 19:15 修改: 2025-10-27 13:20
|
| cuda-compat-13-0 |
CVE-2025-23330 |
中危 |
580.82.07-0ubuntu1 |
580.95.05-0ubuntu0.24.04.2 |
nvidia-display-driver: NVIDIA Display Driver null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23330
镜像层: sha256:6e7fca69a642c3dfa6e52b07f4bb96c93c57dcf7e2ee4dd5d96682b1aaa9398c
发布日期: 2025-10-23 19:15 修改: 2025-10-27 13:20
|
| cuda-compat-13-0 |
CVE-2025-23332 |
中危 |
580.82.07-0ubuntu1 |
580.95.05-0ubuntu0.24.04.2 |
nvidia-display-driver: NVIDIA Display Driver null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23332
镜像层: sha256:6e7fca69a642c3dfa6e52b07f4bb96c93c57dcf7e2ee4dd5d96682b1aaa9398c
发布日期: 2025-10-23 19:15 修改: 2025-10-27 13:20
|
| cuda-compat-13-0 |
CVE-2025-23345 |
中危 |
580.82.07-0ubuntu1 |
580.95.05-0ubuntu0.24.04.2 |
nvidia-display-driver: NVIDIA Display Driver out of bound read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23345
镜像层: sha256:6e7fca69a642c3dfa6e52b07f4bb96c93c57dcf7e2ee4dd5d96682b1aaa9398c
发布日期: 2025-10-23 19:15 修改: 2025-10-27 13:20
|
| binutils |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| dirmngr |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| gir1.2-glib-2.0 |
CVE-2025-13601 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39
|
| gir1.2-glib-2.0 |
CVE-2025-14087 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18
|
| gir1.2-glib-2.0 |
CVE-2025-14512 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14512
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-11 07:16 修改: 2025-12-12 15:18
|
| git |
CVE-2024-52005 |
中危 |
1:2.43.0-1ubuntu7.3 |
|
git: The sideband payload is passed unfiltered to the terminal in git
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52005
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-01-15 18:15 修改: 2025-12-18 16:00
|
| git-man |
CVE-2024-52005 |
中危 |
1:2.43.0-1ubuntu7.3 |
|
git: The sideband payload is passed unfiltered to the terminal in git
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52005
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-01-15 18:15 修改: 2025-12-18 16:00
|
| binutils |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| gnupg |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| binutils |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| gnupg-utils |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| binutils |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| gnupg2 |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| binutils |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| gpg |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| binutils |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| gpg-agent |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| binutils |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| gpgconf |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| binutils |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| gpgsm |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| binutils |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| gpgv |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| idle-python3.12 |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| binutils |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| keyboxd |
CVE-2025-68972 |
中危 |
2.4.4-2ubuntu17.3 |
|
gnupg: GnuPG: Signature bypass via form feed character in signed messages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68972
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-12-27 23:15 修改: 2026-01-09 20:08
|
| libbinutils |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libbinutils |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libbinutils |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| libbinutils |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| libbinutils |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| libbinutils |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libbinutils |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libbinutils |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| libbinutils |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| libbinutils |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| libbinutils |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| libbinutils |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| libbinutils |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| libbinutils |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| libbinutils |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libbinutils |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libbinutils |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| libctf-nobfd0 |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libctf-nobfd0 |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libctf-nobfd0 |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| libctf-nobfd0 |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| libctf-nobfd0 |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| libctf-nobfd0 |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libctf-nobfd0 |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libctf-nobfd0 |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| libctf-nobfd0 |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| libctf-nobfd0 |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| libctf-nobfd0 |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| libctf-nobfd0 |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| libctf-nobfd0 |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| libctf-nobfd0 |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| libctf-nobfd0 |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libctf-nobfd0 |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libctf-nobfd0 |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| libctf0 |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libctf0 |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libctf0 |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| libctf0 |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| libctf0 |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| libctf0 |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libctf0 |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libctf0 |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| libctf0 |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| libctf0 |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| libctf0 |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| libctf0 |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| libctf0 |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| libctf0 |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| libctf0 |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libctf0 |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libctf0 |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| libexpat1 |
CVE-2025-66382 |
中危 |
2.6.1-2ubuntu0.3 |
|
libexpat: libexpat: Denial of service via crafted file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66382
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-11-28 07:15 修改: 2025-12-19 16:05
|
| libexpat1-dev |
CVE-2025-66382 |
中危 |
2.6.1-2ubuntu0.3 |
|
libexpat: libexpat: Denial of service via crafted file processing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66382
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-11-28 07:15 修改: 2025-12-19 16:05
|
| libglib2.0-0t64 |
CVE-2025-13601 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39
|
| libglib2.0-0t64 |
CVE-2025-14087 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18
|
| libglib2.0-0t64 |
CVE-2025-14512 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14512
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-11 07:16 修改: 2025-12-12 15:18
|
| libglib2.0-bin |
CVE-2025-13601 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39
|
| libglib2.0-bin |
CVE-2025-14087 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18
|
| libglib2.0-bin |
CVE-2025-14512 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14512
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-11 07:16 修改: 2025-12-12 15:18
|
| libglib2.0-data |
CVE-2025-13601 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in in g_escape_uri_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13601
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-11-26 15:15 修改: 2025-12-01 15:39
|
| libglib2.0-data |
CVE-2025-14087 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14087
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-10 09:15 修改: 2025-12-12 15:18
|
| libglib2.0-data |
CVE-2025-14512 |
中危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14512
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-11 07:16 修改: 2025-12-12 15:18
|
| libgprofng0 |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libgprofng0 |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libgprofng0 |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| libgprofng0 |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| libgprofng0 |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| libgprofng0 |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libgprofng0 |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libgprofng0 |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| libgprofng0 |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| libgprofng0 |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| libgprofng0 |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| libgprofng0 |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| libgprofng0 |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| libgprofng0 |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| libgprofng0 |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libgprofng0 |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libgprofng0 |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| libgrpc++1.51t64 |
CVE-2019-9514 |
中危 |
1.51.1-4.1build5 |
|
HTTP/2: flood using HEADERS frames results in unbounded memory growth
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9514
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2019-08-13 21:15 修改: 2025-01-14 19:29
|
| libgrpc++1.51t64 |
CVE-2019-9515 |
中危 |
1.51.1-4.1build5 |
|
HTTP/2: flood using SETTINGS frames results in unbounded memory growth
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9515
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2019-08-13 21:15 修改: 2025-01-14 19:29
|
| libgrpc29t64 |
CVE-2019-9514 |
中危 |
1.51.1-4.1build5 |
|
HTTP/2: flood using HEADERS frames results in unbounded memory growth
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9514
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2019-08-13 21:15 修改: 2025-01-14 19:29
|
| libgrpc29t64 |
CVE-2019-9515 |
中危 |
1.51.1-4.1build5 |
|
HTTP/2: flood using SETTINGS frames results in unbounded memory growth
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-9515
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2019-08-13 21:15 修改: 2025-01-14 19:29
|
| libpam-modules |
CVE-2024-10963 |
中危 |
1.5.3-5ubuntu5.4 |
1.5.3-5ubuntu5.5 |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2024-11-07 16:15 修改: 2025-02-06 06:15
|
| libpam-modules |
CVE-2025-8941 |
中危 |
1.5.3-5ubuntu5.4 |
|
linux-pam: Incomplete fix for CVE-2025-6020
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8941
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-08-13 15:15 修改: 2025-11-20 21:16
|
| libpam-modules-bin |
CVE-2024-10963 |
中危 |
1.5.3-5ubuntu5.4 |
1.5.3-5ubuntu5.5 |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2024-11-07 16:15 修改: 2025-02-06 06:15
|
| libpam-modules-bin |
CVE-2025-8941 |
中危 |
1.5.3-5ubuntu5.4 |
|
linux-pam: Incomplete fix for CVE-2025-6020
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8941
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-08-13 15:15 修改: 2025-11-20 21:16
|
| libpam-runtime |
CVE-2024-10963 |
中危 |
1.5.3-5ubuntu5.4 |
1.5.3-5ubuntu5.5 |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2024-11-07 16:15 修改: 2025-02-06 06:15
|
| libpam-runtime |
CVE-2025-8941 |
中危 |
1.5.3-5ubuntu5.4 |
|
linux-pam: Incomplete fix for CVE-2025-6020
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8941
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-08-13 15:15 修改: 2025-11-20 21:16
|
| libpam0g |
CVE-2024-10963 |
中危 |
1.5.3-5ubuntu5.4 |
1.5.3-5ubuntu5.5 |
pam: Improper Hostname Interpretation in pam_access Leads to Access Control Bypass
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-10963
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2024-11-07 16:15 修改: 2025-02-06 06:15
|
| libpam0g |
CVE-2025-8941 |
中危 |
1.5.3-5ubuntu5.4 |
|
linux-pam: Incomplete fix for CVE-2025-6020
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8941
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-08-13 15:15 修改: 2025-11-20 21:16
|
| libpng16-16t64 |
CVE-2025-66293 |
中危 |
1.6.43-5ubuntu0.1 |
1.6.43-5ubuntu0.3 |
libpng: LIBPNG out-of-bounds read in png_image_read_composite
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66293
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-03 21:15 修改: 2025-12-16 19:12
|
| libpng16-16t64 |
CVE-2026-22695 |
中危 |
1.6.43-5ubuntu0.1 |
1.6.43-5ubuntu0.3 |
libpng: libpng: Denial of service and information disclosure via heap buffer over-read in png_image_finish_read
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22695
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-12 23:15 修改: 2026-01-13 14:03
|
| libpng16-16t64 |
CVE-2026-22801 |
中危 |
1.6.43-5ubuntu0.1 |
1.6.43-5ubuntu0.3 |
libpng: libpng: Information disclosure and denial of service via integer truncation in simplified write API
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-22801
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-12 23:15 修改: 2026-01-13 14:03
|
| libpython3.12-dev |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| libpython3.12-minimal |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| libpython3.12-stdlib |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| libpython3.12-testsuite |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| libpython3.12t64 |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| libsframe1 |
CVE-2025-11082 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libsframe1 |
CVE-2025-11083 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils Linker heap-based overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-27 23:15 修改: 2025-10-03 16:52
|
| libsframe1 |
CVE-2025-11412 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11412
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:09
|
| libsframe1 |
CVE-2025-11413 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c elf_link_add_object_symbols out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11413
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 22:15 修改: 2025-10-14 15:24
|
| libsframe1 |
CVE-2025-11414 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker elflink.c get_link_hash_entry out-of-bounds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11414
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 23:15 修改: 2025-10-14 15:25
|
| libsframe1 |
CVE-2025-1147 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils nm nm.c internal_strlen buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1147
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libsframe1 |
CVE-2025-1148 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld ldelfgen.c link_order_scan memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1148
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 14:15 修改: 2025-04-04 23:15
|
| libsframe1 |
CVE-2025-11494 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.8 |
binutils: GNU Binutils Linker out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11494
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-08 20:15 修改: 2025-10-14 15:27
|
| libsframe1 |
CVE-2025-1180 |
中危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-11 08:15 修改: 2025-05-21 20:35
|
| libsframe1 |
CVE-2025-11839 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils prdbg.c tg_tag_type return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 14:15 修改: 2025-11-06 22:20
|
| libsframe1 |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| libsframe1 |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| libsframe1 |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| libsframe1 |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| libsframe1 |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libsframe1 |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| libsframe1 |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| libsodium23 |
CVE-2025-69277 |
中危 |
1.0.18-1build3 |
1.0.18-1ubuntu0.24.04.1 |
libsodium: pynacl: libsodium: Improper validation of elliptic curve points could lead to data integrity or information disclosure.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-69277
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-31 06:15 修改: 2026-01-07 17:16
|
| libsqlite3-0 |
CVE-2025-7709 |
中危 |
3.45.1-1ubuntu2.4 |
3.45.1-1ubuntu2.5 |
An integer overflow exists in the FTS5 https://sqlite.org/fts5.html e ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7709
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2025-09-08 15:15 修改: 2025-11-18 23:15
|
| libtasn1-6 |
CVE-2025-13151 |
中危 |
4.19.0-3ubuntu0.24.04.1 |
4.19.0-3ubuntu0.24.04.2 |
libtasn1: libtasn1: Denial of Service via stack-based buffer overflow in asn1_expend_octet_string
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13151
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2026-01-07 22:15 修改: 2026-01-20 18:16
|
| binutils |
CVE-2025-11840 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.7 |
binutils: GNU Binutils out-of-bounds read
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-11840
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-16 16:15 修改: 2025-10-23 19:41
|
| binutils |
CVE-2025-3198 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump bucomm.c display_info memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-04 02:15 修改: 2025-05-15 19:46
|
| binutils |
CVE-2025-5244 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils ld elflink.c elf_gc_sweep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 13:15 修改: 2025-10-03 14:46
|
| binutils |
CVE-2025-5245 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: GNU Binutils objdump debug.c debug_type_samep memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-27 15:15 修改: 2025-10-03 14:45
|
| binutils |
CVE-2025-7545 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Heap Buffer Overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7545
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils |
CVE-2025-7546 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils: Out-of-bounds Write Vulnerability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7546
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-13 22:15 修改: 2025-07-30 15:59
|
| binutils |
CVE-2025-8225 |
中危 |
2.42-4ubuntu2.5 |
2.42-4ubuntu2.6 |
binutils: Binutils DWARF Section Handler Memory Leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-8225
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-27 08:15 修改: 2025-08-01 17:08
|
| linux-libc-dev |
CVE-2013-7445 |
中危 |
6.8.0-79.79 |
|
kernel: memory exhaustion via crafted Graphics Execution Manager (GEM) objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2013-7445
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2015-10-16 01:59 修改: 2025-04-12 10:46
|
| linux-libc-dev |
CVE-2015-7837 |
中危 |
6.8.0-79.79 |
|
kernel: securelevel disabled after kexec
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-7837
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-09-19 16:29 修改: 2025-04-20 01:37
|
| linux-libc-dev |
CVE-2015-8553 |
中危 |
6.8.0-79.79 |
|
xen: non-maskable interrupts triggerable by guests (xsa120)
漏洞详情: https://avd.aquasec.com/nvd/cve-2015-8553
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2016-04-13 15:59 修改: 2025-04-12 10:46
|
| linux-libc-dev |
CVE-2016-8660 |
中危 |
6.8.0-79.79 |
|
kernel: xfs: local DoS due to a page lock order bug in the XFS seek hole/data implementation
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-8660
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2016-10-16 21:59 修改: 2025-04-12 10:46
|
| linux-libc-dev |
CVE-2018-17977 |
中危 |
6.8.0-79.79 |
|
kernel: Mishandled interactions among XFRM Netlink messages, IPPROTO_AH packets, and IPPROTO_IP packets resulting in a denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-17977
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2018-10-08 17:29 修改: 2024-11-21 03:55
|
| linux-libc-dev |
CVE-2019-15794 |
中危 |
6.8.0-79.79 |
|
kernel: Overlayfs in the Linux kernel and shiftfs not restoring original value on error leading to a refcount underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15794
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2020-04-24 00:15 修改: 2024-11-21 04:29
|
| linux-libc-dev |
CVE-2020-14356 |
中危 |
6.8.0-79.79 |
|
kernel: Use After Free vulnerability in cgroup BPF component
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14356
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2020-08-19 15:15 修改: 2024-11-21 05:03
|
| linux-libc-dev |
CVE-2021-3714 |
中危 |
6.8.0-79.79 |
|
kernel: Remote Page Deduplication Attacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3714
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-08-23 16:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2021-3864 |
中危 |
6.8.0-79.79 |
|
kernel: descendant's dumpable setting with certain SUID binaries
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-3864
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-08-26 16:15 修改: 2024-11-21 06:22
|
| linux-libc-dev |
CVE-2022-0400 |
中危 |
6.8.0-79.79 |
|
kernel: Out of bounds read in the smc protocol stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0400
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-0480 |
中危 |
6.8.0-79.79 |
|
kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-0480
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-08-29 15:15 修改: 2024-11-21 06:38
|
| linux-libc-dev |
CVE-2022-1247 |
中危 |
6.8.0-79.79 |
|
kernel: A race condition bug in rose_connect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-1247
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-08-31 16:15 修改: 2024-11-21 06:40
|
| linux-libc-dev |
CVE-2022-25836 |
中危 |
6.8.0-79.79 |
|
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-25836
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-12-12 04:15 修改: 2025-04-22 21:15
|
| linux-libc-dev |
CVE-2022-2961 |
中危 |
6.8.0-79.79 |
|
kernel: race condition in rose_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-2961
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-08-29 15:15 修改: 2024-11-21 07:01
|
| linux-libc-dev |
CVE-2022-3238 |
中危 |
6.8.0-79.79 |
|
kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3238
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-11-14 21:15 修改: 2025-05-01 14:15
|
| linux-libc-dev |
CVE-2022-4543 |
中危 |
6.8.0-79.79 |
|
kernel: KASLR Prefetch Bypass Breaks KPTI
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-4543
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-01-11 15:15 修改: 2025-04-08 20:15
|
| linux-libc-dev |
CVE-2022-48846 |
中危 |
6.8.0-79.79 |
|
kernel: block: release rq qos structures for queue without disk
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48846
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-07-16 13:15 修改: 2024-11-21 07:34
|
| linux-libc-dev |
CVE-2022-48929 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids.
