搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38337 | JBD2:jbd2_journal_dirty_metadata(CVE-2025-38337)中的data-race和null-ptr-deref | 2025-07-10 | ||
| AVD-2025-38323 | 网络:ATM:添加LEC_MUTEX(CVE-2025-38323) | 2025-07-10 | ||
| AVD-2025-38332 | SCSI:LPFC:使用memcpy()用于BIOS版本(CVE-2025-38332) | 2025-07-10 | ||
| AVD-2025-38331 | 网络:以太网:Cortina:在所有TCP上使用脚趾/TSO(CVE-2025-38331) | 2025-07-10 | ||
| AVD-2025-38336 | ATA:PATA_VIA:VT6415/VT6330(CVE-2025-38336)上ATAPI设备的强制PIO | 2025-07-10 | ||
| AVD-2025-38347 | F2FS:修复理智的INO和XNID(CVE-2025-38347) | 2025-07-10 | ||
| AVD-2025-38334 | X86/SGX:防止尝试回收有毒页面(CVE-2025-38334) | 2025-07-10 | ||
| AVD-2025-38326 | AOE:aoedev_downdev()(CVE-2025-38326)中的清洁设备RQ_LIST | 2025-07-10 | ||
| AVD-2025-38320 | ARM64/ptrace:修复堆叠式绑定在regs_get_kernel_stack_nth()(CVE-2025-38320)中 | 2025-07-10 | ||
| AVD-2025-38346 | ftrace:在ftrace禁用后查找kallsym时修复UAF(CVE-2025-38346) | 2025-07-10 | ||
| AVD-2025-38345 | ACPICA:修复DSWSTATE.C(CVE-2025-38345)的ACPI操作数缓存泄漏 | 2025-07-10 | ||
| AVD-2025-38348 | wifi:p54:在p54_rx_eeprom_readback()(CVE-2025-38348)中预防缓冲区流动 | 2025-07-10 | ||
| AVD-2025-38328 | JFFS2:检查JFFS2_PREALLOC_RAW_NODE_REFS()会导致其他地方(CVE-2025-38328) | 2025-07-10 | ||
| AVD-2025-38344 | ACPICA:修复ACPI Parse和Parseext缓存泄漏(CVE-2025-38344) | 2025-07-10 | ||
| AVD-2025-38319 | DRM/AMD/pp:修复Atomctrl_initialize中的潜在零指针删除率 | 2025-07-10 | ||
| AVD-2025-38313 | 巴士:FSL-MC:MC_DEV上的双重修复(CVE-2025-38313) | 2025-07-10 | ||
| AVD-2025-38273 | 网络:TIPC:tipc_aead_encrypt(CVE-2025-38273)中的FIX重新计算警告 | 2025-07-10 | ||
| AVD-2025-38275 | PHY:QCOM-QMP-USB:修复Null vs IS_ERR()bug(CVE-2025-38275) | 2025-07-10 | ||
| AVD-2025-38286 | PINCTRL:AT91:修复可能的耗时访问(CVE-2025-38286) | 2025-07-10 | ||
| AVD-2025-38304 | 蓝牙:修复null指针deference on eir_get_service_data(CVE-2025-38304) | 2025-07-10 | ||
| AVD-2025-38298 | EDAC/SKX_COMMON:固定通用保护故障(CVE-2025-38298) | 2025-07-10 | ||
| AVD-2025-38300 | 加密:Sun8i-Ce-Cipher-固定错误处理中的错误处理(sun8i_ce_cipher_prepare()(CVE-2025-38300) | 2025-07-10 | ||
| AVD-2025-38280 | BPF:避免__BPF_PROG_RET0_WARN JIT失败时(CVE-2025-38280) | 2025-07-10 | ||
| AVD-2025-38277 | MTD:NAND:ECC-MXIX:修复使用非初始化变量RET(CVE-2025-38277) | 2025-07-10 | ||
| AVD-2025-38293 | wifi:ath11k:修复ar-> arvifs列表中的节点腐败(CVE-2025-38293) | 2025-07-10 | ||
| AVD-2025-38285 | BPF:fix warn()在get_bpf_raw_tp_regs(CVE-2025-38285)中 | 2025-07-10 | ||
| AVD-2025-38282 | kernfs:排水后卫的放松约束(CVE-2025-38282) | 2025-07-10 | ||
| AVD-2025-38310 | SEG6:NexThop地址的修复验证(CVE-2025-38310) | 2025-07-10 | ||
| AVD-2025-38305 | PTP:删除ptp-> n_vclocks检查ptp_vclock_in_use()(CVE-2025-38305)中的逻辑 | 2025-07-10 | ||
| AVD-2025-38312 | FBDEV:核心:fbcvt:避免在fb_cvt_hperiod()(CVE-2025-38312)中避免除以0 | 2025-07-10 |