搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38236 | AF_UNIX:不要连续消耗的OOB SKB。 (CVE-2025-38236) | 2025-07-08 | ||
| AVD-2025-38237 | 媒体:平台:exynos4-is:添加硬件同步等待到fimc_is_hw_change_mode()(CVE-2025-38237) | 2025-07-08 | ||
| AVD-2025-38203 | JFS:JFS_IOC_TRIM(CVE-2025-38203)中的null-ptr-deref | 2025-07-04 | ||
| AVD-2025-38219 | F2FS:防止因损坏图像的负I_NLINK引起的内核警告(CVE-2025-38219) | 2025-07-04 | ||
| AVD-2025-38198 | FBCON:确保未在未注册的控制台(CVE-2025-38198)上设置模型家 | 2025-07-04 | ||
| AVD-2025-38197 | 平台/x86:dell_rbu:修复列表用法(CVE-2025-38197) | 2025-07-04 | ||
| AVD-2025-38200 | I40E:修复MMIO写入i40e_clear_hw中无效页面(CVE-2025-38200) | 2025-07-04 | ||
| AVD-2025-38191 | KSMBD:修复零件指针在destroy_previous_session(CVE-2025-38191)中 | 2025-07-04 | ||
| AVD-2025-38212 | IPC:修复使用RCU(CVE-2025-38212)保护IPC查找的修复程序 | 2025-07-04 | ||
| AVD-2025-38202 | BPF:在BPF_MAP_LOOKUP_PERCPU_ELEM()(CVE-2025-38202)中检查rcu_read_lock_trace_held() | 2025-07-04 | ||
| AVD-2025-38180 | 网络:ATM:FIX/PROC/NET/ATM/LEC处理(CVE-2025-38180) | 2025-07-04 | ||
| AVD-2025-38181 | Calipso:在Calipso_req_ {set,del} attry()中修复null-ptr-deref。 (CVE-2025-38181) | 2025-07-04 | ||
| AVD-2025-38227 | 媒体:VIDTV:终止初始化失败的后续过程(CVE-2025-38227) | 2025-07-04 | ||
| AVD-2025-38183 | NET:LAN743X:修复潜在的界外写作在LAN743X_PTP_IO_EVENT_CLOCK_GET()(CVE-2025-38183)中 | 2025-07-04 | ||
| AVD-2025-38214 | FBDEV:修复fb_set_var以防止null-ptr-deref在fb_videomode_to_var中(CVE-2025-38214) | 2025-07-04 | ||
| AVD-2025-38190 | ATM:REVERT ATM_ACCOUNT_TX()如果COPY_FROM_ITER_FULL()失败。 (CVE-2025-38190) | 2025-07-04 | ||
| AVD-2025-38222 | EXT4:内联:FIX LEN OVERFLOW中的Ext4_prepare_inline_data(CVE-2025-38222) | 2025-07-04 | ||
| AVD-2025-38206 | exfat:delayed_free中的双免费修复(CVE-2025-38206) | 2025-07-04 | ||
| AVD-2025-38230 | JFS:DBMount()中验证AG参数以防止崩溃(CVE-2025-38230) | 2025-07-04 | ||
| AVD-2025-38215 | FBDEV:修复DO_REGISTER_FRAMEBUFFER,以防止fb_videomode_to_var中的null-ptr-deref(CVE-2025-38215) | 2025-07-04 | ||
| AVD-2025-38204 | JFS:修复阵列index-und-bounds在add_missing_indices中读取(CVE-2025-38204) | 2025-07-04 | ||
| AVD-2025-38231 | NFSD:在Laundromat_work之前初始化SSC,以防止null解释(CVE-2025-38231) | 2025-07-04 | ||
| AVD-2025-38184 | 提示:在获取以太网携带者的远程IP时修复Null-Ptr-Deref(CVE-2025-38184) | 2025-07-04 | ||
| AVD-2025-38211 | RDMA/IWCM:CM_ID破坏后修复工作对象(CVE-2025-38211)之后 | 2025-07-04 | ||
| AVD-2025-38225 | 媒体:IMX-JPEG:分配错误后清理(CVE-2025-38225) | 2025-07-04 | ||
| AVD-2025-38218 | F2FS:修复以进行理智检查SIT_BITMAP_SIZE(CVE-2025-38218) | 2025-07-04 | ||
| AVD-2025-38226 | 媒体:生动:更改组成的siize(CVE-2025-38226) | 2025-07-04 | ||
| AVD-2025-38185 | ATM:ATMTCP:ATMTCP_C_SEND()中的免费无效长度SKB。 (CVE-2025-38185) | 2025-07-04 | ||
| AVD-2025-38194 | JFFS2:在撰写摘要之前,请检查原始节点是否已预先分配(CVE-2025-38194) | 2025-07-04 | ||
| AVD-2025-38229 | 媒体:CXUSB:写入失败时不再判断RBUF(CVE-2025-38229) | 2025-07-04 |