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-48929
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-08-22 04:15 修改: 2024-08-23 02:00
|
| linux-libc-dev |
CVE-2022-49940 |
中危 |
6.8.0-79.79 |
|
kernel: tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-49940
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 11:15 修改: 2025-11-14 19:39
|
| linux-libc-dev |
CVE-2022-50090 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: replace BTRFS_MAX_EXTENT_SIZE with fs_info->max_extent_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50090
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 11:15 修改: 2025-11-18 02:17
|
| linux-libc-dev |
CVE-2022-50230 |
中危 |
6.8.0-79.79 |
|
kernel: arm64: set UXN on swapper page tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50230
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:57
|
| linux-libc-dev |
CVE-2022-50232 |
中危 |
6.8.0-79.79 |
|
kernel: arm64: set UXN on swapper page tables
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50232
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 11:15 修改: 2025-11-19 12:57
|
| linux-libc-dev |
CVE-2022-50240 |
中危 |
6.8.0-79.79 |
|
kernel: binder: fix UAF of alloc->vma in race with munmap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50240
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-15 14:15 修改: 2025-11-24 17:25
|
| linux-libc-dev |
CVE-2022-50332 |
中危 |
6.8.0-79.79 |
|
kernel: video/aperture: Call sysfb_disable() before removing PCI devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50332
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-15 15:15 修改: 2025-12-04 13:46
|
| linux-libc-dev |
CVE-2022-50380 |
中危 |
6.8.0-79.79 |
|
kernel: mm: /proc/pid/smaps_rollup: fix no vma's null-deref
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50380
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-18 14:15 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2022-50551 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-50551
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 16:15 修改: 2025-10-08 19:38
|
| linux-libc-dev |
CVE-2023-0030 |
中危 |
6.8.0-79.79 |
|
kernel: Use after Free in nvkm_vmm_pfn_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0030
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-03-08 23:15 修改: 2025-03-05 21:15
|
| linux-libc-dev |
CVE-2023-0160 |
中危 |
6.8.0-79.79 |
|
kernel: possibility of deadlock in libbpf function sock_hash_delete_elem
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-0160
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-07-18 17:15 修改: 2024-11-21 07:36
|
| linux-libc-dev |
CVE-2023-1193 |
中危 |
6.8.0-79.79 |
|
kernel: use-after-free in setup_async_work()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-1193
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-11-01 20:15 修改: 2024-11-21 07:38
|
| linux-libc-dev |
CVE-2023-26242 |
中危 |
6.8.0-79.79 |
|
afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-26242
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-02-21 01:15 修改: 2025-05-05 16:15
|
| linux-libc-dev |
CVE-2023-31082 |
中危 |
6.8.0-79.79 |
|
kernel: sleeping function called from an invalid context in gsmld_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-31082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-04-24 06:15 修改: 2024-11-21 08:01
|
| linux-libc-dev |
CVE-2023-52879 |
中危 |
6.8.0-79.79 |
|
kernel: tracing: Have trace_event_file have ref counters
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-52879
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-05-21 16:15 修改: 2025-02-03 15:46
|
| linux-libc-dev |
CVE-2023-53034 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53034
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:16
|
| linux-libc-dev |
CVE-2023-53642 |
中危 |
6.8.0-79.79 |
|
kernel: x86: fix clear_user_rep_good() exception handling annotation
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-53642
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-07 16:15 修改: 2025-12-29 15:15
|
| linux-libc-dev |
CVE-2023-54105 |
中危 |
6.8.0-79.79 |
|
kernel: can: isotp: check CAN address family in isotp_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54105
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2023-54187 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix potential corruption when moving a directory
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54187
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| linux-libc-dev |
CVE-2023-54190 |
中危 |
6.8.0-79.79 |
|
kernel: leds: led-core: Fix refcount leak in of_led_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-54190
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-30 13:16 修改: 2025-12-31 20:43
|
| linux-libc-dev |
CVE-2024-27022 |
中危 |
6.8.0-79.79 |
|
kernel: fork: defer linking file vma until vma is fully initialized
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27022
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-05-01 06:15 修改: 2025-11-04 18:16
|
| linux-libc-dev |
CVE-2024-27025 |
中危 |
6.8.0-79.79 |
|
kernel: nbd: null check for nla_nest_start
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-27025
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-05-01 13:15 修改: 2024-12-23 19:24
|
| linux-libc-dev |
CVE-2024-35895 |
中危 |
6.8.0-79.79 |
|
kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35895
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-05-19 09:15 修改: 2024-12-30 17:12
|
| linux-libc-dev |
CVE-2024-35948 |
中危 |
6.8.0-79.79 |
|
kernel: bcachefs: Check for journal entries overruning end of sb clean section
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35948
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-05-20 10:15 修改: 2025-11-18 15:46
|
| linux-libc-dev |
CVE-2024-35995 |
中危 |
6.8.0-79.79 |
|
kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35995
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-05-20 10:15 修改: 2025-09-24 18:21
|
| linux-libc-dev |
CVE-2024-36347 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: hw:amd: Improper signature verification in AMD CPU ROM microcode patch loader
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-36347
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-27 23:15 修改: 2025-06-30 18:38
|
| linux-libc-dev |
CVE-2024-38581 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu/mes: fix use-after-free issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-38581
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-06-19 14:15 修改: 2025-05-27 18:31
|
| linux-libc-dev |
CVE-2024-39293 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "xsk: Support redirect to any socket bound to the same umem"
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-39293
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-06-25 15:15 修改: 2025-09-17 16:05
|
| linux-libc-dev |
CVE-2024-40954 |
中危 |
6.8.0-79.79 |
|
kernel: net: do not leave a dangling sk pointer, when socket creation fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-40954
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-07-12 13:15 修改: 2025-11-03 22:17
|
| linux-libc-dev |
CVE-2024-41008 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: change vm->task_info handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-41008
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-07-16 08:15 修改: 2025-10-07 19:44
|
| linux-libc-dev |
CVE-2024-42107 |
中危 |
6.8.0-79.79 |
|
kernel: ice: Don't process extts if PTP is disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42107
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-07-30 08:15 修改: 2025-01-08 21:32
|
| linux-libc-dev |
CVE-2024-42125 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42125
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-07-30 08:15 修改: 2025-10-06 17:16
|
| linux-libc-dev |
CVE-2024-42139 |
中危 |
6.8.0-79.79 |
|
kernel: ice: Fix improper extts handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-42139
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-07-30 08:15 修改: 2024-12-11 15:13
|
| linux-libc-dev |
CVE-2024-43844 |
中危 |
6.8.0-79.79 |
|
kernel: wifi rtw89 wow: fix GTK offload H2C skbuff issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43844
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-08-17 10:15 修改: 2024-10-25 19:49
|
| linux-libc-dev |
CVE-2024-43872 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/hns: Fix soft lockup under heavy CEQE load
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-43872
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-08-21 01:15 修改: 2024-09-03 13:38
|
| linux-libc-dev |
CVE-2024-44932 |
中危 |
6.8.0-79.79 |
|
kernel: idpf: fix UAFs when destroying the queues
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44932
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-08-26 11:15 修改: 2024-08-27 16:08
|
| linux-libc-dev |
CVE-2024-44951 |
中危 |
6.8.0-79.79 |
|
kernel: serial: sc16is7xx: fix TX fifo corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44951
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-09-04 19:15 修改: 2024-10-09 14:27
|
| linux-libc-dev |
CVE-2024-44964 |
中危 |
6.8.0-79.79 |
|
kernel: idpf: fix memory leaks and crashes while performing a soft reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-44964
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-09-04 19:15 修改: 2024-09-06 16:36
|
| linux-libc-dev |
CVE-2024-46742 |
中危 |
6.8.0-79.79 |
|
kernel: smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46742
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-09-18 08:15 修改: 2025-11-03 20:16
|
| linux-libc-dev |
CVE-2024-46748 |
中危 |
6.8.0-79.79 |
|
kernel: cachefiles: Set the max subreq size for cache writes to MAX_RW_COUNT
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46748
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-09-18 08:15 修改: 2025-10-08 17:08
|
| linux-libc-dev |
CVE-2024-46820 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46820
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-09-27 13:15 修改: 2024-11-20 17:34
|
| linux-libc-dev |
CVE-2024-46833 |
中危 |
6.8.0-79.79 |
|
kernel: net: hns3: void array out of bound when loop tnl_num
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-46833
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-09-27 13:15 修改: 2024-10-09 15:54
|
| linux-libc-dev |
CVE-2024-47729 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe: Use reserved copy engine for user binds on faulting devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-47729
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 13:15 修改: 2024-10-23 20:40
|
| linux-libc-dev |
CVE-2024-49904 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: add list empty check to avoid null pointer issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49904
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-10-25 15:54
|
| linux-libc-dev |
CVE-2024-49908 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2)
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49908
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-10-24 03:42
|
| linux-libc-dev |
CVE-2024-49910 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49910
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-10-24 02:58
|
| linux-libc-dev |
CVE-2024-49916 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn401_init_hw
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49916
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-10-24 17:03
|
| linux-libc-dev |
CVE-2024-49932 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: don't readahead the relocation inode on RST
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49932
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-11-13 15:01
|
| linux-libc-dev |
CVE-2024-49940 |
中危 |
6.8.0-79.79 |
|
kernel: l2tp: prevent possible tunnel refcount underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49940
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-11-13 13:26
|
| linux-libc-dev |
CVE-2024-49970 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN401
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49970
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-10-29 15:57
|
| linux-libc-dev |
CVE-2024-49990 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe/hdcp: Check GSC structure validity
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-49990
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 18:15 修改: 2024-10-28 16:42
|
| linux-libc-dev |
CVE-2024-50003 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Fix system hang while resume with TBT monitor
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50003
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 19:15 修改: 2025-11-03 23:16
|
| linux-libc-dev |
CVE-2024-50004 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50004
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 19:15 修改: 2024-11-07 19:27
|
| linux-libc-dev |
CVE-2024-50034 |
中危 |
6.8.0-79.79 |
|
kernel: net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50034
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-10-21 20:15 修改: 2024-10-24 19:56
|
| linux-libc-dev |
CVE-2024-50102 |
中危 |
6.8.0-79.79 |
|
kernel: x86: fix user address masking non-canonical speculation issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50102
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-11-05 18:15 修改: 2025-10-01 21:15
|
| linux-libc-dev |
CVE-2024-50106 |
中危 |
6.8.0-79.79 |
|
kernel: nfsd: fix race between laundromat and free_stateid
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50106
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-11-05 18:15 修改: 2024-12-11 15:15
|
| linux-libc-dev |
CVE-2024-52560 |
中危 |
6.8.0-79.79 |
|
kernel: fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-52560
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 03:15 修改: 2025-10-23 13:05
|
| linux-libc-dev |
CVE-2024-53056 |
中危 |
6.8.0-79.79 |
|
kernel: drm/mediatek: Fix potential NULL dereference in mtk_crtc_destroy()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53056
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| linux-libc-dev |
CVE-2024-53064 |
中危 |
6.8.0-79.79 |
|
kernel: idpf: fix idpf_vc_core_init error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53064
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-11-19 18:15 修改: 2025-10-01 21:16
|
| linux-libc-dev |
CVE-2024-53098 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe/ufence: Prefetch ufence addr to catch bogus address
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53098
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-11-25 22:15 修改: 2025-10-01 21:16
|
| linux-libc-dev |
CVE-2024-53207 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: MGMT: Fix possible deadlocks
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53207
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 14:15 修改: 2025-11-03 21:17
|
| linux-libc-dev |
CVE-2024-53216 |
中危 |
6.8.0-79.79 |
|
kernel: nfsd: release svc_expkey/svc_export with rcu_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-53216
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 14:15 修改: 2025-03-24 17:33
|
| linux-libc-dev |
CVE-2024-56368 |
中危 |
6.8.0-79.79 |
|
kernel: ring-buffer: Fix overflow in __rb_map_vma
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56368
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-11 13:15 修改: 2025-09-23 14:46
|
| linux-libc-dev |
CVE-2024-56544 |
中危 |
6.8.0-79.79 |
|
kernel: udmabuf: change folios array from kmalloc to kvmalloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56544
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 14:15 修改: 2025-10-01 20:17
|
| linux-libc-dev |
CVE-2024-56552 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe/guc_submit: fix race around suspend_pending
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56552
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 15:15 修改: 2025-09-23 20:43
|
| linux-libc-dev |
CVE-2024-56591 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: hci_conn: Use disable_delayed_work_sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56591
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 15:15 修改: 2025-10-07 17:45
|
| linux-libc-dev |
CVE-2024-56617 |
中危 |
6.8.0-79.79 |
|
kernel: cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56617
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| linux-libc-dev |
CVE-2024-56639 |
中危 |
6.8.0-79.79 |
|
kernel: net: hsr: must allocate more bytes for RedBox support
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56639
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 15:15 修改: 2025-10-07 20:13
|
| linux-libc-dev |
CVE-2024-56671 |
中危 |
6.8.0-79.79 |
|
kernel: gpio: graniterapids: Fix vGPIO driver crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56671
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| linux-libc-dev |
CVE-2024-56674 |
中危 |
6.8.0-79.79 |
|
kernel: virtio_net: correct netdev_tx_reset_queue() invocation point
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56674
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-27 15:15 修改: 2025-10-01 20:17
|
| linux-libc-dev |
CVE-2024-56702 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Mark raw_tp arguments with PTR_MAYBE_NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56702
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-28 10:15 修改: 2025-10-01 20:17
|
| linux-libc-dev |
CVE-2024-56712 |
中危 |
6.8.0-79.79 |
|
kernel: udmabuf: fix memory leak on last export_udmabuf() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56712
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-12-29 09:15 修改: 2025-04-17 21:15
|
| linux-libc-dev |
CVE-2024-56757 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: btusb: mediatek: add intf release flow when usb disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56757
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-06 17:15 修改: 2025-10-01 20:17
|
| linux-libc-dev |
CVE-2024-56788 |
中危 |
6.8.0-79.79 |
|
kernel: net: ethernet: oa_tc6: fix tx skb race condition between reference pointers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56788
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-11 13:15 修改: 2025-09-24 18:58
|
| linux-libc-dev |
CVE-2024-57795 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/rxe: Remove the direct link to net_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57795
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-15 13:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2024-57809 |
中危 |
6.8.0-79.79 |
|
kernel: PCI: imx6: Fix suspend/resume support on i.MX6QDL
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57809
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-11 14:15 修改: 2025-10-17 15:24
|
| linux-libc-dev |
CVE-2024-57852 |
中危 |
6.8.0-79.79 |
|
kernel: firmware: qcom: scm: smc: Handle missing SCM device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57852
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 03:15 修改: 2025-10-23 13:04
|
| linux-libc-dev |
CVE-2024-57857 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/siw: Remove direct link to net_device
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57857
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-15 13:15 修改: 2025-03-24 17:30
|
| linux-libc-dev |
CVE-2024-57875 |
中危 |
6.8.0-79.79 |
|
kernel: block: RCU protect disk->conv_zones_bitmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57875
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-11 15:15 修改: 2025-10-17 15:27
|
| linux-libc-dev |
CVE-2024-57922 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Add check for granularity in dml ceil/floor helpers
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57922
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-01-19 12:15 修改: 2025-11-03 21:18
|
| linux-libc-dev |
CVE-2024-57950 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Initialize denominator defaults to 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57950
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 16:15 修改: 2025-10-01 20:18
|
| linux-libc-dev |
CVE-2024-57976 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: do proper folio cleanup when cow_file_range() failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-57976
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 02:15 修改: 2025-10-23 17:58
|
| linux-libc-dev |
CVE-2024-58012 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58012
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 03:15 修改: 2025-10-01 21:16
|
| linux-libc-dev |
CVE-2024-58015 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath12k: Fix for out-of bound access error
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58015
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 03:15 修改: 2025-10-22 19:37
|
| linux-libc-dev |
CVE-2024-58089 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: fix double accounting race when btrfs_run_delalloc_range() failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58089
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-12 10:15 修改: 2025-10-01 20:18
|
| linux-libc-dev |
CVE-2024-58090 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: sched/core: Prevent rescheduling when interrupts are disabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58090
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2024-58092 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: nfsd: fix legacy client tracking initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58092
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 11:15 修改: 2025-10-28 19:11
|
| linux-libc-dev |
CVE-2024-58094 |
中危 |
6.8.0-79.79 |
|
kernel: jfs: add check read-only before truncation in jfs_truncate_nolock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58094
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-28 18:54
|
| linux-libc-dev |
CVE-2024-58095 |
中危 |
6.8.0-79.79 |
|
kernel: jfs: add check read-only before txBeginAnon() call
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58095
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-28 18:55
|
| linux-libc-dev |
CVE-2024-58096 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58096
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-28 18:55
|
| linux-libc-dev |
CVE-2024-58097 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath11k: fix RCU stall while reaping monitor destination ring
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58097
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2024-58098 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: track changes_pkt_data property for global functions
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58098
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-05 15:15 修改: 2025-11-10 17:35
|
| linux-libc-dev |
CVE-2024-58100 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: check changes_pkt_data property for extension programs
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58100
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-05 15:15 修改: 2025-11-10 17:35
|
| linux-libc-dev |
CVE-2024-58241 |
中危 |
6.8.0-79.79 |
|
kernel: Kernel: Bluetooth HCI local DoS
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-58241
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-24 11:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-21687 |
中危 |
6.8.0-79.79 |
|
kernel: vfio/platform: check the bounds of read/write syscalls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21687
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 16:15 修改: 2025-11-03 21:19
|
| linux-libc-dev |
CVE-2025-21693 |
中危 |
6.8.0-79.79 |
|
kernel: mm: zswap: properly synchronize freeing resources during CPU hotunplug
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21693
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 16:15 修改: 2025-04-16 19:15
|
| linux-libc-dev |
CVE-2025-21696 |
中危 |
6.8.0-79.79 |
|
kernel: mm: clear uffd-wp PTE/PMD state on mremap()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21696
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-12 14:15 修改: 2025-10-01 20:18
|
| linux-libc-dev |
CVE-2025-21709 |
中危 |
6.8.0-79.79 |
|
kernel: kernel: be more careful about dup_mmap() failures and uprobe registering
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21709
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 02:15 修改: 2025-10-23 17:45
|
| linux-libc-dev |
CVE-2025-21729 |
中危 |
6.8.0-79.79 |
6.8.0-88.89 |
kernel: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21729
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 02:15 修改: 2025-03-24 18:57
|
| linux-libc-dev |
CVE-2025-21730 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21730
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 02:15 修改: 2025-10-23 13:05
|
| linux-libc-dev |
CVE-2025-21751 |
中危 |
6.8.0-79.79 |
|
kernel: net/mlx5: HWS, change error flow on matcher disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21751
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 03:15 修改: 2025-09-19 15:15
|
| linux-libc-dev |
CVE-2025-21752 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: don't use btrfs_set_item_key_safe on RAID stripe-extents
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21752
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 03:15 修改: 2025-10-28 21:03
|
| linux-libc-dev |
CVE-2025-21817 |
中危 |
6.8.0-79.79 |
|
kernel: block: mark GFP_NOIO around sysfs ->store()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21817
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 20:16 修改: 2025-10-28 02:53
|
| linux-libc-dev |
CVE-2025-21819 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "drm/amd/display: Use HW lock mgr for PSR1"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21819
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-27 20:16 修改: 2025-11-03 21:19
|
| linux-libc-dev |
CVE-2025-21833 |
中危 |
6.8.0-79.79 |
|
kernel: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21833
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-06 17:15 修改: 2025-11-02 14:15
|
| linux-libc-dev |
CVE-2025-21872 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: efi: Don't map the entire mokvar table to determine its size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21872
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21873 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: scsi: ufs: core: bsg: Fix crash when arpmb command fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21873
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-30 16:19
|
| linux-libc-dev |
CVE-2025-21875 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: mptcp: always handle address removal under msk socket lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21875
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21877 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: usbnet: gl620a: fix endpoint checking in genelink_bind()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21877
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21878 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: i2c: npcm: disable interrupt enable bit before devm_request_irq
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21878
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21880 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/xe/userptr: fix EFAULT handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21880
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-30 15:44
|
| linux-libc-dev |
CVE-2025-21881 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: uprobes: Reject the shared zeropage in uprobe_write_opcode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21881
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21883 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ice: Fix deinitializing VF in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21883
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:50
|
| linux-libc-dev |
CVE-2025-21885 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21885
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:52
|
| linux-libc-dev |
CVE-2025-21888 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: RDMA/mlx5: Fix a WARN during dereg_mr for DM type
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21888
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:54
|
| linux-libc-dev |
CVE-2025-21889 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: perf/core: Add RCU read lock protection to perf_iterate_ctx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21889
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:55
|
| linux-libc-dev |
CVE-2025-21890 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: idpf: fix checksums set in idpf_rx_rsc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21890
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-29 16:51
|
| linux-libc-dev |
CVE-2025-21891 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ipvlan: ensure network headers are in skb linear part
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21891
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21892 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: RDMA/mlx5: Fix the recovery flow of the UMR QP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21892
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-03-27 15:15 修改: 2025-10-29 17:18
|
| linux-libc-dev |
CVE-2025-21894 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21894
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-31 18:50
|
| linux-libc-dev |
CVE-2025-21895 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21895
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-31 18:50
|
| linux-libc-dev |
CVE-2025-21898 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ftrace: Avoid potential division by zero in function_stat_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21898
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21899 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: tracing: Fix bad hist from corrupting named_triggers list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21899
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21903 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: mctp i3c: handle NULL header address
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21903
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-31 18:51
|
| linux-libc-dev |
CVE-2025-21904 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: caif_virtio: fix wrong pointer check in cfv_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21904
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21905 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: wifi: iwlwifi: limit printed string from FW file
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21905
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21907 |
中危 |
6.8.0-79.79 |
|
kernel: mm: memory-failure: update ttu flag inside unmap_poisoned_folio
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21907
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-31 17:59
|
| linux-libc-dev |
CVE-2025-21908 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21908
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 20:18
|
| linux-libc-dev |
CVE-2025-21909 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: wifi: nl80211: reject cooked mode if it is set along with other flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21909
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21910 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: wifi: cfg80211: regulatory: improve invalid hints checking
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21910
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21911 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/imagination: avoid deadlock on fence release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21911
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 20:18
|
| linux-libc-dev |
CVE-2025-21912 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: gpio: rcar: Use raw_spinlock to protect register access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21912
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21913 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21913
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21914 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: slimbus: messaging: Free transaction ID in delayed interrupt scenario
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21914
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21915 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: cdx: Fix possible UAF error in driver_override_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21915
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-08-19 14:40
|
| linux-libc-dev |
CVE-2025-21916 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: usb: atm: cxacru: fix a flaw in existing endpoint checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21916
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21917 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: usb: renesas_usbhs: Flush the notify_hotplug_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21917
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21918 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: usb: typec: ucsi: Fix NULL pointer access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21918
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21919 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21919
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21920 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: vlan: enforce underlying device type
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21920
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21922 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ppp: Fix KMSAN uninit-value warning with bpf
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21922
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21924 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21924
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21925 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: llc: do not use skb_get() before dev_queue_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21925
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21926 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net: gso: fix ownership in __udp_gso_segment
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21926
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21927 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21927
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 20:18
|
| linux-libc-dev |
CVE-2025-21928 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21928
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21929 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21929
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-04-16 14:15
|
| linux-libc-dev |
CVE-2025-21930 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: wifi: iwlwifi: mvm: don't try to talk to a dead firmware
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21930
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 20:18
|
| linux-libc-dev |
CVE-2025-21934 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: rapidio: fix an API misues when rio_add_net() fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21934
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21935 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: rapidio: add check for rio_add_net() in rio_scan_alloc_net()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21935
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21936 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21936
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21937 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21937
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21941 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21941
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21944 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ksmbd: fix bug on trap in smb2_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21944
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21945 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ksmbd: fix use-after-free in smb2_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21945
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21946 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ksmbd: fix out-of-bounds in parse_sec_desc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21946
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-21947 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ksmbd: fix type confusion via race condition when using ipc_msg_send_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21947
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21948 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: HID: appleir: Fix potential NULL dereference at raw event handle
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21948
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21950 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21950
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21951 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21951
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21955 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ksmbd: prevent connection release during oplock break notification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21955
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-31 18:20
|
| linux-libc-dev |
CVE-2025-21956 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/amd/display: Assign normalized_pix_clk when color depth = 14
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21956
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21957 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: scsi: qla1280: Fix kernel oops when debug level > 2
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21957
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21959 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21959
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21960 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: eth: bnxt: do not update checksum in bnxt_xdp_build_skb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21960
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21961 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: eth: bnxt: fix truesize for mb-xdp-pass case
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21961
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 18:15
|
| linux-libc-dev |
CVE-2025-21962 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: cifs: Fix integer overflow while processing closetimeo mount option
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21962
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21963 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: cifs: Fix integer overflow while processing acdirmax mount option
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21963
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21964 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: cifs: Fix integer overflow while processing acregmax mount option
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21964
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21966 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21966
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 19:15
|
| linux-libc-dev |
CVE-2025-21967 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ksmbd: fix use-after-free in ksmbd_free_work_struct
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21967
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-04-16 14:15
|
| linux-libc-dev |
CVE-2025-21968 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/amd/display: Fix slab-use-after-free on hdcp_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21968
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21969 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21969
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 18:15
|
| linux-libc-dev |
CVE-2025-21970 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net/mlx5: Bridge, fix the crash caused by LAG state check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21970
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21972 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net: mctp: unshare packets when reassembling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21972
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-31 19:16
|
| linux-libc-dev |
CVE-2025-21975 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net/mlx5: handle errors in mlx5_chains_create_table()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21975
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21976 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: fbdev: hyperv_fb: Allow graceful removal of framebuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21976
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-30 21:00
|
| linux-libc-dev |
CVE-2025-21977 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: fbdev: hyperv_fb: Fix hang in kdump kernel when on Hyper-V Gen 2 VMs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21977
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-30 21:03
|
| linux-libc-dev |
CVE-2025-21978 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21978
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21979 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21979
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21980 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: sched: address a potential NULL pointer dereference in the GRED scheduler.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21980
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21981 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ice: fix memory leak in aRFS after reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21981
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21982 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: pinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21982
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 18:15
|
| linux-libc-dev |
CVE-2025-21984 |
中危 |
6.8.0-79.79 |
|
kernel: mm: fix kernel BUG when userfaultfd_move encounters swapcache
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21984
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-01 18:15
|
| linux-libc-dev |
CVE-2025-21985 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Fix out-of-bound accesses
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21985
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-10-30 19:17
|
| linux-libc-dev |
CVE-2025-21986 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net: switchdev: Convert blocking notification chain to a raw one
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21986
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-01 16:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21991 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21991
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-02 13:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21992 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: HID: ignore non-functional sensor in HP 5MP Camera
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21992
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-02 13:15 修改: 2026-01-02 16:15
|
| linux-libc-dev |
CVE-2025-21994 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ksmbd: fix incorrect validation for num_aces field of smb_acl
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21994
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-02 14:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21995 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/sched: Fix fence reference count leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21995
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-10-01 19:15
|
| linux-libc-dev |
CVE-2025-21996 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21996
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21997 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: xsk: fix an integer overflow in xp_create_and_assign_umem()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21997
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-21999 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: proc: fix UAF in proc_get_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-21999
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22001 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: accel/qaic: Fix integer overflow in qaic_validate_req()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22001
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-22002 |
中危 |
6.8.0-79.79 |
|
kernel: netfs: Call `invalidate_cache` only if implemented
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22002
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-22003 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: can: ucan: fix out of bound read in strscpy() source
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22003
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-22004 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: net: atm: fix use after free in lec_send()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22004
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22005 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22005
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22007 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: Bluetooth: Fix error code in chan_alloc_skb_cb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22007
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-03 08:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22008 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: regulator: check that dummy regulator has been probed before using it
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22008
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2026-01-02 16:15
|
| linux-libc-dev |
CVE-2025-22009 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: regulator: dummy: force synchronous probing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22009
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-22010 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: RDMA/hns: Fix soft lockup during bt pages loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22010
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22011 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ARM: dts: bcm2711: Fix xHCI power-domain
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22011
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-10-01 19:15
|
| linux-libc-dev |
CVE-2025-22013 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: KVM: arm64: Unconditionally save+flush host FPSIMD/SVE/SME state
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22013
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-10-28 17:16
|
| linux-libc-dev |
CVE-2025-22014 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: soc: qcom: pdr: Fix the potential deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22014
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22015 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: mm/migrate: fix shmem xarray update during migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22015
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22016 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: dpll: fix xa_alloc_cyclic() error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22016
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-10-28 17:09
|
| linux-libc-dev |
CVE-2025-22017 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: devlink: fix xa_alloc_cyclic() error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22017
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-08 09:15 修改: 2025-10-28 17:08
|
| linux-libc-dev |
CVE-2025-22018 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: atm: Fix NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22018
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 05:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22019 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: bcachefs: bch2_ioctl_subvolume_destroy() fixes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22019
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 11:15 修改: 2025-10-28 19:12
|
| linux-libc-dev |
CVE-2025-22020 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22020
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 11:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22021 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: netfilter: socket: Lookup orig tuple for IPv6 SNAT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22021
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 11:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22022 |
中危 |
6.8.0-79.79 |
|
kernel: usb: xhci: Apply the link chain quirk on NEC isoc endpoints
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22022
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 11:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-22025 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: nfsd: put dl_stid if fail to queue dl_recall
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22025
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22027 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: media: streamzap: fix race between device disconnection and urb callback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22027
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22028 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: media: vimc: skip .s_stream() for stopped entities
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22028
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-28 19:05
|
| linux-libc-dev |
CVE-2025-22033 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: arm64: Don't call NULL in do_compat_alignment_fixup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22033
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22035 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: tracing: Fix use-after-free in print_graph_function_flags during tracer switching
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22035
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22037 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: fix null pointer dereference in alloc_preauth_hash()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22037
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-09-19 15:15
|
| linux-libc-dev |
CVE-2025-22038 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ksmbd: validate zero num_subauth before sub_auth is accessed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22038
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22039 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ksmbd: fix overflow in dacloffset bounds check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22039
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-14 16:51
|
| linux-libc-dev |
CVE-2025-22040 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ksmbd: fix session use-after-free in multichannel connection
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22040
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22041 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ksmbd: fix use-after-free in ksmbd_sessions_deregister()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22041
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22042 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ksmbd: add bounds check for create lease context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22042
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22043 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: add bounds check for durable handle context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22043
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-14 16:50
|
| linux-libc-dev |
CVE-2025-22044 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: acpi: nfit: fix narrowing conversion in acpi_nfit_ctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22044
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22045 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22045
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22047 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: x86/microcode/AMD: Fix __apply_microcode_amd()'s return value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22047
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-31 20:20
|
| linux-libc-dev |
CVE-2025-22050 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: usbnet:fix NPE during rx_complete
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22050
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22053 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: net: ibmveth: make veth_pool_store stop hanging
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22053
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-31 20:18
|
| linux-libc-dev |
CVE-2025-22054 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: arcnet: Add NULL check in com20020pci_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22054
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22055 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: net: fix geneve_opt length integer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22055
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22056 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: netfilter: nft_tunnel: fix geneve_opt type confusion addition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22056
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22057 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: net: decrease cached dst counters in dst_release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22057
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-10-31 20:17
|
| linux-libc-dev |
CVE-2025-22058 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: udp: Fix memory accounting leak.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22058
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22060 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: net: mvpp2: Prevent parser TCAM memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22060
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22062 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: sctp: add mutual exclusion in proc_sctp_do_udp_port()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22062
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22063 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: netlabel: Fix NULL pointer exception caused by CALIPSO on IPv4 sockets
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22063
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:15 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22064 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: netfilter: nf_tables: don't unregister hook when table is dormant
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22064
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-10-31 20:43
|
| linux-libc-dev |
CVE-2025-22065 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: idpf: fix adapter NULL pointer dereference on reboot
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22065
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-10-01 18:15
|
| linux-libc-dev |
CVE-2025-22066 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ASoC: imx-card: Add NULL check in imx_card_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22066
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22068 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ublk: make sure ubq->canceling is set when queue is frozen
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22068
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-22070 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: fs/9p: fix NULL pointer dereference on mkdir
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22070
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-22071 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: spufs: fix a leak in spufs_create_context()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22071
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22072 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: spufs: fix gang directory lifetimes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22072
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22073 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: spufs: fix a leak on spufs_new_file() failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22073
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22075 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: rtnetlink: Allocate vfinfo size for VF GUIDs when supported
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22075
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22077 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: Fix netns refcount imbalance causing leaks and use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22077
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-10-31 20:46
|
| linux-libc-dev |
CVE-2025-22079 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ocfs2: validate l_tree_depth to avoid out-of-bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22079
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22080 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: fs/ntfs3: Prevent integer overflow in hdr_first_de()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22080
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-10-01 17:15
|
| linux-libc-dev |
CVE-2025-22081 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: fs/ntfs3: Fix a couple integer overflows on 32bit systems
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22081
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22083 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-10-31 20:58
|
| linux-libc-dev |
CVE-2025-22086 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22086
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22089 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: RDMA/core: Don't expose hw_counters outside of init net namespace
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22089
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22090 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: x86/mm/pat: Fix VM_PAT handling when fork() fails in copy_page_range()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22090
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-22095 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: PCI: brcmstb: Fix error path after a call to regulator_bulk_get()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22095
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22097 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: drm/vkms: Fix use after free and double free on init error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22097
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-22103 |
中危 |
6.8.0-79.79 |
|
kernel: net: fix NULL pointer dereference in l3mdev_l3_rcv
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22103
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-24 10:15
|
| linux-libc-dev |
CVE-2025-22104 |
中危 |
6.8.0-79.79 |
|
kernel: ibmvnic: Use kernel helpers for hex dumps
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22104
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:44
|
| linux-libc-dev |
CVE-2025-22105 |
中危 |
6.8.0-79.79 |
|
kernel: bonding: check xdp prog when set bond mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22105
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-22106 |
中危 |
6.8.0-79.79 |
|
kernel: vmxnet3: unregister xdp rxq info in the reset path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22106
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:42
|
| linux-libc-dev |
CVE-2025-22107 |
中危 |
6.8.0-79.79 |
|
kernel: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22107
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-22108 |
中危 |
6.8.0-79.79 |
|
kernel: bnxt_en: Mask the bd_cnt field in the TX BD properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22108
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:42
|
| linux-libc-dev |
CVE-2025-22109 |
中危 |
6.8.0-79.79 |
|
kernel: ax25: Remove broken autobind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22109
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:42
|
| linux-libc-dev |
CVE-2025-22111 |
中危 |
6.8.0-79.79 |
|
kernel: net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22111
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-22113 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: avoid journaling sb update on error if journal is destroying
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22113
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:38
|
| linux-libc-dev |
CVE-2025-22116 |
中危 |
6.8.0-79.79 |
|
kernel: idpf: check error for register_netdev() on init
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22116
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:35
|
| linux-libc-dev |
CVE-2025-22121 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22121
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-22124 |
中危 |
6.8.0-79.79 |
|
kernel: md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22124
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:27
|
| linux-libc-dev |
CVE-2025-22125 |
中危 |
6.8.0-79.79 |
|
kernel: md/raid1,raid10: don't ignore IO flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22125
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:27
|
| linux-libc-dev |
CVE-2025-22127 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix potential deadloop in prepare_compress_overwrite()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-22127
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 18:25
|
| linux-libc-dev |
CVE-2025-23129 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23129
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-24 10:16
|
| linux-libc-dev |
CVE-2025-23130 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to avoid panic once fallocation fails for pinfile
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23130
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:04
|
| linux-libc-dev |
CVE-2025-23131 |
中危 |
6.8.0-79.79 |
|
kernel: dlm: prevent NPD when writing a positive value to event_done
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23131
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:01
|
| linux-libc-dev |
CVE-2025-23132 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: quota: fix to avoid warning in dquot_writeback_dquots()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23132
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:01
|
| linux-libc-dev |
CVE-2025-23133 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath11k: update channel list in reg notifier instead reg worker
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23133
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:01
|
| linux-libc-dev |
CVE-2025-23135 |
中危 |
6.8.0-79.79 |
|
kernel: RISC-V: KVM: Teardown riscv specific bits after kvm_exit
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23135
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:00
|
| linux-libc-dev |
CVE-2025-23136 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: thermal: int340x: Add NULL check for adev
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23136
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-03 20:17
|
| linux-libc-dev |
CVE-2025-23138 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: watch_queue: fix pipe accounting mismatch
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23138
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-16 15:16 修改: 2025-11-04 17:00
|
| linux-libc-dev |
CVE-2025-23143 |
中危 |
6.8.0-79.79 |
|
kernel: net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23143
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-01 13:15 修改: 2025-11-05 22:05
|
| linux-libc-dev |
CVE-2025-23162 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe/vf: Don't try to trigger a full GT reset if VF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-23162
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-01 13:15 修改: 2025-11-05 15:32
|
| linux-libc-dev |
CVE-2025-37743 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath12k: Avoid memory leak while enabling statistics
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37743
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-01 13:15 修改: 2025-11-05 16:05
|
| linux-libc-dev |
CVE-2025-37746 |
中危 |
6.8.0-79.79 |
|
kernel: perf/dwc_pcie: fix duplicate pci_dev devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37746
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-01 13:15 修改: 2025-11-05 16:07
|
| linux-libc-dev |
CVE-2025-37747 |
中危 |
6.8.0-79.79 |
|
kernel: perf: Fix hang while freeing sigtrap event
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37747
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-01 13:15 修改: 2025-11-05 16:16
|
| linux-libc-dev |
CVE-2025-37756 |
中危 |
6.8.0-79.79 |
6.8.0-85.85 |
kernel: net: tls: explicitly disallow disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37756
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-01 13:15 修改: 2025-11-04 18:01
|
| linux-libc-dev |
CVE-2025-37776 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: fix use-after-free in smb_break_all_levII_oplock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37776
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-01 14:15 修改: 2025-11-14 16:45
|
| linux-libc-dev |
CVE-2025-37785 |
中危 |
6.8.0-79.79 |
6.8.0-85.85 |
kernel: ext4: fix OOB read when checking dotdot dir
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37785
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-03 20:18
|
| linux-libc-dev |
CVE-2025-37806 |
中危 |
6.8.0-79.79 |
|
kernel: fs/ntfs3: Keep write operations atomic
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37806
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-08 07:15 修改: 2025-11-10 17:32
|
| linux-libc-dev |
CVE-2025-37807 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Fix kmemleak warning for percpu hashmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37807
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-08 07:15 修改: 2025-11-10 17:32
|
| linux-libc-dev |
CVE-2025-37833 |
中危 |
6.8.0-79.79 |
|
kernel: net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37833
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-08 07:15 修改: 2025-11-14 19:44
|
| linux-libc-dev |
CVE-2025-37834 |
中危 |
6.8.0-79.79 |
|
kernel: mm/vmscan: don't try to reclaim hwpoison folio
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37834
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-08 07:15 修改: 2025-11-14 19:48
|
| linux-libc-dev |
CVE-2025-37838 |
中危 |
6.8.0-79.79 |
6.8.0-87.88 |
kernel: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37838
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 15:15 修改: 2025-11-03 20:18
|
| linux-libc-dev |
CVE-2025-37855 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Guard Possible Null Pointer Dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37855
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-09 07:16 修改: 2025-11-17 12:51
|
| linux-libc-dev |
CVE-2025-37860 |
中危 |
6.8.0-79.79 |
|
kernel: sfc: fix NULL dereferences in ef100_process_design_param()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37860
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-02 14:15
|
| linux-libc-dev |
CVE-2025-37870 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: prevent hang on link training fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37870
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-09 07:16 修改: 2025-11-12 20:37
|
| linux-libc-dev |
CVE-2025-37876 |
中危 |
6.8.0-79.79 |
|
kernel: netfs: Only create /proc/fs/netfs with CONFIG_PROC_FS
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37876
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:52
|
| linux-libc-dev |
CVE-2025-37877 |
中危 |
6.8.0-79.79 |
|
kernel: iommu: Clear iommu-dma ops on cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37877
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:53
|
| linux-libc-dev |
CVE-2025-37880 |
中危 |
6.8.0-79.79 |
|
kernel: um: work around sched_yield not yielding in time-travel mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37880
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:54
|
| linux-libc-dev |
CVE-2025-37882 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: xHCI driver isochronous event handling race condition leading to data loss or UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37882
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-09 07:16 修改: 2025-11-12 19:28
|
| linux-libc-dev |
CVE-2025-37889 |
中危 |
6.8.0-79.79 |
6.8.0-84.84 |
kernel: ASoC: ops: Consistently treat platform_max as control value
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37889
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-09 07:16 修改: 2025-11-17 17:13
|
| linux-libc-dev |
CVE-2025-37906 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: ublk race condition causes kernel crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37906
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-20 16:15 修改: 2025-11-17 18:10
|
| linux-libc-dev |
CVE-2025-37907 |
中危 |
6.8.0-79.79 |
|
kernel: accel/ivpu: Fix locking order in ivpu_job_submit
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37907
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-20 16:15 修改: 2025-11-17 15:02
|
| linux-libc-dev |
CVE-2025-37926 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: fix use-after-free in ksmbd_session_rpc_open
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37926
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-20 16:15 修改: 2025-11-10 20:33
|
| linux-libc-dev |
CVE-2025-37937 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_dds()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37937
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-20 16:15 修改: 2025-12-19 17:41
|
| linux-libc-dev |
CVE-2025-37958 |
中危 |
6.8.0-79.79 |
6.8.0-90.91 |
kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-37958
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-05-20 16:15 修改: 2025-12-16 20:37
|
| linux-libc-dev |
CVE-2025-38022 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38022
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-38029 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to sleepable page allocation in KASAN
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38029
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:09
|
| linux-libc-dev |
CVE-2025-38033 |
中危 |
6.8.0-79.79 |
|
kernel: x86/Kconfig: make CFI_AUTO_DEFAULT depend on !RUST or Rust >= 1.88
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38033
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:08
|
| linux-libc-dev |
CVE-2025-38036 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to null pointer dereference in GT MMIO initialization for VFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38036
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:08
|
| linux-libc-dev |
CVE-2025-38038 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in amd-pstate cpufreq driver via deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38038
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:08
|
| linux-libc-dev |
CVE-2025-38041 |
中危 |
6.8.0-79.79 |
|
kernel: clk: sunxi-ng: h616: Reparent GPU clock during frequency changes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38041
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:08
|
| linux-libc-dev |
CVE-2025-38042 |
中危 |
6.8.0-79.79 |
|
kernel: dmaengine: ti: k3-udma-glue: Drop skip_fdq argument from k3_udma_glue_reset_rx_chn
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38042
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:07
|
| linux-libc-dev |
CVE-2025-38047 |
中危 |
6.8.0-79.79 |
|
kernel: x86/fred: Fix system hang during S4 resume with FRED enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38047
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:07
|
| linux-libc-dev |
CVE-2025-38064 |
中危 |
6.8.0-79.79 |
|
kernel: virtio: break and reset virtio devices on device_shutdown()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38064
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:05
|
| linux-libc-dev |
CVE-2025-38069 |
中危 |
6.8.0-79.79 |
|
kernel: PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38069
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:05
|
| linux-libc-dev |
CVE-2025-38070 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: sma1307: Add NULL check in sma1307_setting_loaded()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38070
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 17:05
|
| linux-libc-dev |
CVE-2025-38082 |
中危 |
6.8.0-79.79 |
|
kernel: gpio: virtuser: fix potential out-of-bound write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-06-18 10:15 修改: 2025-11-14 20:24
|
| linux-libc-dev |
CVE-2025-38091 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel AMD display driver: Denial of Service via incorrect DML21 plane_id query
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38091
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-02 15:15 修改: 2025-11-20 22:07
|
| linux-libc-dev |
CVE-2025-38092 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: use list_first_entry_or_null for opinfo_get_list()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38092
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-02 15:15 修改: 2025-11-20 21:58
|
| linux-libc-dev |
CVE-2025-38096 |
中危 |
6.8.0-79.79 |
|
kernel: Linux Kernel: Denial of Service in iwlwifi due to improper firmware error handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38096
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:53
|
| linux-libc-dev |
CVE-2025-38105 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in USB-audio MIDI driver due to improper timer shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38105
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-03 09:15 修改: 2025-11-20 21:39
|
| linux-libc-dev |
CVE-2025-38132 |
中危 |
6.8.0-79.79 |
|
kernel: coresight: holding cscfg_csdev_lock while removing cscfg from csdev
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38132
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-03 09:15 修改: 2025-11-20 20:12
|
| linux-libc-dev |
CVE-2025-38140 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Local denial of service in device mapper
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38140
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-03 09:15 修改: 2025-11-20 20:11
|
| linux-libc-dev |
CVE-2025-38152 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: remoteproc: core: Clear table_sz when rproc_shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-03 20:18
|
| linux-libc-dev |
CVE-2025-38168 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Local denial of service in arm-ni due to improper PMU unregistration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38168
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-03 09:15 修改: 2025-11-20 19:29
|
| linux-libc-dev |
CVE-2025-38187 |
中危 |
6.8.0-79.79 |
|
kernel: drm/nouveau: fix a use-after-free in r535_gsp_rpc_push()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38187
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-11-19 20:50
|
| linux-libc-dev |
CVE-2025-38188 |
中危 |
6.8.0-79.79 |
|
kernel: drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38188
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-11-19 20:49
|
| linux-libc-dev |
CVE-2025-38189 |
中危 |
6.8.0-79.79 |
|
kernel: drm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38189
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-11-19 20:47
|
| linux-libc-dev |
CVE-2025-38199 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath12k: Fix memory leak due to multiple rx_stats allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38199
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-11-18 17:17
|
| linux-libc-dev |
CVE-2025-38201 |
中危 |
6.8.0-79.79 |
|
kernel: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38201
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-11-18 17:09
|
| linux-libc-dev |
CVE-2025-38203 |
中危 |
6.8.0-79.79 |
|
kernel: jfs: Fix null-ptr-deref in jfs_ioc_trim
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38203
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:20
|
| linux-libc-dev |
CVE-2025-38204 |
中危 |
6.8.0-79.79 |
|
kernel: jfs: fix array-index-out-of-bounds read in add_missing_indices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38204
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:19
|
| linux-libc-dev |
CVE-2025-38205 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38205
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-11-18 17:08
|
| linux-libc-dev |
CVE-2025-38206 |
中危 |
6.8.0-79.79 |
|
kernel: exfat: fix double free in delayed_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38206
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-12-18 21:17
|
| linux-libc-dev |
CVE-2025-38207 |
中危 |
6.8.0-79.79 |
|
kernel: mm: fix uprobe pte be overwritten when expanding vma
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38207
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-11-18 17:07
|
| linux-libc-dev |
CVE-2025-38227 |
中危 |
6.8.0-79.79 |
6.8.0-88.89 |
kernel: media: vidtv: Terminating the subsequent process of initialization failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38227
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2025-12-18 19:38
|
| linux-libc-dev |
CVE-2025-38234 |
中危 |
6.8.0-79.79 |
|
kernel: sched/rt: Fix race in push_rt_task
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38234
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-04 14:15 修改: 2026-01-08 10:15
|
| linux-libc-dev |
CVE-2025-38237 |
中危 |
6.8.0-79.79 |
|
kernel: media: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38237
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-08 08:15 修改: 2025-12-18 19:20
|
| linux-libc-dev |
CVE-2025-38240 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38240
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-06 16:22
|
| linux-libc-dev |
CVE-2025-38242 |
中危 |
6.8.0-79.79 |
|
kernel: mm: userfaultfd: fix race of userfaultfd_move and swap cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38242
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-09 11:15 修改: 2025-11-19 15:44
|
| linux-libc-dev |
CVE-2025-38261 |
中危 |
6.8.0-79.79 |
|
kernel: riscv: save the SR_SUM status over switches
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38261
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-09 11:15 修改: 2025-11-20 20:14
|
| linux-libc-dev |
CVE-2025-38272 |
中危 |
6.8.0-79.79 |
|
kernel: net: dsa: b53: do not enable EEE on bcm63xx
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38272
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-10 08:15 修改: 2025-11-20 16:56
|
| linux-libc-dev |
CVE-2025-38311 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel (iavf): Denial of Service due to a locking issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38311
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-10 08:15 修改: 2025-11-18 12:55
|
| linux-libc-dev |
CVE-2025-38329 |
中危 |
6.8.0-79.79 |
|
kernel: firmware: cs_dsp: Fix OOB memory read access in KUnit test (wmfw info)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38329
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-10 09:15 修改: 2025-11-18 12:53
|
| linux-libc-dev |
CVE-2025-38330 |
中危 |
6.8.0-79.79 |
|
kernel: firmware: cs_dsp: Fix OOB memory read access in KUnit test (ctl cache)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38330
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-10 09:15 修改: 2025-11-18 12:53
|
| linux-libc-dev |
CVE-2025-38340 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Information disclosure or Denial of Service due to out-of-bounds read in cs_dsp firmware
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38340
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-10 09:15 修改: 2025-11-18 12:52
|
| linux-libc-dev |
CVE-2025-38353 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to invalid lock on device wedge in drm/xe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38353
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 13:15 修改: 2025-11-18 12:51
|
| linux-libc-dev |
CVE-2025-38359 |
中危 |
6.8.0-79.79 |
|
kernel: s390/mm: Fix in_atomic() handling in do_secure_storage_access()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38359
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 13:15 修改: 2025-11-18 20:33
|
| linux-libc-dev |
CVE-2025-38360 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38360
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 13:15 修改: 2025-11-18 20:32
|
| linux-libc-dev |
CVE-2025-38372 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to unsafe xarray access in RDMA/mlx5
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38372
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 13:15 修改: 2025-11-18 19:26
|
| linux-libc-dev |
CVE-2025-38421 |
中危 |
6.8.0-79.79 |
|
kernel: platform/x86/amd: pmf: Use device managed allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38421
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 15:15 修改: 2025-11-19 18:59
|
| linux-libc-dev |
CVE-2025-38426 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: Add basic validation for RAS header
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38426
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 15:15 修改: 2025-11-19 18:59
|
| linux-libc-dev |
CVE-2025-38438 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38438
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 16:15 修改: 2025-11-19 18:09
|
| linux-libc-dev |
CVE-2025-38440 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to race condition in mlx5e driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38440
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-25 16:15 修改: 2025-11-19 18:09
|
| linux-libc-dev |
CVE-2025-38477 |
中危 |
6.8.0-79.79 |
6.8.0-85.85 |
kernel: net/sched: sch_qfq: Fix race condition on qfq_aggregate
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38477
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-28 12:15 修改: 2025-12-23 18:28
|
| linux-libc-dev |
CVE-2025-38486 |
中危 |
6.8.0-79.79 |
|
kernel: soundwire: Revert "soundwire: qcom: Add set_channel_map api support"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38486
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-28 12:15 修改: 2025-11-19 17:45
|
| linux-libc-dev |
CVE-2025-38498 |
中危 |
6.8.0-79.79 |
|
kernel: do_change_type(): refuse to operate on unmounted/not ours mounts
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38498
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-30 06:15 修改: 2026-01-07 16:26
|
| linux-libc-dev |
CVE-2025-38500 |
中危 |
6.8.0-79.79 |
6.8.0-85.85 |
kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38500
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-12 16:15 修改: 2026-01-07 16:26
|
| linux-libc-dev |
CVE-2025-38502 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Fix oob access in cgroup local storage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38502
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-16 10:15 修改: 2026-01-07 16:32
|
| linux-libc-dev |
CVE-2025-38556 |
中危 |
6.8.0-79.79 |
|
kernel: HID: core: Harden s32ton() against conversion to 0 bits
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38556
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-19 17:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-38563 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in perf subsystem due to VMA split
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38563
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-19 17:15 修改: 2026-01-08 21:03
|
| linux-libc-dev |
CVE-2025-38565 |
中危 |
6.8.0-79.79 |
|
kernel: perf/core: Exit early on perf_mmap() fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38565
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-19 17:15 修改: 2026-01-08 21:07
|
| linux-libc-dev |
CVE-2025-38575 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: ksmbd: use aead_request_free to match aead_request_alloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38575
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-03 20:18
|
| linux-libc-dev |
CVE-2025-38591 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in BPF due to improper context access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38591
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-19 17:15 修改: 2025-11-26 17:58
|
| linux-libc-dev |
CVE-2025-38597 |
中危 |
6.8.0-79.79 |
|
kernel: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38597
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-19 17:15 修改: 2025-11-26 18:01
|
| linux-libc-dev |
CVE-2025-38605 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38605
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-19 17:15 修改: 2025-11-26 18:02
|
| linux-libc-dev |
CVE-2025-38616 |
中危 |
6.8.0-79.79 |
6.8.0-88.89 |
kernel: Linux kernel: Denial of Service in kTLS due to race condition in receive path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38616
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 14:15 修改: 2025-11-26 17:44
|
| linux-libc-dev |
CVE-2025-38617 |
中危 |
6.8.0-79.79 |
6.8.0-85.85 |
kernel: net/packet: fix a race in packet_set_ring() and packet_notifier()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38617
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 14:15 修改: 2026-01-07 16:57
|
| linux-libc-dev |
CVE-2025-38618 |
中危 |
6.8.0-79.79 |
6.8.0-85.85 |
kernel: vsock: Do not allow binding to VMADDR_PORT_ANY
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38618
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 14:15 修改: 2026-01-07 16:56
|
| linux-libc-dev |
CVE-2025-38621 |
中危 |
6.8.0-79.79 |
|
kernel: md: make rdev_addable usable for rcu mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38621
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-11-26 17:46
|
| linux-libc-dev |
CVE-2025-38627 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38627
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-12-01 11:15
|
| linux-libc-dev |
CVE-2025-38636 |
中危 |
6.8.0-79.79 |
|
kernel: rv: Use strings in da monitors tracepoints
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38636
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-11-26 17:12
|
| linux-libc-dev |
CVE-2025-38637 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: net_sched: skbprio: Remove overly strict queue assertions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38637
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-06 21:35
|
| linux-libc-dev |
CVE-2025-38643 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38643
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-12-01 19:14
|
| linux-libc-dev |
CVE-2025-38669 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "drm/gem-shmem: Use dma_buf from GEM object instance"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38669
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:14
|
| linux-libc-dev |
CVE-2025-38672 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "drm/gem-dma: Use dma_buf from GEM object instance"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38672
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:14
|
| linux-libc-dev |
CVE-2025-38673 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "drm/gem-framebuffer: Use dma_buf from GEM object instance"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38673
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:14
|
| linux-libc-dev |
CVE-2025-38674 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "drm/prime: Use dma_buf from GEM object instance"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38674
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-08-22 16:15 修改: 2025-11-25 22:04
|
| linux-libc-dev |
CVE-2025-38678 |
中危 |
6.8.0-79.79 |
6.8.0-88.89 |
kernel: netfilter: nf_tables: reject duplicate device on updates
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38678
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-03 13:15 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-38689 |
中危 |
6.8.0-79.79 |
|
kernel: x86/fpu: Fix NULL dereference in avx512_status()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38689
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-04 16:15 修改: 2025-11-24 19:47
|
| linux-libc-dev |
CVE-2025-38709 |
中危 |
6.8.0-79.79 |
|
kernel: loop: Avoid updating block size under exclusive owner
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38709
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-04 16:15 修改: 2025-12-03 20:00
|
| linux-libc-dev |
CVE-2025-38717 |
中危 |
6.8.0-79.79 |
|
kernel: net: kcm: Fix race condition in kcm_unattach()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-38717
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-04 16:15 修改: 2025-11-25 22:07
|
| linux-libc-dev |
CVE-2025-39677 |
中危 |
6.8.0-79.79 |
|
kernel: net/sched: Fix backlog accounting in qdisc_dequeue_internal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39677
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-05 18:15 修改: 2025-11-25 21:28
|
| linux-libc-dev |
CVE-2025-39678 |
中危 |
6.8.0-79.79 |
|
kernel: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39678
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-05 18:15 修改: 2025-11-25 21:28
|
| linux-libc-dev |
CVE-2025-39682 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: tls: fix handling of zero-length records on the rx_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39682
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-05 18:15 修改: 2025-11-03 18:16
|
| linux-libc-dev |
CVE-2025-39697 |
中危 |
6.8.0-79.79 |
|
kernel: NFS: Fix a race when updating an existing write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39697
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-05 18:15 修改: 2026-01-08 16:09
|
| linux-libc-dev |
CVE-2025-39728 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: clk: samsung: Fix UBSAN panic in samsung_clk_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39728
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-11-03 20:18
|
| linux-libc-dev |
CVE-2025-39745 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in rcutorture due to incorrect preempt_count handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39745
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-11 17:15 修改: 2025-11-25 21:09
|
| linux-libc-dev |
CVE-2025-39754 |
中危 |
6.8.0-79.79 |
|
kernel: mm/smaps: fix race between smaps_hugetlb_range and migration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39754
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-11 17:15 修改: 2025-11-26 16:20
|
| linux-libc-dev |
CVE-2025-39762 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: add null check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39762
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-11 17:15 修改: 2025-11-26 16:25
|
| linux-libc-dev |
CVE-2025-39764 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via double-increment of reference count in netfilter
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39764
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-11 17:15 修改: 2025-11-25 19:58
|
| linux-libc-dev |
CVE-2025-39771 |
中危 |
6.8.0-79.79 |
|
kernel: regulator: pca9450: Use devm_register_sys_off_handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39771
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-11 17:15 修改: 2025-11-25 19:55
|
| linux-libc-dev |
CVE-2025-39789 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: x86/aegis - Add missing error checks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39789
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-11 17:15 修改: 2025-11-25 18:22
|
| linux-libc-dev |
CVE-2025-39805 |
中危 |
6.8.0-79.79 |
|
kernel: net: macb: fix unregister_netdev call order in macb_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39805
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-39806 |
中危 |
6.8.0-79.79 |
|
kernel: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39806
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:07
|
| linux-libc-dev |
CVE-2025-39808 |
中危 |
6.8.0-79.79 |
|
kernel: HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39808
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:07
|
| linux-libc-dev |
CVE-2025-39810 |
中危 |
6.8.0-79.79 |
|
kernel: bnxt_en: Fix memory corruption when FW resources change during ifdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39810
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-39811 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe/vm: Clear the scratch_pt pointer on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39811
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-39812 |
中危 |
6.8.0-79.79 |
|
kernel: sctp: initialize more fields in sctp_v6_from_sk()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39812
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:08
|
| linux-libc-dev |
CVE-2025-39813 |
中危 |
6.8.0-79.79 |
|
kernel: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39813
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:08
|
| linux-libc-dev |
CVE-2025-39815 |
中危 |
6.8.0-79.79 |
|
kernel: RISC-V: KVM: fix stack overrun when loading vlenb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39815
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-39817 |
中危 |
6.8.0-79.79 |
|
kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39817
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:08
|
| linux-libc-dev |
CVE-2025-39819 |
中危 |
6.8.0-79.79 |
|
kernel: fs/smb: Fix inconsistent refcnt update
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39819
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:15 修改: 2026-01-16 20:09
|
| linux-libc-dev |
CVE-2025-39823 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: x86: use array_index_nospec with indices that come from guest
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39823
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:38
|
| linux-libc-dev |
CVE-2025-39824 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel (ASUS HID): Use-after-free vulnerability allows arbitrary code execution or denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39824
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:37
|
| linux-libc-dev |
CVE-2025-39825 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: fix race with concurrent opens in rename(2)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39825
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:37
|
| linux-libc-dev |
CVE-2025-39826 |
中危 |
6.8.0-79.79 |
|
kernel: net: rose: convert 'use' field to refcount_t
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39826
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:36
|
| linux-libc-dev |
CVE-2025-39827 |
中危 |
6.8.0-79.79 |
|
kernel: net: rose: include node references in rose_neigh refcount
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39827
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:35
|
| linux-libc-dev |
CVE-2025-39828 |
中危 |
6.8.0-79.79 |
|
kernel: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39828
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:16 修改: 2026-01-16 20:32
|
| linux-libc-dev |
CVE-2025-39829 |
中危 |
6.8.0-79.79 |
|
kernel: trace/fgraph: Fix the warning caused by missing unregister notifier
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39829
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 13:16 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-39832 |
中危 |
6.8.0-79.79 |
|
kernel: net/mlx5: Fix lockdep assertion on sync reset unload event
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39832
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 14:15 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-39833 |
中危 |
6.8.0-79.79 |
|
kernel: mISDN: hfcpci: Fix warning when deleting uninitialized timer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39833
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 14:15 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-39835 |
中危 |
6.8.0-79.79 |
|
kernel: xfs: do not propagate ENODATA disk errors into xattr code
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39835
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 14:15 修改: 2026-01-16 20:30
|
| linux-libc-dev |
CVE-2025-39836 |
中危 |
6.8.0-79.79 |
|
kernel: efi: stmm: Fix incorrect buffer allocation method
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39836
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-16 14:15 修改: 2026-01-14 19:16
|
| linux-libc-dev |
CVE-2025-39838 |
中危 |
6.8.0-79.79 |
|
kernel: cifs: prevent NULL pointer dereference in UTF16 conversion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39838
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-02 16:16
|
| linux-libc-dev |
CVE-2025-39839 |
中危 |
6.8.0-79.79 |
|
kernel: batman-adv: fix OOB read/write in network-coding decode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39839
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:31
|
| linux-libc-dev |
CVE-2025-39841 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39841
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:30
|
| linux-libc-dev |
CVE-2025-39842 |
中危 |
6.8.0-79.79 |
|
kernel: ocfs2: prevent release journal inode after journal shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39842
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:26
|
| linux-libc-dev |
CVE-2025-39843 |
中危 |
6.8.0-79.79 |
|
kernel: mm: slub: avoid wake up kswapd in set_track_prepare
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39843
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:25
|
| linux-libc-dev |
CVE-2025-39844 |
中危 |
6.8.0-79.79 |
|
kernel: mm: move page table sync declarations to linux/pgtable.h
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39844
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:24
|
| linux-libc-dev |
CVE-2025-39845 |
中危 |
6.8.0-79.79 |
|
kernel: x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39845
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:23
|
| linux-libc-dev |
CVE-2025-39846 |
中危 |
6.8.0-79.79 |
|
kernel: pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39846
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:22
|
| linux-libc-dev |
CVE-2025-39847 |
中危 |
6.8.0-79.79 |
|
kernel: ppp: fix memory leak in pad_compress_skb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39847
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:20
|
| linux-libc-dev |
CVE-2025-39848 |
中危 |
6.8.0-79.79 |
|
kernel: ax25: properly unshare skbs in ax25_kiss_rcv()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39848
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:19
|
| linux-libc-dev |
CVE-2025-39849 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39849
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:17
|
| linux-libc-dev |
CVE-2025-39850 |
中危 |
6.8.0-79.79 |
|
kernel: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39850
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39851 |
中危 |
6.8.0-79.79 |
|
kernel: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39851
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39852 |
中危 |
6.8.0-79.79 |
|
kernel: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39852
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39853 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: Fix potential invalid access when MAC list is empty
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39853
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 15:16
|
| linux-libc-dev |
CVE-2025-39854 |
中危 |
6.8.0-79.79 |
|
kernel: ice: fix NULL access of tx->in_use in ice_ll_ts_intr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39854
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39857 |
中危 |
6.8.0-79.79 |
|
kernel: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39857
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 20:43
|
| linux-libc-dev |
CVE-2025-39859 |
中危 |
6.8.0-79.79 |
|
kernel: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39859
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39860 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39860
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 20:42
|
| linux-libc-dev |
CVE-2025-39861 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: vhci: Prevent use-after-free by removing debugfs files early
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39861
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39862 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: mt76: mt7915: fix list corruption after hardware restart
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39862
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39863 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39863
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39864 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: cfg80211: fix use-after-free in cmp_bss()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39864
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 20:41
|
| linux-libc-dev |
CVE-2025-39865 |
中危 |
6.8.0-79.79 |
|
kernel: tee: fix NULL pointer dereference in tee_shm_put
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39865
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2026-01-20 20:41
|
| linux-libc-dev |
CVE-2025-39866 |
中危 |
6.8.0-79.79 |
|
kernel: fs: writeback: fix use-after-free in __mark_inode_dirty()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39866
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-19 16:15 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-39869 |
中危 |
6.8.0-79.79 |
|
kernel: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39869
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-20 20:41
|
| linux-libc-dev |
CVE-2025-39873 |
中危 |
6.8.0-79.79 |
|
kernel: can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39873
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-20 20:33
|
| linux-libc-dev |
CVE-2025-39876 |
中危 |
6.8.0-79.79 |
|
kernel: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39876
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-20 20:33
|
| linux-libc-dev |
CVE-2025-39877 |
中危 |
6.8.0-79.79 |
|
kernel: mm/damon/sysfs: fix use-after-free in state_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39877
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-20 20:29
|
| linux-libc-dev |
CVE-2025-39880 |
中危 |
6.8.0-79.79 |
|
kernel: libceph: fix invalid accesses to ceph_connection_v1_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39880
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-20 20:27
|
| linux-libc-dev |
CVE-2025-39881 |
中危 |
6.8.0-79.79 |
|
kernel: kernfs: Fix UAF in polling when open file is released
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39881
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-16 19:26
|
| linux-libc-dev |
CVE-2025-39883 |
中危 |
6.8.0-79.79 |
|
kernel: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39883
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-16 19:26
|
| linux-libc-dev |
CVE-2025-39884 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: fix subvolume deletion lockup caused by inodes xarray race
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39884
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39885 |
中危 |
6.8.0-79.79 |
|
kernel: ocfs2: fix recursive semaphore deadlock in fiemap call
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39885
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-16 19:29
|
| linux-libc-dev |
CVE-2025-39886 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Tell memcg to use allow_spinning=false path in bpf_timer_init()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39886
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-09-23 06:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39891 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: mwifiex: Initialize the chan_stats array to zero
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39891
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2025-11-03 18:16
|
| linux-libc-dev |
CVE-2025-39894 |
中危 |
6.8.0-79.79 |
|
kernel: netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39894
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:30
|
| linux-libc-dev |
CVE-2025-39895 |
中危 |
6.8.0-79.79 |
|
kernel: sched: Fix sched_numa_find_nth_cpu() if mask offline
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39895
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39896 |
中危 |
6.8.0-79.79 |
|
kernel: accel/ivpu: Prevent recovery work from being queued during device removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39896
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39897 |
中危 |
6.8.0-79.79 |
|
kernel: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39897
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39899 |
中危 |
6.8.0-79.79 |
|
kernel: mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39899
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39901 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: remove read access to debugfs files
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39901
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39902 |
中危 |
6.8.0-79.79 |
|
kernel: mm/slub: avoid accessing metadata when pointer is invalid in object_err()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39902
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:30
|
| linux-libc-dev |
CVE-2025-39905 |
中危 |
6.8.0-79.79 |
|
kernel: net: phylink: add lock for serializing concurrent pl->phydev writes with resolver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39905
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 20:16
|
| linux-libc-dev |
CVE-2025-39907 |
中危 |
6.8.0-79.79 |
|
kernel: mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39907
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:31
|
| linux-libc-dev |
CVE-2025-39908 |
中危 |
6.8.0-79.79 |
|
kernel: net: dev_ioctl: take ops lock in hwtstamp lower paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39908
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| linux-libc-dev |
CVE-2025-39909 |
中危 |
6.8.0-79.79 |
|
kernel: mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39909
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:31
|
| linux-libc-dev |
CVE-2025-39910 |
中危 |
6.8.0-79.79 |
|
kernel: mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39910
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| linux-libc-dev |
CVE-2025-39911 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39911
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:37
|
| linux-libc-dev |
CVE-2025-39913 |
中危 |
6.8.0-79.79 |
|
kernel: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39913
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:48
|
| linux-libc-dev |
CVE-2025-39914 |
中危 |
6.8.0-79.79 |
|
kernel: tracing: Silence warning when chunk allocation fails in trace_pid_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39914
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:50
|
| linux-libc-dev |
CVE-2025-39916 |
中危 |
6.8.0-79.79 |
|
kernel: mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39916
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:51
|
| linux-libc-dev |
CVE-2025-39920 |
中危 |
6.8.0-79.79 |
|
kernel: pcmcia: Add error handling for add_interval() in do_validate_mem()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39920
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-16 19:51
|
| linux-libc-dev |
CVE-2025-39923 |
中危 |
6.8.0-79.79 |
|
kernel: dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39923
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-20 15:45
|
| linux-libc-dev |
CVE-2025-39925 |
中危 |
6.8.0-79.79 |
|
kernel: can: j1939: implement NETDEV_UNREGISTER notification handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39925
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| linux-libc-dev |
CVE-2025-39927 |
中危 |
6.8.0-79.79 |
|
kernel: ceph: fix race condition validating r_parent before applying state
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39927
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-01 08:15 修改: 2026-01-14 18:16
|
| linux-libc-dev |
CVE-2025-39929 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39929
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39931 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: af_alg - Set merge to zero early in af_alg_sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39931
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39932 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39932
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39933 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: let recv_done verify data_offset, data_length and remaining_data_length
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39933
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39934 |
中危 |
6.8.0-79.79 |
|
kernel: drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39934
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39937 |
中危 |
6.8.0-79.79 |
|
kernel: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39937
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39938 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39938
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39940 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via integer overflow in dm-stripe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39940
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39942 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39942
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39943 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39943
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39944 |
中危 |
6.8.0-79.79 |
|
kernel: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39944
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39945 |
中危 |
6.8.0-79.79 |
|
kernel: cnic: Fix use-after-free bugs in cnic_delete_task
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39945
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39947 |
中危 |
6.8.0-79.79 |
|
kernel: net/mlx5e: Harden uplink netdev access against device unbind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39947
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39948 |
中危 |
6.8.0-79.79 |
|
kernel: ice: fix Rx page leak on multi-buffer frames
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39948
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39949 |
中危 |
6.8.0-79.79 |
|
kernel: qed: Don't collect too many protection override GRC elements
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39949
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39950 |
中危 |
6.8.0-79.79 |
|
In the Linux kernel, the following vulnerability has been resolved: n ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39950
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39951 |
中危 |
6.8.0-79.79 |
|
kernel: um: virtio_uml: Fix use-after-free after put_device in probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39951
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39952 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: wilc1000: avoid buffer overflow in WID string configuration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39952
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39953 |
中危 |
6.8.0-79.79 |
|
kernel: cgroup: split cgroup_destroy_wq into 3 workqueues
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39953
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-04 08:15 修改: 2025-10-06 14:56
|
| linux-libc-dev |
CVE-2025-39955 |
中危 |
6.8.0-79.79 |
|
kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39955
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-09 10:15 修改: 2025-10-09 15:50
|
| linux-libc-dev |
CVE-2025-39957 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: mac80211: increase scan_ies_len for S1G
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39957
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-09 10:15 修改: 2026-01-02 16:16
|
| linux-libc-dev |
CVE-2025-39958 |
中危 |
6.8.0-79.79 |
|
kernel: iommu/s390: Make attach succeed when the device was surprise removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39958
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-09 10:15 修改: 2025-10-09 15:50
|
| linux-libc-dev |
CVE-2025-39961 |
中危 |
6.8.0-79.79 |
|
kernel: iommu/amd/pgtbl: Fix possible race while increase page table level
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39961
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-09 13:15 修改: 2025-10-09 15:50
|
| linux-libc-dev |
CVE-2025-39964 |
中危 |
6.8.0-79.79 |
6.8.0-90.91 |
kernel: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39964
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-13 14:15 修改: 2025-10-14 19:36
|
| linux-libc-dev |
CVE-2025-39967 |
中危 |
6.8.0-79.79 |
|
kernel: fbcon: fix integer overflow in fbcon_do_set_font
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39967
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39968 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel i40e: Resource exhaustion via unbounded VF filter requests
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39968
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39969 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: fix validation of VF state in get resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39969
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39970 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: fix input validation logic for action_meta
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39970
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39971 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: fix idx validation in config queues msg
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39971
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39972 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: fix idx validation in i40e_validate_queue_map
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39972
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39973 |
中危 |
6.8.0-79.79 |
|
kernel: i40e: add validation for ring_len param
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39973
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39977 |
中危 |
6.8.0-79.79 |
|
kernel: futex: Prevent use-after-free during requeue-PI
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39977
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39978 |
中危 |
6.8.0-79.79 |
|
kernel: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39978
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39980 |
中危 |
6.8.0-79.79 |
|
kernel: nexthop: Forbid FDB status change while nexthop is in a group
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39980
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39981 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: MGMT: Fix possible UAFs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39981
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-11-24 10:16
|
| linux-libc-dev |
CVE-2025-39982 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39982
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39985 |
中危 |
6.8.0-79.79 |
|
kernel: can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39985
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39986 |
中危 |
6.8.0-79.79 |
|
kernel: can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39986
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39987 |
中危 |
6.8.0-79.79 |
|
kernel: can: hi311x: populate ndo_change_mtu() to prevent buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39987
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:29
|
| linux-libc-dev |
CVE-2025-39988 |
中危 |
6.8.0-79.79 |
|
kernel: can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39988
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| linux-libc-dev |
CVE-2025-39990 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Check the helper function is valid in get_helper_proto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39990
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| linux-libc-dev |
CVE-2025-39991 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39991
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| linux-libc-dev |
CVE-2025-39992 |
中危 |
6.8.0-79.79 |
|
kernel: mm: swap: check for stable address space before operating on the VMA
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39992
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| linux-libc-dev |
CVE-2025-39993 |
中危 |
6.8.0-79.79 |
6.8.0-90.91 |
kernel: media: rc: fix races with imon_disconnect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39993
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-29 14:15
|
| linux-libc-dev |
CVE-2025-39994 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Use-after-free in xc5000 tuner driver due to race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39994
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-29 14:15
|
| linux-libc-dev |
CVE-2025-39995 |
中危 |
6.8.0-79.79 |
|
kernel: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39995
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-29 14:15
|
| linux-libc-dev |
CVE-2025-39996 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel (media: b2c2): Use-after-free vulnerability in flexcop_pci_remove leading to denial of service.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39996
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-29 14:15
|
| linux-libc-dev |
CVE-2025-39998 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Buffer overflow in target_lu_gp_members_show can lead to arbitrary code execution
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-39998
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-29 14:15
|
| linux-libc-dev |
CVE-2025-40000 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40000
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-15 08:15 修改: 2025-10-16 15:28
|
| linux-libc-dev |
CVE-2025-40001 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40001
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-18 08:15 修改: 2025-10-29 14:15
|
| linux-libc-dev |
CVE-2025-40003 |
中危 |
6.8.0-79.79 |
|
kernel: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40003
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-18 08:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40005 |
中危 |
6.8.0-79.79 |
|
kernel: spi: cadence-quadspi: Implement refcount to handle unbind during busy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40005
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40006 |
中危 |
6.8.0-79.79 |
|
kernel: mm/hugetlb: fix folio is still mapped when deleted
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40006
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40008 |
中危 |
6.8.0-79.79 |
|
kernel: kmsan: fix out-of-bounds access to shadow memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40008
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40009 |
中危 |
6.8.0-79.79 |
|
kernel: fs/proc/task_mmu: check p->vec_buf for NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40009
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40010 |
中危 |
6.8.0-79.79 |
|
kernel: afs: Fix potential null pointer dereference in afs_put_server
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40010
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40011 |
中危 |
6.8.0-79.79 |
|
kernel: drm/gma500: Fix null dereference in hdmi teardown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40011
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40012 |
中危 |
6.8.0-79.79 |
|
kernel: net/smc: fix warning in smc_rx_splice() when calling get_page()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40012
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40013 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: qcom: audioreach: fix potential null pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40013
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40014 |
中危 |
6.8.0-79.79 |
|
kernel: objtool, spi: amd: Fix out-of-bounds stack access in amd_set_spi_freq()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40014
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-10-30 16:02
|
| linux-libc-dev |
CVE-2025-40016 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: uvcvideo Denial of Service from invalid UVC entity IDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40016
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-20 16:15 修改: 2025-10-21 19:31
|
| linux-libc-dev |
CVE-2025-40018 |
中危 |
6.8.0-79.79 |
6.8.0-90.91 |
kernel: ipvs: Defer ip_vs_ftp unregister during netns cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40018
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-24 12:15 修改: 2025-10-29 14:15
|
| linux-libc-dev |
CVE-2025-40020 |
中危 |
6.8.0-79.79 |
|
kernel: can: peak_usb: fix shift-out-of-bounds issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40020
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-24 13:15 修改: 2025-10-27 13:20
|
| linux-libc-dev |
CVE-2025-40021 |
中危 |
6.8.0-79.79 |
|
kernel: tracing: dynevent: Add a missing lockdown check on dynevent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40021
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-24 13:15 修改: 2025-10-27 13:20
|
| linux-libc-dev |
CVE-2025-40024 |
中危 |
6.8.0-79.79 |
|
kernel: vhost: Take a reference on the task in struct vhost_task
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40024
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-24 13:15 修改: 2025-10-27 13:20
|
| linux-libc-dev |
CVE-2025-40025 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to do sanity check on node footer for non inode dnode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40025
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 10:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40026 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40026
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 10:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40027 |
中危 |
6.8.0-79.79 |
|
kernel: Kernel: Denial of Service in 9p filesystem client via race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40027
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 10:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40029 |
中危 |
6.8.0-79.79 |
|
kernel: bus: fsl-mc: Check return value of platform_get_resource()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40029
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40030 |
中危 |
6.8.0-79.79 |
|
kernel: pinctrl: check the return value of pinmux_ops::get_function_name()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40030
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40031 |
中危 |
6.8.0-79.79 |
|
kernel: tee: fix register_shm_helper()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40031
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40032 |
中危 |
6.8.0-79.79 |
|
kernel: PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40032
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40033 |
中危 |
6.8.0-79.79 |
|
kernel: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40033
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40035 |
中危 |
6.8.0-79.79 |
|
kernel: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40035
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40036 |
中危 |
6.8.0-79.79 |
|
kernel: misc: fastrpc: fix possible map leak in fastrpc_put_args
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40036
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40037 |
中危 |
6.8.0-79.79 |
|
kernel: fbdev: simplefb: Fix use after free in simplefb_detach_genpds()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40037
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40038 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40038
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40039 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: Fix race condition in RPC handle list access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40039
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40040 |
中危 |
6.8.0-79.79 |
|
kernel: mm/ksm: fix flag-dropping behavior in ksm_madvise
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40040
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40042 |
中危 |
6.8.0-79.79 |
|
kernel: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40042
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40043 |
中危 |
6.8.0-79.79 |
|
kernel: net: nfc: nci: Add parameter validation for packet data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40043
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40044 |
中危 |
6.8.0-79.79 |
|
kernel: fs: udf: fix OOB read in lengthAllocDescs handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40044
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40047 |
中危 |
6.8.0-79.79 |
|
kernel: io_uring/waitid: always prune wait queue entry in io_waitid_wait()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40047
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40048 |
中危 |
6.8.0-79.79 |
|
kernel: uio_hv_generic: Let userspace take care of interrupt mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40048
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40049 |
中危 |
6.8.0-79.79 |
|
kernel: Squashfs: fix uninit-value in squashfs_get_parent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40049
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40051 |
中危 |
6.8.0-79.79 |
|
kernel: vhost: vringh: Modify the return value check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40051
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40052 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: fix crypto buffers in non-linear memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40052
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40053 |
中危 |
6.8.0-79.79 |
|
kernel: net: dlink: handle copy_thresh allocation failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40053
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40054 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix UAF issue in f2fs_merge_page_bio()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40054
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40055 |
中危 |
6.8.0-79.79 |
|
kernel: ocfs2: fix double free in user_cluster_connect()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40055
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40056 |
中危 |
6.8.0-79.79 |
|
kernel: vhost: vringh: Fix copy_to_iter return value check
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40056
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40057 |
中危 |
6.8.0-79.79 |
|
kernel: ptp: Add a upper bound on max_vclocks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40057
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40058 |
中危 |
6.8.0-79.79 |
|
kernel: iommu/vt-d: Disallow dirty tracking if incoherent page walk
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40058
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40059 |
中危 |
6.8.0-79.79 |
|
kernel: coresight: Fix incorrect handling for return value of devm_kzalloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40059
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40060 |
中危 |
6.8.0-79.79 |
|
kernel: coresight: trbe: Return NULL pointer for allocation failures
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40060
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40061 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/rxe: Fix race in do_task() when draining
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40061
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40062 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40062
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40064 |
中危 |
6.8.0-79.79 |
|
kernel: smc: Fix use-after-free in __pnet_find_base_ndev()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40064
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40065 |
中危 |
6.8.0-79.79 |
|
kernel: RISC-V: KVM: Write hgatp register with valid mode bits
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40065
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40068 |
中危 |
6.8.0-79.79 |
|
kernel: fs: ntfs3: Fix integer overflow in run_unpack()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40068
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40070 |
中危 |
6.8.0-79.79 |
|
kernel: pps: fix warning in pps_register_cdev when register device fail
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40070
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40071 |
中危 |
6.8.0-79.79 |
|
kernel: tty: n_gsm: Don't block input queue by waiting MSC
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40071
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40073 |
中危 |
6.8.0-79.79 |
|
kernel: drm/msm: Do not validate SSPP when it is not ready
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40073
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40074 |
中危 |
6.8.0-79.79 |
|
kernel: ipv4: start using dst_dev_rcu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40074
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40075 |
中危 |
6.8.0-79.79 |
|
kernel: tcp_metrics: use dst_dev_net_rcu()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40075
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-12-18 14:15
|
| linux-libc-dev |
CVE-2025-40077 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to avoid overflow while left shift operation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40077
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-11-24 10:16
|
| linux-libc-dev |
CVE-2025-40078 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via improper access validation in bpf_sock_addr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40078
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40079 |
中危 |
6.8.0-79.79 |
|
kernel: riscv, bpf: Sign extend struct ops return values properly
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40079
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40080 |
中危 |
6.8.0-79.79 |
|
kernel: nbd: restrict sockets to TCP and UDP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40080
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40081 |
中危 |
6.8.0-79.79 |
|
kernel: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40081
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-28 12:15 修改: 2025-10-30 15:05
|
| linux-libc-dev |
CVE-2025-40083 |
中危 |
6.8.0-79.79 |
|
kernel: net/sched: sch_qfq: Fix null-deref in agg_dequeue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-29 14:15 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40084 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: transport_ipc: validate payload size before reading handle
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40084
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-29 14:15 修改: 2025-11-03 01:15
|
| linux-libc-dev |
CVE-2025-40085 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40085
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-29 14:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40086 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40086
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40087 |
中危 |
6.8.0-79.79 |
|
kernel: NFSD: Define a proc_layoutcommit for the FlexFiles layout type
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40087
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40088 |
中危 |
6.8.0-79.79 |
|
kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40088
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40092 |
中危 |
6.8.0-79.79 |
|
kernel: usb: gadget: f_ncm: Refactor bind path to use __free()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40092
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40093 |
中危 |
6.8.0-79.79 |
|
kernel: usb: gadget: f_ecm: Refactor bind path to use __free()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40093
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40094 |
中危 |
6.8.0-79.79 |
|
kernel: usb: gadget: f_acm: Refactor bind path to use __free()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40094
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40095 |
中危 |
6.8.0-79.79 |
|
kernel: usb: gadget: f_rndis: Refactor bind path to use __free()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40095
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40096 |
中危 |
6.8.0-79.79 |
|
kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40096
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40097 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: hda: Fix missing pointer check in hda_component_manager_init function
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40097
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-11-24 10:16
|
| linux-libc-dev |
CVE-2025-40098 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40098
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40099 |
中危 |
6.8.0-79.79 |
|
kernel: cifs: parse_dfs_referrals: prevent oob on malformed input
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40099
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40100 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: do not assert we found block group item when creating free space tree
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40100
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40101 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40101
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40102 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel KVM: Denial of Service due to uninitialized vCPU event handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40102
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40103 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: Fix refcount leak for cifs_sb_tlink
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40103
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40104 |
中危 |
6.8.0-79.79 |
|
kernel: ixgbevf: fix mailbox API compatibility by negotiating supported features
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40104
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40105 |
中危 |
6.8.0-79.79 |
|
kernel: vfs: Don't leak disconnected dentries on umount
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40105
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-30 10:15 修改: 2025-10-30 15:03
|
| linux-libc-dev |
CVE-2025-40106 |
中危 |
6.8.0-79.79 |
|
kernel: comedi: fix divide-by-zero in comedi_buf_munge()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40106
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-10-31 10:15 修改: 2025-11-04 15:41
|
| linux-libc-dev |
CVE-2025-40107 |
中危 |
6.8.0-79.79 |
|
kernel: can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40107
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-03 13:15 修改: 2025-11-04 15:41
|
| linux-libc-dev |
CVE-2025-40109 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in crypto random number generator due to missing set_ent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40109
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-09 05:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40110 |
中危 |
6.8.0-79.79 |
|
kernel: drm/vmwgfx: Fix a null-ptr access in the cursor snooper
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40110
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 02:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-40111 |
中危 |
6.8.0-79.79 |
|
kernel: drm/vmwgfx: Fix Use-after-free in validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40111
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 02:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40112 |
中危 |
6.8.0-79.79 |
|
In the Linux kernel, the following vulnerability has been resolved: s ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40112
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40114 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: iio: light: Add check for array bounds in veml6075_read_int_time_ms
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40114
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2025-10-01 15:15
|
| linux-libc-dev |
CVE-2025-40115 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40115
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40116 |
中危 |
6.8.0-79.79 |
|
kernel: usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40116
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40120 |
中危 |
6.8.0-79.79 |
|
kernel: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40120
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40121 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40121
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40123 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Enforce expected_attach_type for tailcall compatibility
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40123
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40124 |
中危 |
6.8.0-79.79 |
|
kernel: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40124
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40125 |
中危 |
6.8.0-79.79 |
|
kernel: blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40125
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40126 |
中危 |
6.8.0-79.79 |
|
kernel: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40126
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40127 |
中危 |
6.8.0-79.79 |
|
kernel: hwrng: ks-sa - fix division by zero in ks_sa_rng_init
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40127
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40129 |
中危 |
6.8.0-79.79 |
|
kernel: sunrpc: fix null pointer dereference on zero-length checksum
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40129
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40134 |
中危 |
6.8.0-79.79 |
|
kernel: dm: fix NULL pointer dereference in __dm_suspend()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40134
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40135 |
中危 |
6.8.0-79.79 |
|
kernel: ipv6: use RCU in ip6_xmit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40135
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40136 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: hisilicon/qm - request reserved interrupt for virtual function
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40136
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40137 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to truncate first page in error path of f2fs_truncate()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40137
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40139 |
中危 |
6.8.0-79.79 |
|
kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40139
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40140 |
中危 |
6.8.0-79.79 |
|
kernel: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40140
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40141 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: ISO: Fix possible UAF on iso_conn_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40141
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40146 |
中危 |
6.8.0-79.79 |
|
kernel: blk-mq: fix potential deadlock while nr_requests grown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40146
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40149 |
中危 |
6.8.0-79.79 |
|
kernel: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40149
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2026-01-17 16:16
|
| linux-libc-dev |
CVE-2025-40150 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to avoid migrating empty section
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40150
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40153 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via mprotect() on huge transparent huge pages
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40153
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40154 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40154
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40155 |
中危 |
6.8.0-79.79 |
|
kernel: iommu/vt-d: debugfs: Fix legacy mode page table dump logic
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40155
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40156 |
中危 |
6.8.0-79.79 |
|
kernel: PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40156
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40157 |
中危 |
6.8.0-79.79 |
6.8.0-86.87 |
kernel: Linux kernel: Denial of service in i10nm_edac driver due to disabled memory controller
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40157
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40158 |
中危 |
6.8.0-79.79 |
|
kernel: ipv6: use RCU in ip6_output()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40158
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40159 |
中危 |
6.8.0-79.79 |
|
kernel: xsk: Harden userspace-supplied xdp_desc validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40159
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40160 |
中危 |
6.8.0-79.79 |
|
kernel: xen/events: Return -EEXIST for bound VIRQs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40160
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40164 |
中危 |
6.8.0-79.79 |
|
kernel: usbnet: Fix using smp_processor_id() in preemptible code warnings
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40164
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2026-01-08 10:15
|
| linux-libc-dev |
CVE-2025-40165 |
中危 |
6.8.0-79.79 |
|
kernel: media: nxp: imx8-isi: m2m: Fix streaming cleanup on release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40165
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40166 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe/guc: Check GuC running state before deregistering exec queue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40166
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40167 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: detect invalid INLINE_DATA + EXTENTS flag combination
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40167
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40168 |
中危 |
6.8.0-79.79 |
|
kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40168
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40169 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Reject negative offsets for ALU ops
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40169
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40170 |
中危 |
6.8.0-79.79 |
|
kernel: net: use dst_dev_rcu() in sk_setup_caps()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40170
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2026-01-08 10:15
|
| linux-libc-dev |
CVE-2025-40171 |
中危 |
6.8.0-79.79 |
|
kernel: Kernel: Denial of Service in nvmet-fc due to resource leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40171
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40172 |
中危 |
6.8.0-79.79 |
|
kernel: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40172
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40173 |
中危 |
6.8.0-79.79 |
|
kernel: net/ip6_tunnel: Prevent perpetual tunnel growth
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40173
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40176 |
中危 |
6.8.0-79.79 |
|
kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40176
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 11:15 修改: 2025-11-12 16:19
|
| linux-libc-dev |
CVE-2025-40178 |
中危 |
6.8.0-79.79 |
|
kernel: pid: Add a judgment for ns null in pid_nr_ns
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40178
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40179 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: verify orphan file size is not too big
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40179
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40180 |
中危 |
6.8.0-79.79 |
|
kernel: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40183 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40183
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40187 |
中危 |
6.8.0-79.79 |
|
kernel: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40187
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40188 |
中危 |
6.8.0-79.79 |
|
kernel: pwm: berlin: Fix wrong register in suspend/resume
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40188
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40190 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: guard against EA inode refcount underflow in xattr update
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40190
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40192 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "ipmi: fix msg stack when IPMI is disconnected"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40192
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40193 |
中危 |
6.8.0-79.79 |
|
kernel: xtensa: simdisk: add input size check in proc_write_simdisk
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40193
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40194 |
中危 |
6.8.0-79.79 |
|
kernel: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40194
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40195 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: NULL pointer dereference in mount leads to local denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40195
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40196 |
中危 |
6.8.0-79.79 |
|
kernel: fs: quota: create dedicated workqueue for quota_release_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40196
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40198 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40200 |
中危 |
6.8.0-79.79 |
|
kernel: Squashfs: reject negative file sizes in squashfs_read_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40200
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40201 |
中危 |
6.8.0-79.79 |
|
kernel: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40201
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40202 |
中危 |
6.8.0-79.79 |
|
kernel: ipmi: Rework user message limit handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40202
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40203 |
中危 |
6.8.0-79.79 |
|
kernel: listmount: don't call path_put() under namespace semaphore
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40203
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40204 |
中危 |
6.8.0-79.79 |
|
kernel: sctp: Fix MAC comparison to be constant-time
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40204
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40205 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: avoid potential out-of-bounds in btrfs_encode_fh()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40205
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40206 |
中危 |
6.8.0-79.79 |
|
kernel: netfilter: nft_objref: validate objref and objrefmap expressions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40206
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40207 |
中危 |
6.8.0-79.79 |
|
kernel: media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40207
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40208 |
中危 |
6.8.0-79.79 |
|
kernel: media: iris: fix module removal if firmware download failed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40208
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-12 22:15 修改: 2025-11-14 16:42
|
| linux-libc-dev |
CVE-2025-40210 |
中危 |
6.8.0-79.79 |
|
kernel: Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40210
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-21 11:15 修改: 2025-11-21 15:13
|
| linux-libc-dev |
CVE-2025-40211 |
中危 |
6.8.0-79.79 |
|
kernel: ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40211
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-21 11:15 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40217 |
中危 |
6.8.0-79.79 |
|
kernel: pidfs: validate extensible ioctls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40217
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40218 |
中危 |
6.8.0-79.79 |
|
kernel: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40218
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40219 |
中危 |
6.8.0-79.79 |
|
kernel: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40219
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40220 |
中危 |
6.8.0-79.79 |
|
kernel: fuse: fix livelock in synchronous file put from fuseblk workers
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40220
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40221 |
中危 |
6.8.0-79.79 |
|
kernel: media: pci: mg4b: fix uninitialized iio scan data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40221
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 15:15 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40222 |
中危 |
6.8.0-79.79 |
|
kernel: tty: serial: sh-sci: fix RSCI FIFO overrun handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40222
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40223 |
中危 |
6.8.0-79.79 |
|
kernel: most: usb: Fix use-after-free in hdm_disconnect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40223
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40226 |
中危 |
6.8.0-79.79 |
|
kernel: firmware: arm_scmi: Account for failed debug initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40226
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40231 |
中危 |
6.8.0-79.79 |
|
kernel: vsock: fix lock inversion in vsock_assign_transport()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40231
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40233 |
中危 |
6.8.0-79.79 |
|
kernel: ocfs2: clear extent cache after moving/defragmenting extents
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40233
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40235 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40235
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40237 |
中危 |
6.8.0-79.79 |
|
kernel: fs/notify: call exportfs_encode_fid with s_umount
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40237
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-23 17:15
|
| linux-libc-dev |
CVE-2025-40238 |
中危 |
6.8.0-79.79 |
|
kernel: net/mlx5: Fix IPsec cleanup over MPV device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40238
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40240 |
中危 |
6.8.0-79.79 |
|
kernel: sctp: avoid NULL dereference when chunk data buffer is missing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40240
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40242 |
中危 |
6.8.0-79.79 |
|
kernel: gfs2: Fix unlikely race in gdlm_put_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40242
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40243 |
中危 |
6.8.0-79.79 |
|
kernel: hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40243
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40244 |
中危 |
6.8.0-79.79 |
|
kernel: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40245 |
中危 |
6.8.0-79.79 |
|
kernel: nios2: ensure that memblock.current_limit is set when setting pfn limits
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40247 |
中危 |
6.8.0-79.79 |
|
kernel: drm/msm: Fix pgtable prealloc error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40247
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40248 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: vsock vulnerability may lead to memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40248
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40250 |
中危 |
6.8.0-79.79 |
|
kernel: net/mlx5: Clean up only new IRQ glue on request_irq() failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40250
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40251 |
中危 |
6.8.0-79.79 |
|
kernel: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40251
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40252 |
中危 |
6.8.0-79.79 |
|
kernel: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40252
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40253 |
中危 |
6.8.0-79.79 |
|
kernel: s390/ctcm: Fix double-kfree
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40253
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40254 |
中危 |
6.8.0-79.79 |
|
kernel: net: openvswitch: remove never-working support for setting nsh fields
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40254
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40257 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel MPTCP: Privilege escalation or denial of service via use-after-free in timer handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40257
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40258 |
中危 |
6.8.0-79.79 |
|
kernel: mptcp: fix race condition in mptcp_schedule_work()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40258
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40259 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: sg: Do not sleep in atomic context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40259
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40261 |
中危 |
6.8.0-79.79 |
|
kernel: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40261
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40262 |
中危 |
6.8.0-79.79 |
|
kernel: Input: imx_sc_key - fix memory corruption on unload
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40262
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40263 |
中危 |
6.8.0-79.79 |
|
kernel: Input: cros_ec_keyb - fix an invalid memory access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40263
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2026-01-02 16:16
|
| linux-libc-dev |
CVE-2025-40264 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: be2net driver NULL pointer dereference leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40264
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-06 22:15
|
| linux-libc-dev |
CVE-2025-40266 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: arm64: Check the untrusted offset in FF-A memory share
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40266
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-04 16:16 修改: 2025-12-04 17:15
|
| linux-libc-dev |
CVE-2025-40268 |
中危 |
6.8.0-79.79 |
|
kernel: cifs: client: fix memory leak in smb3_fs_context_parse_param
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40268
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40269 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel ALSA USB audio driver: Buffer overflow leading to information disclosure and denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40269
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2026-01-02 16:16
|
| linux-libc-dev |
CVE-2025-40271 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Use-after-free in proc_readdir_de() can lead to privilege escalation or denial of service.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40271
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40272 |
中危 |
6.8.0-79.79 |
|
kernel: mm/secretmem: fix use-after-free race in fault handler
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40272
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40273 |
中危 |
6.8.0-79.79 |
|
kernel: NFSD: free copynotify stateid in nfs4_free_ol_stateid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40273
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40274 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40274
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40275 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40275
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40277 |
中危 |
6.8.0-79.79 |
|
kernel: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40277
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40278 |
中危 |
6.8.0-79.79 |
|
kernel: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40278
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40279 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Information disclosure via uninitialized data in tcf_connmark_dump()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40279
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40280 |
中危 |
6.8.0-79.79 |
|
kernel: tipc: Fix use-after-free in tipc_mon_reinit_self()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40280
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40281 |
中危 |
6.8.0-79.79 |
|
kernel: sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40281
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40282 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: 6lowpan: reset link-local header on ipv6 recv path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40282
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40283 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40283
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40284 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: MGMT: cancel mesh send timer when hdev removed
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40284
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40285 |
中危 |
6.8.0-79.79 |
|
kernel: smb/server: fix possible refcount leak in smb2_sess_setup()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40285
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40286 |
中危 |
6.8.0-79.79 |
|
kernel: smb/server: fix possible memory leak in smb2_read()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40286
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40287 |
中危 |
6.8.0-79.79 |
|
kernel: exfat: fix improper check of dentry.stream.valid_size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40287
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40288 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40288
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40289 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40289
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-06 22:15 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40292 |
中危 |
6.8.0-79.79 |
|
kernel: virtio-net: fix received length check in big packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40292
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40293 |
中危 |
6.8.0-79.79 |
|
kernel: iommufd: Don't overflow during division for dirty tracking
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40293
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40294 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Out-of-bounds write in Bluetooth MGMT can lead to information disclosure and denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40294
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40301 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Information disclosure and denial of service in Bluetooth HCI event handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40301
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40303 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: ensure no dirty metadata is written back for an fs with errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40303
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40304 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Out-of-bounds write in fbdev can lead to privilege escalation, information disclosure, or denial of service.
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40304
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40305 |
中危 |
6.8.0-79.79 |
|
kernel: 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40305
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2026-01-02 16:16
|
| linux-libc-dev |
CVE-2025-40306 |
中危 |
6.8.0-79.79 |
|
kernel: orangefs: fix xattr related buffer overflow..
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40306
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40307 |
中危 |
6.8.0-79.79 |
|
kernel: exfat: validate cluster allocation bits of the allocation bitmap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40307
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40308 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: bcsp: receive data only if registered
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40308
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40309 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: SCO: Fix UAF on sco_conn_free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40309
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2026-01-02 16:16
|
| linux-libc-dev |
CVE-2025-40310 |
中危 |
6.8.0-79.79 |
|
kernel: amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40310
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40311 |
中危 |
6.8.0-79.79 |
|
kernel: accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40311
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40312 |
中危 |
6.8.0-79.79 |
|
kernel: jfs: Verify inode mode when loading from disk
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40312
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40313 |
中危 |
6.8.0-79.79 |
|
kernel: ntfs3: pretend $Extend records as regular files
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40313
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40314 |
中危 |
6.8.0-79.79 |
|
kernel: usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40314
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40315 |
中危 |
6.8.0-79.79 |
|
kernel: usb: gadget: f_fs: Fix epfile null pointer access after ep enable
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40315
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40317 |
中危 |
6.8.0-79.79 |
|
kernel: regmap: slimbus: fix bus_context pointer in regmap init calls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40317
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40318 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40318
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40319 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Sync pending IRQ work before freeing ring buffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40319
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40320 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: fix potential cfid UAF in smb2_query_info_compound
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40320
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40321 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40321
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40322 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Information disclosure and denial of service via out-of-bounds read in font glyph handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40322
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40323 |
中危 |
6.8.0-79.79 |
|
kernel: fbcon: Set fb_display[i]->mode to NULL when the mode is released
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40323
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40324 |
中危 |
6.8.0-79.79 |
|
kernel: NFSD: Fix crash in nfsd4_read_release()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40324
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-08 01:16 修改: 2025-12-08 18:26
|
| linux-libc-dev |
CVE-2025-40325 |
中危 |
6.8.0-79.79 |
|
kernel: md/raid10: wait barrier before returning discard request with REQ_NOWAIT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40325
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-04-18 07:15 修改: 2026-01-08 10:15
|
| linux-libc-dev |
CVE-2025-40328 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: fix potential UAF in smb2_close_cached_fid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40328
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:37
|
| linux-libc-dev |
CVE-2025-40329 |
中危 |
6.8.0-79.79 |
|
kernel: drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40329
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40331 |
中危 |
6.8.0-79.79 |
|
kernel: sctp: Prevent TOCTOU out-of-bounds write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40331
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40332 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdkfd: Fix mmap write lock not release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40332
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40333 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix infinite loop in __insert_extent_tree()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40333
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40334 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: validate userq buffer virtual address and size
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40334
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40335 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: validate userq input args
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40335
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40336 |
中危 |
6.8.0-79.79 |
|
kernel: drm/gpusvm: fix hmm_pfn_to_map_order() usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40336
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40337 |
中危 |
6.8.0-79.79 |
|
kernel: net: stmmac: Correctly handle Rx checksum offload errors
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40337
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40338 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: Intel: avs: Do not share the name pointer between components
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40338
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40339 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: fix nullptr err of vm_handle_moved
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40339
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40340 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40340
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40341 |
中危 |
6.8.0-79.79 |
|
kernel: futex: Don't leak robust_list pointer on exec race
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40341
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40342 |
中危 |
6.8.0-79.79 |
|
kernel: nvme-fc: use lock accessing port_state and rport state
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40342
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40343 |
中危 |
6.8.0-79.79 |
|
kernel: nvmet-fc: avoid scheduling association deletion twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40343
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40344 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: Intel: avs: Disable periods-elapsed work when closing PCM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40344
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-09 16:17 修改: 2025-12-09 18:36
|
| linux-libc-dev |
CVE-2025-40345 |
中危 |
6.8.0-79.79 |
|
kernel: usb: storage: sddr55: Reject out-of-bound new_pba
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40345
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-12 18:15 修改: 2025-12-15 18:22
|
| linux-libc-dev |
CVE-2025-40346 |
中危 |
6.8.0-79.79 |
|
kernel: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40346
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40347 |
中危 |
6.8.0-79.79 |
|
kernel: net: enetc: fix the deadlock of enetc_mdio_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40347
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40349 |
中危 |
6.8.0-79.79 |
|
kernel: hfs: validate record offset in hfsplus_bmap_alloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40349
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40350 |
中危 |
6.8.0-79.79 |
|
kernel: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40350
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40351 |
中危 |
6.8.0-79.79 |
|
kernel: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40351
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40353 |
中危 |
6.8.0-79.79 |
|
kernel: arm64: mte: Do not warn if the page is already tagged in copy_highpage()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40353
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40354 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: increase max link count and fix link->enc NULL pointer access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40354
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40355 |
中危 |
6.8.0-79.79 |
|
kernel: sysfs: check visibility before changing group attribute ownership
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40355
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40356 |
中危 |
6.8.0-79.79 |
|
kernel: spi: rockchip-sfc: Fix DMA-API usage
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40356
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40358 |
中危 |
6.8.0-79.79 |
|
kernel: riscv: stacktrace: Disable KASAN checks for non-current tasks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40358
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40360 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel drm/sysfb: Denial of service via NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40360
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40362 |
中危 |
6.8.0-79.79 |
|
kernel: ceph: fix multifs mds auth caps issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40362
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-40363 |
中危 |
6.8.0-79.79 |
|
kernel: net: ipv6: fix field-spanning memcpy warning in AH output
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-40363
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-62626 |
中危 |
6.8.0-79.79 |
|
Improper handling of insufficient entropy in the AMD CPUs could allow ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-62626
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-11-21 19:16 修改: 2025-11-25 22:16
|
| linux-libc-dev |
CVE-2025-68168 |
中危 |
6.8.0-79.79 |
|
kernel: jfs: fix uninitialized waitqueue in transaction manager
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68168
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68171 |
中危 |
6.8.0-79.79 |
|
kernel: x86/fpu: Ensure XFD state on signal delivery
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68171
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68172 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: aspeed - fix double free caused by devm
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68172
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68173 |
中危 |
6.8.0-79.79 |
|
kernel: ftrace: Fix softlockup in ftrace_module_enable
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68173
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68174 |
中危 |
6.8.0-79.79 |
|
kernel: amd/amdkfd: enhance kfd process check in switch partition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68174
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68175 |
中危 |
6.8.0-79.79 |
|
kernel: media: nxp: imx8-isi: Fix streaming cleanup on release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68175
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68176 |
中危 |
6.8.0-79.79 |
|
kernel: PCI: cadence: Check for the existence of cdns_pcie::ops before using it
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68176
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68177 |
中危 |
6.8.0-79.79 |
|
kernel: cpufreq/longhaul: handle NULL policy in longhaul_exit
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68177
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68178 |
中危 |
6.8.0-79.79 |
|
kernel: blk-cgroup: fix possible deadlock while configuring policy
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68178
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68179 |
中危 |
6.8.0-79.79 |
|
kernel: s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68179
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68180 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Fix NULL deref in debugfs odm_combine_segments
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68180
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68183 |
中危 |
6.8.0-79.79 |
|
kernel: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68183
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68184 |
中危 |
6.8.0-79.79 |
|
kernel: drm/mediatek: Disable AFBC support on Mediatek DRM driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68184
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68185 |
中危 |
6.8.0-79.79 |
|
kernel: nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68185
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68188 |
中危 |
6.8.0-79.79 |
|
kernel: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68188
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68190 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68190
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68191 |
中危 |
6.8.0-79.79 |
|
kernel: udp_tunnel: use netdev_warn() instead of netdev_WARN()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68191
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68192 |
中危 |
6.8.0-79.79 |
|
kernel: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68192
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68193 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe/guc: Add devm release action to safely tear down CT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68193
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68194 |
中危 |
6.8.0-79.79 |
|
kernel: media: imon: make send_packet() more robust
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68194
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68196 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Cache streams targeting link when performing LT automation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68196
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68198 |
中危 |
6.8.0-79.79 |
|
kernel: crash: fix crashkernel resource shrink
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68198
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68200 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Add bpf_prog_run_data_pointers()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68200
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68201 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: remove two invalid BUG_ON()s
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68201
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68204 |
中危 |
6.8.0-79.79 |
|
kernel: pmdomain: arm: scmi: Fix genpd leak on provider registration failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68204
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68206 |
中危 |
6.8.0-79.79 |
|
kernel: netfilter: nft_ct: add seqadj extension for natted connections
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68206
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2026-01-08 10:15
|
| linux-libc-dev |
CVE-2025-68208 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: account for current allocated stack depth in widen_imprecise_scalars()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68208
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68209 |
中危 |
6.8.0-79.79 |
|
kernel: mlx5: Fix default values in create CQ
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68209
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68211 |
中危 |
6.8.0-79.79 |
|
kernel: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68211
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2026-01-17 16:16
|
| linux-libc-dev |
CVE-2025-68212 |
中危 |
6.8.0-79.79 |
|
kernel: fs: Fix uninitialized 'offp' in statmount_string()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68212
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68213 |
中危 |
6.8.0-79.79 |
|
kernel: idpf: fix possible vport_config NULL pointer deref in remove
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68213
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68214 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to NULL function pointer race in timer shutdown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68214
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68217 |
中危 |
6.8.0-79.79 |
|
kernel: Input: pegasus-notetaker - fix potential out-of-bounds access
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68217
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68218 |
中危 |
6.8.0-79.79 |
|
kernel: nvme-multipath: fix lockdep WARN due to partition scan work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68218
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68219 |
中危 |
6.8.0-79.79 |
|
kernel: cifs: fix memory leak in smb3_fs_context_parse_param error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68219
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68220 |
中危 |
6.8.0-79.79 |
|
kernel: net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68220
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68222 |
中危 |
6.8.0-79.79 |
|
kernel: pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68222
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68223 |
中危 |
6.8.0-79.79 |
|
kernel: drm/radeon: delete radeon_fence_process in is_signaled, no deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68223
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68227 |
中危 |
6.8.0-79.79 |
|
kernel: mptcp: Fix proto fallback detection with BPF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68227
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68229 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68229
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68230 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amdgpu: fix gpu page fault after hibernation on PF passthrough
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68230
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68231 |
中危 |
6.8.0-79.79 |
|
kernel: mm/mempool: fix poisoning order>0 pages with HIGHMEM
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68231
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68233 |
中危 |
6.8.0-79.79 |
|
kernel: drm/tegra: Add call to put_pid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68233
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68235 |
中危 |
6.8.0-79.79 |
|
kernel: nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68235
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68236 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3)
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68236
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68237 |
中危 |
6.8.0-79.79 |
|
kernel: mtdchar: fix integer overflow in read/write ioctls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68237
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68238 |
中危 |
6.8.0-79.79 |
|
kernel: mtd: rawnand: cadence: fix DMA device NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68238
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 14:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68239 |
中危 |
6.8.0-79.79 |
|
kernel: binfmt_misc: restore write access before closing files opened by open_exec()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68239
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68241 |
中危 |
6.8.0-79.79 |
|
kernel: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68241
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68244 |
中危 |
6.8.0-79.79 |
|
kernel: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68244
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68245 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to memory leak in netpoll during cleanup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68245
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68246 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: close accepted socket when per-IP limit rejects connection
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68246
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68249 |
中危 |
6.8.0-79.79 |
|
kernel: most: usb: hdm_probe: Fix calling put_device() before device initialization
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68249
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68251 |
中危 |
6.8.0-79.79 |
|
kernel: erofs: avoid infinite loops due to corrupted subpage compact indexes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68251
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68254 |
中危 |
6.8.0-79.79 |
|
kernel: staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68254
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68255 |
中危 |
6.8.0-79.79 |
|
kernel: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68255
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68256 |
中危 |
6.8.0-79.79 |
|
kernel: staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68256
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68257 |
中危 |
6.8.0-79.79 |
|
kernel: comedi: check device's attached status in compat ioctls
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68257
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68258 |
中危 |
6.8.0-79.79 |
|
kernel: comedi: multiq3: sanitize config options in multiq3_attach()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68258
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68259 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68259
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68261 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68261
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68263 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: ipc: fix use-after-free in ipc_msg_send_request
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68263
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68264 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: refresh inline data size before write operations
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68264
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68265 |
中危 |
6.8.0-79.79 |
|
kernel: nvme: fix admin request_queue lifetime
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68265
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68266 |
中危 |
6.8.0-79.79 |
|
kernel: bfs: Reconstruct file type when loading from disk
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68266
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68281 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68281
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 15:15 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68282 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Use-after-free in USB gadget driver due to race condition during teardown
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68282
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68283 |
中危 |
6.8.0-79.79 |
|
kernel: libceph: replace BUG_ON with bounds check for map->max_osd
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68283
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68284 |
中危 |
6.8.0-79.79 |
|
kernel: libceph: prevent potential out-of-bounds writes in handle_auth_session_key()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68284
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68285 |
中危 |
6.8.0-79.79 |
|
kernel: libceph: fix potential use-after-free in have_mon_and_osd_map()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68285
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68286 |
中危 |
6.8.0-79.79 |
|
kernel: drm/amd/display: Check NULL before accessing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68286
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68287 |
中危 |
6.8.0-79.79 |
|
kernel: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68287
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68288 |
中危 |
6.8.0-79.79 |
|
kernel: usb: storage: Fix memory leak in USB bulk transport
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68288
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68289 |
中危 |
6.8.0-79.79 |
|
kernel: usb: gadget: f_eem: Fix memory leak in eem_unwrap
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68289
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68290 |
中危 |
6.8.0-79.79 |
|
kernel: most: usb: fix double free on late probe failure
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68290
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68295 |
中危 |
6.8.0-79.79 |
|
kernel: smb: client: fix memory leak in cifs_construct_tcon()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68295
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68296 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to race condition in fbcon setup
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68296
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68297 |
中危 |
6.8.0-79.79 |
|
kernel: ceph: fix crash in process_v2_sparse_read() for encrypted directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68297
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68301 |
中危 |
6.8.0-79.79 |
|
kernel: net: atlantic: fix fragment overflow handling in RX path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68301
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68302 |
中危 |
6.8.0-79.79 |
|
kernel: net: sxgbe: fix potential NULL dereference in sxgbe_rx()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68302
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68303 |
中危 |
6.8.0-79.79 |
|
kernel: platform/x86: intel: punit_ipc: fix memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68303
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68304 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: hci_core: lookup hci_conn on RX path on protocol side
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68304
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68305 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: hci_sock: Prevent race in socket write iter and sock bind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68305
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68307 |
中危 |
6.8.0-79.79 |
|
kernel: can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68307
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68308 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in kvaser_usb CAN driver due to infinite loop
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68308
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68309 |
中危 |
6.8.0-79.79 |
|
kernel: PCI/AER: Fix NULL pointer access by aer_info
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68309
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68310 |
中危 |
6.8.0-79.79 |
|
kernel: s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68310
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68311 |
中危 |
6.8.0-79.79 |
|
kernel: tty: serial: ip22zilog: Use platform device for probing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68311
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68312 |
中危 |
6.8.0-79.79 |
|
kernel: usbnet: Prevents free active kevent
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68312
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68313 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to inconsistent random number generation on AMD Zen5 processors
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68313
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68315 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to detect potential corrupted nid in free_nid_list
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68315
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68317 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via improper handling of io_uring notification contexts
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68317
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68318 |
中危 |
6.8.0-79.79 |
|
kernel: clk: thead: th1520-ap: set all AXI clocks to CLK_IS_CRITICAL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68318
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68320 |
中危 |
6.8.0-79.79 |
|
kernel: lan966x: Fix sleeping in atomic context
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68320
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68321 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service due to page allocation failures
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68321
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68322 |
中危 |
6.8.0-79.79 |
|
kernel: parisc: Avoid crash due to unaligned access in unwinder
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68322
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-16 16:16 修改: 2025-12-18 15:08
|
| linux-libc-dev |
CVE-2025-68324 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via use-after-free in IMM SCSI host adapter
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68324
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-18 15:16 修改: 2025-12-19 18:00
|
| linux-libc-dev |
CVE-2025-68325 |
中危 |
6.8.0-79.79 |
|
kernel: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68325
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-18 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68327 |
中危 |
6.8.0-79.79 |
|
kernel: usb: renesas_usbhs: Fix synchronous external abort on unbind
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68327
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68328 |
中危 |
6.8.0-79.79 |
|
kernel: firmware: stratix10-svc: fix bug in saving controller data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68328
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68330 |
中危 |
6.8.0-79.79 |
|
kernel: iio: accel: bmc150: Fix irq assumption regression
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68330
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68331 |
中危 |
6.8.0-79.79 |
|
kernel: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68331
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68332 |
中危 |
6.8.0-79.79 |
|
kernel: comedi: c6xdigio: Fix invalid PNP driver unregistration
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68332
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68333 |
中危 |
6.8.0-79.79 |
|
kernel: sched_ext: Fix possible deadlock in the deferred_irq_workfn()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68333
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68334 |
中危 |
6.8.0-79.79 |
|
kernel: platform/x86/amd/pmc: Add support for Van Gogh SoC
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68334
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68335 |
中危 |
6.8.0-79.79 |
|
kernel: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68335
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68336 |
中危 |
6.8.0-79.79 |
|
kernel: locking/spinlock/debug: Fix data-race in do_raw_write_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68336
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68337 |
中危 |
6.8.0-79.79 |
|
kernel: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68337
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-22 17:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68338 |
中危 |
6.8.0-79.79 |
|
kernel: net: dsa: microchip: Don't free uninitialized ksz_irq
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68338
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68339 |
中危 |
6.8.0-79.79 |
|
kernel: atm/fore200e: Fix possible data race in fore200e_open()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68339
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68340 |
中危 |
6.8.0-79.79 |
|
kernel: team: Move team device type change at the end of team_port_add
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68340
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68342 |
中危 |
6.8.0-79.79 |
|
kernel: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68342
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68343 |
中危 |
6.8.0-79.79 |
|
kernel: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68343
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-23 14:16 修改: 2025-12-23 14:51
|
| linux-libc-dev |
CVE-2025-68344 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: wavefront: Fix integer overflow in sample size validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68344
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68345 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel ALSA: Denial of Service due to NULL pointer dereference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68345
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68346 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: dice: fix buffer overflow in detect_stream_formats()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68346
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68347 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68347
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68349 |
中危 |
6.8.0-79.79 |
|
kernel: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68349
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68351 |
中危 |
6.8.0-79.79 |
|
kernel: exfat: fix refcount leak in exfat_find
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68351
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68353 |
中危 |
6.8.0-79.79 |
|
kernel: Kernel: Denial of Service via NULL pointer dereference in VXLAN module
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68353
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68354 |
中危 |
6.8.0-79.79 |
|
kernel: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68354
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68356 |
中危 |
6.8.0-79.79 |
|
kernel: gfs2: Prevent recursive memory reclaim
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68356
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68358 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: fix racy bitfield write in btrfs_clear_space_info_full()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68358
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68360 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68360
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68362 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68362
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68363 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Check skb->transport_header is set in bpf_skb_check_mtu
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68363
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68364 |
中危 |
6.8.0-79.79 |
|
kernel: ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68364
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68365 |
中危 |
6.8.0-79.79 |
|
kernel: fs/ntfs3: Initialize allocated memory before use
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68365
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68366 |
中危 |
6.8.0-79.79 |
|
kernel: nbd: defer config unlock in nbd_genl_connect
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68366
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68367 |
中危 |
6.8.0-79.79 |
|
kernel: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68367
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68371 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: smartpqi: Fix device resources accessed after device removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68371
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68372 |
中危 |
6.8.0-79.79 |
|
kernel: nbd: defer config put in recv_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68372
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68374 |
中危 |
6.8.0-79.79 |
|
kernel: md: fix rcu protection in md_wakeup_thread
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68374
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68376 |
中危 |
6.8.0-79.79 |
|
kernel: coresight: ETR: Fix ETR buffer use-after-free issue
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68376
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68378 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Fix stackmap overflow check in __bpf_get_stackid()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68378
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68379 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in RDMA subsystem via repeated SRQ modification
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68379
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68380 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath11k: fix peer HE MCS assignment
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68380
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68724 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68724
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68725 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Do not let BPF test infra emit invalid GSO types to stack
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68725
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68727 |
中危 |
6.8.0-79.79 |
|
kernel: ntfs3: Fix uninit buffer allocated by __getname()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68727
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68728 |
中危 |
6.8.0-79.79 |
|
kernel: ntfs3: fix uninit memory after failed mi_read in mi_format_new
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68728
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68729 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: ath12k: Fix MSDU buffer types handling in RX error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68729
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68730 |
中危 |
6.8.0-79.79 |
|
kernel: accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68730
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68732 |
中危 |
6.8.0-79.79 |
|
kernel: gpu: host1x: Fix race in syncpt alloc/free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68732
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68733 |
中危 |
6.8.0-79.79 |
|
kernel: smack: fix bug: unprivileged task can create labels
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68733
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68734 |
中危 |
6.8.0-79.79 |
|
kernel: isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68734
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 11:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68736 |
中危 |
6.8.0-79.79 |
|
kernel: landlock: Fix handling of disconnected directories
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68736
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68740 |
中危 |
6.8.0-79.79 |
|
kernel: ima: Handle error code returned by ima_filter_rule_match()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68740
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68741 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: qla2xxx: Fix improper freeing of purex item
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68741
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68742 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Fix invalid prog->stats access when update_effective_progs fails
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68742
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68744 |
中危 |
6.8.0-79.79 |
|
kernel: bpf: Free special fields when update [lru_,]percpu_hash maps
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68744
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68745 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in qla2xxx SCSI driver due to improper command handling after chip reset
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68745
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68746 |
中危 |
6.8.0-79.79 |
|
kernel: spi: tegra210-quad: Fix timeout handling
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68746
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68749 |
中危 |
6.8.0-79.79 |
|
kernel: accel/ivpu: Fix race condition when unbinding BOs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68749
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-12-24 13:16 修改: 2025-12-29 15:58
|
| linux-libc-dev |
CVE-2025-68753 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: firewire-motu: add bounds check in put_user loop for DSP events
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68753
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68755 |
中危 |
6.8.0-79.79 |
|
kernel: staging: most: remove broken i2c driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68755
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68756 |
中危 |
6.8.0-79.79 |
|
kernel: block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68756
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68757 |
中危 |
6.8.0-79.79 |
|
kernel: drm/vgem-fence: Fix potential deadlock on release
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68757
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68758 |
中危 |
6.8.0-79.79 |
|
kernel: backlight: led-bl: Add devlink to supplier LEDs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68758
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68759 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68759
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68763 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: starfive - Correctly handle return of sg_nents_for_len
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68763
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68764 |
中危 |
6.8.0-79.79 |
|
kernel: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68764
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68765 |
中危 |
6.8.0-79.79 |
|
kernel: mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68765
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68766 |
中危 |
6.8.0-79.79 |
|
kernel: irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68766
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-05 10:15 修改: 2026-01-11 17:15
|
| linux-libc-dev |
CVE-2025-68767 |
中危 |
6.8.0-79.79 |
|
kernel: hfsplus: Verify inode mode when loading from disk
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68767
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68768 |
中危 |
6.8.0-79.79 |
|
kernel: inet: frags: flush pending skbs in fqdir_pre_exit()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68768
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68769 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix return value of f2fs_recover_fsync_data()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68769
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68770 |
中危 |
6.8.0-79.79 |
|
kernel: bnxt_en: Fix XDP_TX path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68770
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68771 |
中危 |
6.8.0-79.79 |
|
kernel: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68771
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68772 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to avoid updating compression context during writeback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68772
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68773 |
中危 |
6.8.0-79.79 |
|
kernel: spi: fsl-cpm: Check length parity before switching to 16 bit mode
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68773
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68774 |
中危 |
6.8.0-79.79 |
|
kernel: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68774
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68775 |
中危 |
6.8.0-79.79 |
|
kernel: net/handshake: duplicate handshake cancellations leak socket
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68775
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68776 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via NULL pointer dereference in HSR
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68776
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68777 |
中危 |
6.8.0-79.79 |
|
kernel: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68777
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68778 |
中危 |
6.8.0-79.79 |
|
kernel: btrfs: don't log conflicting inode if it's a dir moved in the current transaction
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68778
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68779 |
中危 |
6.8.0-79.79 |
|
kernel: net/mlx5e: Avoid unregistering PSP twice
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68779
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68780 |
中危 |
6.8.0-79.79 |
|
kernel: sched/deadline: only set free_cpus for online runqueues
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68780
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68781 |
中危 |
6.8.0-79.79 |
|
kernel: usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68781
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68782 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: target: Reset t_task_cdb pointer in error case
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68782
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68783 |
中危 |
6.8.0-79.79 |
|
kernel: ALSA: usb-mixer: us16x08: validate meter packet indices
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68783
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68785 |
中危 |
6.8.0-79.79 |
|
kernel: net: openvswitch: fix middle attribute validation in push_nsh() action
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68785
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68786 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: skip lock-range check on equal size to avoid size==0 underflow
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68786
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68787 |
中危 |
6.8.0-79.79 |
|
kernel: netrom: Fix memory leak in nr_sendmsg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68787
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68788 |
中危 |
6.8.0-79.79 |
|
kernel: fsnotify: do not generate ACCESS/MODIFY events on child for special files
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68788
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68789 |
中危 |
6.8.0-79.79 |
|
kernel: hwmon: (ibmpex) fix use-after-free in high/low store
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68789
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68794 |
中危 |
6.8.0-79.79 |
|
kernel: iomap: adjust read range correctly for non-block-aligned positions
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68794
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68795 |
中危 |
6.8.0-79.79 |
|
kernel: ethtool: Avoid overflowing userspace buffer on stats query
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68795
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68796 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to avoid updating zero-sized extent in extent cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68796
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68797 |
中危 |
6.8.0-79.79 |
|
kernel: char: applicom: fix NULL pointer dereference in ac_ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68797
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68798 |
中危 |
6.8.0-79.79 |
|
kernel: perf/x86/amd: Check event before enable to avoid GPF
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68798
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68799 |
中危 |
6.8.0-79.79 |
|
kernel: caif: fix integer underflow in cffrml_receive()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68799
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68800 |
中危 |
6.8.0-79.79 |
|
kernel: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68800
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68801 |
中危 |
6.8.0-79.79 |
|
kernel: mlxsw: spectrum_router: Fix neighbour use-after-free
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68801
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68802 |
中危 |
6.8.0-79.79 |
|
kernel: drm/xe: Limit num_syncs to prevent oversized allocations
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68802
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68803 |
中危 |
6.8.0-79.79 |
|
kernel: NFSD: NFSv4 file creation neglects setting ACL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68803
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68804 |
中危 |
6.8.0-79.79 |
|
kernel: platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68804
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68806 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: fix buffer validation by including null terminator size in EA length
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68806
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68808 |
中危 |
6.8.0-79.79 |
|
kernel: media: vidtv: initialize local pointers upon transfer of memory ownership
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68808
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68809 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: vfs: fix race on m_flags in vfs_cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68809
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68810 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68810
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68811 |
中危 |
6.8.0-79.79 |
|
kernel: svcrdma: use rc_pageoff for memcpy byte offset
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68811
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68813 |
中危 |
6.8.0-79.79 |
|
kernel: ipvs: fix ipv4 null-ptr-deref in route error path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68813
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68814 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Memory leak in io_uring's __io_openat_prep() leading to denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68814
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68815 |
中危 |
6.8.0-79.79 |
|
kernel: net/sched: ets: Remove drr class from the active list if it changes to strict
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68815
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68816 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: mlx5 firmware tracer vulnerable to arbitrary memory access or denial of service via malformed format strings
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68816
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68817 |
中危 |
6.8.0-79.79 |
|
kernel: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68817
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68818 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68818
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68819 |
中危 |
6.8.0-79.79 |
|
kernel: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68819
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68820 |
中危 |
6.8.0-79.79 |
|
kernel: ext4: xattr: fix null pointer deref in ext4_raw_inode()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68820
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-68822 |
中危 |
6.8.0-79.79 |
|
kernel: Input: alps - fix use-after-free bugs caused by dev3_register_work
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68822
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-68823 |
中危 |
6.8.0-79.79 |
|
kernel: ublk: fix deadlock when reading partition table
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-68823
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71064 |
中危 |
6.8.0-79.79 |
|
kernel: net: hns3: using the num_tqps in the vf driver to apply for resources
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71064
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71065 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: fix to avoid potential deadlock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71065
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71066 |
中危 |
6.8.0-79.79 |
|
kernel: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71066
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71067 |
中危 |
6.8.0-79.79 |
|
kernel: ntfs: set dummy blocksize to read boot_block when mounting
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71067
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71068 |
中危 |
6.8.0-79.79 |
|
kernel: svcrdma: bound check rq_pages index in inline path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71068
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71069 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: invalidate dentry cache on failed whiteout creation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71069
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71071 |
中危 |
6.8.0-79.79 |
|
kernel: iommu/mediatek: fix use-after-free on probe deferral
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71071
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71072 |
中危 |
6.8.0-79.79 |
|
kernel: shmem: fix recovery on rename failures
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71072
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71073 |
中危 |
6.8.0-79.79 |
|
kernel: Input: lkkbd - disable pending work before freeing device
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71073
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71074 |
中危 |
6.8.0-79.79 |
|
kernel: functionfs: fix the open/removal races
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71074
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71075 |
中危 |
6.8.0-79.79 |
|
kernel: scsi: aic94xx: fix use-after-free in device removal path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71075
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71077 |
中危 |
6.8.0-79.79 |
|
kernel: tpm: Cap the number of PCR banks
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71077
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71078 |
中危 |
6.8.0-79.79 |
|
kernel: powerpc/64s/slb: Fix SLB multihit issue during SLB preload
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71078
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71079 |
中危 |
6.8.0-79.79 |
|
kernel: net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71079
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71081 |
中危 |
6.8.0-79.79 |
|
kernel: ASoC: stm32: sai: fix OF node leak on probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71081
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71082 |
中危 |
6.8.0-79.79 |
|
kernel: Bluetooth: btusb: revert use of devm_kzalloc in btusb
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71082
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71083 |
中危 |
6.8.0-79.79 |
|
kernel: Kernel: Denial of Service via NULL pointer dereference in drm/ttm
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71083
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71084 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/cm: Fix leaking the multicast GID table reference
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71084
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71085 |
中危 |
6.8.0-79.79 |
|
kernel: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71085
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71086 |
中危 |
6.8.0-79.79 |
|
kernel: net: rose: fix invalid array index in rose_kill_by_device()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71086
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71087 |
中危 |
6.8.0-79.79 |
|
kernel: iavf: fix off-by-one issues in iavf_config_rss_reg()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71087
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71088 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service via MPTCP race condition
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71088
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71089 |
中危 |
6.8.0-79.79 |
|
kernel: iommu: disable SVA when CONFIG_X86 is set
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71089
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71091 |
中危 |
6.8.0-79.79 |
|
kernel: team: fix check for port enabled in team_queue_override_port_prio_changed()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71091
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71093 |
中危 |
6.8.0-79.79 |
|
kernel: e1000: fix OOB in e1000_tbi_should_accept()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71093
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71094 |
中危 |
6.8.0-79.79 |
|
kernel: net: usb: asix: validate PHY address before use
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71094
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71095 |
中危 |
6.8.0-79.79 |
|
kernel: net: stmmac: fix the crash issue for zero copy XDP_TX action
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71095
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71096 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71096
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71097 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel (IPv4): Denial of Service due to reference count leak in nexthop objects
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71097
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71098 |
中危 |
6.8.0-79.79 |
|
kernel: ip6_gre: make ip6gre_header() robust
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71098
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71101 |
中危 |
6.8.0-79.79 |
|
kernel: platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71101
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-13 16:16 修改: 2026-01-14 16:26
|
| linux-libc-dev |
CVE-2025-71102 |
中危 |
6.8.0-79.79 |
|
kernel: scs: fix a wrong parameter in __scs_magic
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71102
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71104 |
中危 |
6.8.0-79.79 |
|
kernel: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71104
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71105 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: use global inline_xattr_slab instead of per-sb slab cache
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71105
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71107 |
中危 |
6.8.0-79.79 |
|
kernel: f2fs: ensure node page reads complete before f2fs_put_super() finishes
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71107
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:15 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71108 |
中危 |
6.8.0-79.79 |
|
kernel: usb: typec: ucsi: Handle incorrect num_connectors capability
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71108
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:15 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71109 |
中危 |
6.8.0-79.79 |
|
kernel: MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71109
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:15 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71111 |
中危 |
6.8.0-79.79 |
|
kernel: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71111
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71112 |
中危 |
6.8.0-79.79 |
|
kernel: net: hns3: add VLAN id validation before using
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71112
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71113 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: af_alg - zero initialize memory allocated via sock_kmalloc
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71113
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71114 |
中危 |
6.8.0-79.79 |
|
kernel: via_wdt: fix critical boot hang due to unnamed resource allocation
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71114
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71115 |
中危 |
6.8.0-79.79 |
|
kernel: um: init cpu_tasks[] earlier
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71115
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71116 |
中危 |
6.8.0-79.79 |
|
kernel: libceph: make decode_pool() more resilient against corrupted osdmaps
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71116
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71118 |
中危 |
6.8.0-79.79 |
|
kernel: ACPICA: Avoid walking the Namespace if start_node is NULL
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71118
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71119 |
中危 |
6.8.0-79.79 |
|
kernel: powerpc/kexec: Enable SMT before waking offline CPUs
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71119
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71120 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Denial of Service in SUNRPC via zero-length gss_token
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71120
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71121 |
中危 |
6.8.0-79.79 |
|
kernel: parisc: Do not reprogram affinitiy on ASP chip
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71121
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71122 |
中危 |
6.8.0-79.79 |
|
kernel: iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71122
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71125 |
中危 |
6.8.0-79.79 |
|
kernel: tracing: Do not register unsupported perf events
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71125
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71126 |
中危 |
6.8.0-79.79 |
|
kernel: Linux kernel: Deadlock due to MPTCP packet reinjection during fallback
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71126
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71127 |
中危 |
6.8.0-79.79 |
|
kernel: wifi: mac80211: Discard Beacon frames to non-broadcast address
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71127
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71129 |
中危 |
6.8.0-79.79 |
|
kernel: LoongArch: BPF: Sign extend kfunc call arguments
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71129
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71130 |
中危 |
6.8.0-79.79 |
|
kernel: drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71130
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71131 |
中危 |
6.8.0-79.79 |
|
kernel: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71131
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71132 |
中危 |
6.8.0-79.79 |
|
kernel: smc91x: fix broken irq-context in PREEMPT_RT
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71132
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71133 |
中危 |
6.8.0-79.79 |
|
kernel: RDMA/irdma: avoid invalid read in irdma_net_event
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71133
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71135 |
中危 |
6.8.0-79.79 |
|
kernel: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71135
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71136 |
中危 |
6.8.0-79.79 |
|
kernel: media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71136
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71137 |
中危 |
6.8.0-79.79 |
|
kernel: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71137
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-19 13:16
|
| linux-libc-dev |
CVE-2025-71138 |
中危 |
6.8.0-79.79 |
|
kernel: drm/msm/dpu: Add missing NULL pointer check for pingpong interface
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71138
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71140 |
中危 |
6.8.0-79.79 |
|
kernel: media: mediatek: vcodec: Use spinlock for context list protection lock
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71140
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71141 |
中危 |
6.8.0-79.79 |
|
kernel: drm/tilcdc: Fix removal actions in case of failed probe
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71141
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| linux-libc-dev |
CVE-2025-71143 |
中危 |
6.8.0-79.79 |
|
kernel: clk: samsung: exynos-clkout: Assign .num before accessing .hws
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-71143
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2026-01-14 15:16 修改: 2026-01-14 16:25
|
| python3-pip-whl |
CVE-2024-35195 |
中危 |
24.0+dfsg-1ubuntu1.3 |
|
requests: subsequent requests to the same host ignore cert verification
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-35195
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2024-05-20 21:15 修改: 2024-11-21 09:19
|
| python3-pip-whl |
CVE-2025-47273 |
中危 |
24.0+dfsg-1ubuntu1.3 |
|
setuptools: Path Traversal Vulnerability in setuptools PackageIndex
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-47273
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-05-17 16:15 修改: 2025-06-12 16:29
|
| python3-pip-whl |
CVE-2025-66418 |
中危 |
24.0+dfsg-1ubuntu1.3 |
|
urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66418
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-05 16:15 修改: 2025-12-10 16:08
|
| python3-pip-whl |
CVE-2025-66471 |
中危 |
24.0+dfsg-1ubuntu1.3 |
|
urllib3: urllib3 Streaming API improperly handles highly compressed data
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-66471
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-05 17:16 修改: 2025-12-10 16:10
|
| python3-pip-whl |
CVE-2026-21441 |
中危 |
24.0+dfsg-1ubuntu1.3 |
|
urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)
漏洞详情: https://avd.aquasec.com/nvd/cve-2026-21441
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-07 22:15 修改: 2026-01-15 19:21
|
| python3.12 |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| python3.12-dev |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| python3.12-full |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| python3.12-minimal |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| python3.12-venv |
CVE-2025-13836 |
中危 |
3.12.3-1ubuntu0.9 |
3.12.3-1ubuntu0.10 |
cpython: Excessive read buffering DoS in http.client
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-13836
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-12-01 18:16 修改: 2025-12-30 15:08
|
| tar |
CVE-2025-45582 |
中危 |
1.35+dfsg-3build1 |
|
tar: Tar path traversal
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-45582
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-07-11 17:15 修改: 2025-11-02 01:15
|
| wget |
CVE-2021-31879 |
中危 |
1.21.4-1ubuntu4.1 |
|
wget: authorization header disclosure on redirect
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-31879
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2021-04-29 05:15 修改: 2024-11-21 06:06
|
| libbinutils |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| libbinutils |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| dpkg-dev |
CVE-2025-6297 |
低危 |
1.22.6ubuntu6.1 |
1.22.6ubuntu6.5 |
It was discovered that dpkg-deb does not properly sanitize directory p ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6297
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-01 17:15 修改: 2025-08-19 17:50
|
| gpgconf |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| libicu74 |
CVE-2025-5222 |
低危 |
74.2-1ubuntu3.1 |
|
icu: Stack buffer overflow in the SRBRoot::addTag function
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-5222
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-05-27 21:15 修改: 2025-08-08 14:55
|
| binutils-common |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| libctf0 |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| libctf0 |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| libcurl3t64-gnutls |
CVE-2025-0167 |
低危 |
8.5.0-2ubuntu10.6 |
|
When asked to use a `.netrc` file for credentials **and** to follow HT ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41
|
| libcurl3t64-gnutls |
CVE-2025-10148 |
低危 |
8.5.0-2ubuntu10.6 |
|
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| libcurl3t64-gnutls |
CVE-2025-14524 |
低危 |
8.5.0-2ubuntu10.6 |
|
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14524
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:53
|
| libcurl3t64-gnutls |
CVE-2025-14819 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing TLS related transfers with reused easy or multi handles and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14819
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:51
|
| libcurl3t64-gnutls |
CVE-2025-15079 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing SSH-based transfers using either SCP or SFTP, and setting t ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15079
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:50
|
| libcurl3t64-gnutls |
CVE-2025-15224 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing SSH-based transfers using either SCP or SFTP, and asked to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15224
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:47
|
| libcurl3t64-gnutls |
CVE-2025-9086 |
低危 |
8.5.0-2ubuntu10.6 |
|
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| libcurl4t64 |
CVE-2025-0167 |
低危 |
8.5.0-2ubuntu10.6 |
|
When asked to use a `.netrc` file for credentials **and** to follow HT ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41
|
| libpolkit-agent-1-0 |
CVE-2016-2568 |
低危 |
124-2ubuntu1.24.04.2 |
|
polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2017-02-13 18:59 修改: 2025-04-20 01:37
|
| libpolkit-gobject-1-0 |
CVE-2016-2568 |
低危 |
124-2ubuntu1.24.04.2 |
|
polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2017-02-13 18:59 修改: 2025-04-20 01:37
|
| libcurl4t64 |
CVE-2025-10148 |
低危 |
8.5.0-2ubuntu10.6 |
|
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| libcurl4t64 |
CVE-2025-14524 |
低危 |
8.5.0-2ubuntu10.6 |
|
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14524
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:53
|
| libcurl4t64 |
CVE-2025-14819 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing TLS related transfers with reused easy or multi handles and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14819
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:51
|
| libcurl4t64 |
CVE-2025-15079 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing SSH-based transfers using either SCP or SFTP, and setting t ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15079
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:50
|
| libcurl4t64 |
CVE-2025-15224 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing SSH-based transfers using either SCP or SFTP, and asked to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15224
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:47
|
| libcurl4t64 |
CVE-2025-9086 |
低危 |
8.5.0-2ubuntu10.6 |
|
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| libdpkg-perl |
CVE-2025-6297 |
低危 |
1.22.6ubuntu6.1 |
1.22.6ubuntu6.5 |
It was discovered that dpkg-deb does not properly sanitize directory p ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6297
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-07-01 17:15 修改: 2025-08-19 17:50
|
| libdw1t64 |
CVE-2025-1352 |
低危 |
0.190-1.1ubuntu0.1 |
|
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| libdw1t64 |
CVE-2025-1376 |
低危 |
0.190-1.1ubuntu0.1 |
|
elfutils: GNU elfutils eu-strip elf_strptr.c elf_strptr denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1376
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:21
|
| libelf1t64 |
CVE-2025-1352 |
低危 |
0.190-1.1ubuntu0.1 |
|
elfutils: GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1352
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-02-16 15:15 修改: 2025-11-03 20:34
|
| libelf1t64 |
CVE-2025-1376 |
低危 |
0.190-1.1ubuntu0.1 |
|
elfutils: GNU elfutils eu-strip elf_strptr.c elf_strptr denial of service
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1376
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-02-17 05:15 修改: 2025-11-04 20:21
|
| binutils-common |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| gpgsm |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| libgcrypt20 |
CVE-2024-2236 |
低危 |
1.10.3-2build1 |
|
libgcrypt: vulnerable to Marvin Attack
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-2236
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2024-03-06 22:15 修改: 2025-04-02 17:15
|
| binutils |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| gir1.2-glib-2.0 |
CVE-2025-3360 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15
|
| gpgv |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| libglib2.0-0t64 |
CVE-2025-3360 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15
|
| libglib2.0-0t64 |
CVE-2025-6052 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6052
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-06-13 16:15 修改: 2025-08-20 17:27
|
| libglib2.0-0t64 |
CVE-2025-7039 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Buffer Under-read on GLib through glib/gfileutils.c via get_tmp_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7039
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-03 02:15 修改: 2025-09-04 15:36
|
| gir1.2-glib-2.0 |
CVE-2025-6052 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6052
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-06-13 16:15 修改: 2025-08-20 17:27
|
| gir1.2-glib-2.0 |
CVE-2025-7039 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Buffer Under-read on GLib through glib/gfileutils.c via get_tmp_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7039
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-03 02:15 修改: 2025-09-04 15:36
|
| libsframe1 |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| libsframe1 |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| binutils-x86-64-linux-gnu |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| libglib2.0-bin |
CVE-2025-3360 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15
|
| libglib2.0-bin |
CVE-2025-6052 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6052
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-06-13 16:15 修改: 2025-08-20 17:27
|
| libglib2.0-bin |
CVE-2025-7039 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Buffer Under-read on GLib through glib/gfileutils.c via get_tmp_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7039
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-03 02:15 修改: 2025-09-04 15:36
|
| keyboxd |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| binutils-x86-64-linux-gnu |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| curl |
CVE-2025-0167 |
低危 |
8.5.0-2ubuntu10.6 |
|
When asked to use a `.netrc` file for credentials **and** to follow HT ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-0167
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-02-05 10:15 修改: 2025-07-30 19:41
|
| libglib2.0-data |
CVE-2025-3360 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-3360
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-04-07 13:15 修改: 2025-04-14 12:15
|
| libglib2.0-data |
CVE-2025-6052 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6052
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-06-13 16:15 修改: 2025-08-20 17:27
|
| libglib2.0-data |
CVE-2025-7039 |
低危 |
2.80.0-6ubuntu3.5 |
2.80.0-6ubuntu3.6 |
glib: Buffer Under-read on GLib through glib/gfileutils.c via get_tmp_file()
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-7039
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-03 02:15 修改: 2025-09-04 15:36
|
| curl |
CVE-2025-10148 |
低危 |
8.5.0-2ubuntu10.6 |
|
curl: predictable WebSocket mask
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-10148
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:55
|
| gnupg |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| curl |
CVE-2025-14524 |
低危 |
8.5.0-2ubuntu10.6 |
|
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14524
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:53
|
| libctf-nobfd0 |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| libctf-nobfd0 |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| curl |
CVE-2025-14819 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing TLS related transfers with reused easy or multi handles and ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-14819
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:51
|
| gnupg-utils |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| linux-libc-dev |
CVE-2017-0537 |
低危 |
6.8.0-79.79 |
|
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-0537
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-03-08 01:59 修改: 2025-04-20 01:37
|
| linux-libc-dev |
CVE-2017-13165 |
低危 |
6.8.0-79.79 |
|
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13165
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-12-06 14:29 修改: 2025-04-20 01:37
|
| linux-libc-dev |
CVE-2017-13693 |
低危 |
6.8.0-79.79 |
|
kernel: ACPI operand cache leak in dsutils.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13693
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-25 08:29 修改: 2025-04-20 01:37
|
| linux-libc-dev |
CVE-2018-1121 |
低危 |
6.8.0-79.79 |
|
procps: process hiding through race condition enumerating /proc
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-1121
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2018-06-13 20:29 修改: 2024-11-21 03:59
|
| linux-libc-dev |
CVE-2018-12928 |
低危 |
6.8.0-79.79 |
|
kernel: NULL pointer dereference in hfs_ext_read_extent in hfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12928
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2018-06-28 14:29 修改: 2024-11-21 03:46
|
| linux-libc-dev |
CVE-2018-12929 |
低危 |
6.8.0-79.79 |
|
kernel: use-after-free in ntfs_read_locked_inode in the ntfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12929
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2018-06-28 14:29 修改: 2024-11-21 03:46
|
| linux-libc-dev |
CVE-2018-12930 |
低危 |
6.8.0-79.79 |
|
kernel: stack-based out-of-bounds write in ntfs_end_buffer_async_read in the ntfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12930
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2018-06-28 14:29 修改: 2024-11-21 03:46
|
| linux-libc-dev |
CVE-2018-12931 |
低危 |
6.8.0-79.79 |
|
kernel: stack-based out-of-bounds write in ntfs_attr_find in the ntfs.ko
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-12931
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2018-06-28 14:29 修改: 2024-11-21 03:46
|
| linux-libc-dev |
CVE-2019-14899 |
低危 |
6.8.0-79.79 |
|
VPN: an attacker can inject data into the TCP stream which allows a hijack of active connections inside the VPN tunnel
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-14899
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2019-12-11 15:15 修改: 2024-11-21 04:27
|
| linux-libc-dev |
CVE-2019-15213 |
低危 |
6.8.0-79.79 |
|
kernel: use-after-free caused by malicious USB device in drivers/media/usb/dvb-usb/dvb-usb-init.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-15213
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2019-08-19 22:15 修改: 2024-11-21 04:28
|
| linux-libc-dev |
CVE-2019-19378 |
低危 |
6.8.0-79.79 |
|
kernel: out-of-bounds write in index_rbio_pages in fs/btrfs/raid56.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19378
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2019-11-29 17:15 修改: 2024-11-21 04:34
|
| linux-libc-dev |
CVE-2019-19814 |
低危 |
6.8.0-79.79 |
|
kernel: out-of-bounds write in __remove_dirty_segment in fs/f2fs/segment.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-19814
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2019-12-17 06:15 修改: 2024-11-21 04:35
|
| linux-libc-dev |
CVE-2019-20426 |
低危 |
6.8.0-79.79 |
|
漏洞详情: https://avd.aquasec.com/nvd/cve-2019-20426
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2020-01-27 05:15 修改: 2024-11-21 04:38
|
| linux-libc-dev |
CVE-2020-14304 |
低危 |
6.8.0-79.79 |
|
kernel: ethtool when reading eeprom of device could lead to memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-14304
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2020-09-15 20:15 修改: 2024-11-21 05:02
|
| linux-libc-dev |
CVE-2020-35501 |
低危 |
6.8.0-79.79 |
|
kernel: audit not logging access to syscall open_by_handle_at for users with CAP_DAC_READ_SEARCH capability
漏洞详情: https://avd.aquasec.com/nvd/cve-2020-35501
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-03-30 16:15 修改: 2024-11-21 05:27
|
| linux-libc-dev |
CVE-2021-26934 |
低危 |
6.8.0-79.79 |
|
An issue was discovered in the Linux kernel 4.18 through 5.10.16, as u ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-26934
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2021-02-17 02:15 修改: 2024-11-21 05:57
|
| linux-libc-dev |
CVE-2022-41848 |
低危 |
6.8.0-79.79 |
|
kernel: Race condition between mgslpc_ioctl and mgslpc_detach
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-41848
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-09-30 06:15 修改: 2025-05-20 20:15
|
| linux-libc-dev |
CVE-2022-44034 |
低危 |
6.8.0-79.79 |
|
Kernel: A use-after-free due to race between scr24x_open() and scr24x_remove()
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-44034
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-10-30 01:15 修改: 2024-11-21 07:27
|
| linux-libc-dev |
CVE-2022-45885 |
低危 |
6.8.0-79.79 |
|
kernel: use-after-free due to race condition occurring in dvb_frontend.c
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-45885
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2022-11-25 04:15 修改: 2025-04-29 14:15
|
| linux-libc-dev |
CVE-2023-33053 |
低危 |
6.8.0-79.79 |
|
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-33053
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-12-05 03:15 修改: 2025-08-11 15:06
|
| linux-libc-dev |
CVE-2023-4010 |
低危 |
6.8.0-79.79 |
|
kernel: usb: hcd: malformed USB descriptor leads to infinite loop in usb_giveback_urb()
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-4010
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-07-31 17:15 修改: 2024-11-21 08:34
|
| linux-libc-dev |
CVE-2023-6238 |
低危 |
6.8.0-79.79 |
|
kernel: nvme: memory corruption via unprivileged user passthrough
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-6238
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2023-11-21 21:15 修改: 2024-11-21 08:43
|
| linux-libc-dev |
CVE-2024-0564 |
低危 |
6.8.0-79.79 |
|
kernel: max page sharing of Kernel Samepage Merging (KSM) may cause memory deduplication
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-0564
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-01-30 15:15 修改: 2024-11-25 09:15
|
| linux-libc-dev |
CVE-2024-50217 |
低危 |
6.8.0-79.79 |
|
kernel: btrfs: fix use-after-free of block device file in __btrfs_free_extra_devids()
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-50217
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2024-11-09 11:15 修改: 2025-04-11 01:15
|
| login |
CVE-2024-56433 |
低危 |
1:4.13+dfsg1-4ubuntu3.2 |
|
shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2024-12-26 09:15 修改: 2024-12-26 09:15
|
| passwd |
CVE-2024-56433 |
低危 |
1:4.13+dfsg1-4ubuntu3.2 |
|
shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise
漏洞详情: https://avd.aquasec.com/nvd/cve-2024-56433
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2024-12-26 09:15 修改: 2024-12-26 09:15
|
| patch |
CVE-2018-6952 |
低危 |
2.7.6-7build3 |
|
patch: Double free of memory in pch.c:another_hunk() causes a crash
漏洞详情: https://avd.aquasec.com/nvd/cve-2018-6952
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2018-02-13 19:29 修改: 2024-11-21 04:11
|
| patch |
CVE-2021-45261 |
低危 |
2.7.6-7build3 |
|
patch: Invalid Pointer via another_hunk function
漏洞详情: https://avd.aquasec.com/nvd/cve-2021-45261
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2021-12-22 18:15 修改: 2024-11-21 06:32
|
| polkitd |
CVE-2016-2568 |
低危 |
124-2ubuntu1.24.04.2 |
|
polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2568
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2017-02-13 18:59 修改: 2025-04-20 01:37
|
| curl |
CVE-2025-15079 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing SSH-based transfers using either SCP or SFTP, and setting t ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15079
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:50
|
| curl |
CVE-2025-15224 |
低危 |
8.5.0-2ubuntu10.6 |
|
When doing SSH-based transfers using either SCP or SFTP, and asked to ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-15224
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2026-01-08 10:15 修改: 2026-01-20 14:47
|
| gnupg2 |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| curl |
CVE-2025-9086 |
低危 |
8.5.0-2ubuntu10.6 |
|
curl: libcurl: Curl out of bounds read for cookie path
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-9086
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2025-09-12 06:15 修改: 2026-01-20 14:58
|
| coreutils |
CVE-2016-2781 |
低危 |
9.4-3ubuntu6 |
|
coreutils: Non-privileged session can escape to the parent session in chroot
漏洞详情: https://avd.aquasec.com/nvd/cve-2016-2781
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2017-02-07 15:59 修改: 2025-06-09 16:15
|
| gpg |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| binutils |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| dirmngr |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| gpg-agent |
CVE-2022-3219 |
低危 |
2.4.4-2ubuntu17.3 |
|
gnupg: denial of service issue (resource consumption) using compressed packets
漏洞详情: https://avd.aquasec.com/nvd/cve-2022-3219
镜像层: sha256:66d3d8a459d5610ab77c9e2541f7de7c977629fc89134ce000e29922c8326924
发布日期: 2023-02-23 20:15 修改: 2025-03-12 21:15
|
| dpkg |
CVE-2025-6297 |
低危 |
1.22.6ubuntu6.1 |
1.22.6ubuntu6.5 |
It was discovered that dpkg-deb does not properly sanitize directory p ...
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-6297
镜像层: sha256:9d592720ced4a7a4ddf16adef8a126e4c8c49f22114de769343320b37674321e
发布日期: 2025-07-01 17:15 修改: 2025-08-19 17:50
|
| libgprofng0 |
CVE-2017-13716 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: Memory leak with the C++ symbol demangler routine in libiberty
漏洞详情: https://avd.aquasec.com/nvd/cve-2017-13716
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2017-08-28 21:29 修改: 2025-04-20 01:37
|
| libgprofng0 |
CVE-2025-1152 |
低危 |
2.42-4ubuntu2.5 |
|
binutils: GNU Binutils ld xstrdup.c xstrdup memory leak
漏洞详情: https://avd.aquasec.com/nvd/cve-2025-1152
镜像层: sha256:16adf212c88e344ae0510016f125c8040cdb7a369a9f0ab2ad0f41320e8555f9
发布日期: 2025-02-10 18:15 修改: 2025-03-03 17:32
|
| x11-common |
CVE-2023-5574 |
低危 |
1:7.7+23ubuntu3 |
|
xorg-x11-server: Use-after-free bug in DamageDestroy
漏洞详情: https://avd.aquasec.com/nvd/cve-2023-5574
镜像层: sha256:83a59962e0f598fad8864156ea66c7b67535ff5d64e63a80c3f73a165282fb43
发布日期: 2023-10-25 20:15 修改: 2024-11-21 08:42
|