搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38193 | net_sched:sch_sfq:拒绝无效的扰动周期(CVE-2025-38193) | 2025-07-04 | ||
| AVD-2025-38218 | F2FS:修复以进行理智检查SIT_BITMAP_SIZE(CVE-2025-38218) | 2025-07-04 | ||
| AVD-2025-38206 | exfat:delayed_free中的双免费修复(CVE-2025-38206) | 2025-07-04 | ||
| AVD-2025-38211 | RDMA/IWCM:CM_ID破坏后修复工作对象(CVE-2025-38211)之后 | 2025-07-04 | ||
| AVD-2025-38215 | FBDEV:修复DO_REGISTER_FRAMEBUFFER,以防止fb_videomode_to_var中的null-ptr-deref(CVE-2025-38215) | 2025-07-04 | ||
| AVD-2025-38219 | F2FS:防止因损坏图像的负I_NLINK引起的内核警告(CVE-2025-38219) | 2025-07-04 | ||
| AVD-2025-38214 | FBDEV:修复fb_set_var以防止null-ptr-deref在fb_videomode_to_var中(CVE-2025-38214) | 2025-07-04 | ||
| AVD-2025-38198 | FBCON:确保未在未注册的控制台(CVE-2025-38198)上设置模型家 | 2025-07-04 | ||
| AVD-2025-38212 | IPC:修复使用RCU(CVE-2025-38212)保护IPC查找的修复程序 | 2025-07-04 | ||
| AVD-2025-38222 | EXT4:内联:FIX LEN OVERFLOW中的Ext4_prepare_inline_data(CVE-2025-38222) | 2025-07-04 | ||
| AVD-2025-38177 | SCH_HFSC:MAKE HFSC_QLEN_NOTIFY()IDEMPOTENT(CVE-2025-38177) | 2025-07-04 | ||
| AVD-2025-38174 | Thunderbolt:请勿将配置请求(CVE-2025-38174)倍增 | 2025-07-04 | ||
| AVD-2025-38151 | RDMA/CMA:CMA_NETEVENT_CALLBACK未能Queue_work(CVE-2025-38151)时修复挂起 | 2025-07-03 | ||
| AVD-2025-38135 | 序列:修复MLB_USIO_PROBE()(CVE-2025-38135)中的潜在null-ptr-deref | 2025-07-03 | ||
| AVD-2025-38122 | GVE:在TX DQO(CVE-2025-38122)中,添加缺失的null检查GVE_ALLOC_PENGER_PACKET() | 2025-07-03 | ||
| AVD-2025-38145 | SOC:ASPEED:添加null检查ASPEED_LPC_ENABLE_SNOOP()(CVE-2025-38145) | 2025-07-03 | ||
| AVD-2025-38138 | DMAENGINE:TI:在UDMA_PROBE()(CVE-2025-38138)中添加null检查 | 2025-07-03 | ||
| AVD-2025-38147 | 卡利普斯:请勿致电Calipso函数AF_INET SK。 (CVE-2025-38147) | 2025-07-03 | ||
| AVD-2025-38112 | NET:修复SK_IS_REDABLE()(CVE-2025-38112)中的TOCTOU问题 | 2025-07-03 | ||
| AVD-2025-38166 | BPF:用sockmap(CVE-2025-38166)解决KTLS恐慌 | 2025-07-03 | ||
| AVD-2025-38126 | NET:STMMAC:在配置时间戳之前,请确保PTP_RATE不是0(CVE-2025-38126) | 2025-07-03 | ||
| AVD-2025-38146 | 网络:OpenVswitch:修复MPLS Parse的死循环(CVE-2025-38146) | 2025-07-03 | ||
| AVD-2025-38113 | ACPI:CPPC:使用NOSMP时修复NULL指针删除(CVE-2025-38113) | 2025-07-03 | ||
| AVD-2025-38124 | NET:从Frag_list拉动后修复UDP GSO SKB_SEGEMS(CVE-2025-38124) | 2025-07-03 | ||
| AVD-2025-38131 | Coresight:在启用配置(CVE-2025-38131)时,请防止停用活动config | 2025-07-03 | ||
| AVD-2025-38143 | 背光:PM8941:添加null检查wled_configure()(CVE-2025-38143) | 2025-07-03 | ||
| AVD-2025-38165 | BPF,Sockmap:调用SKB_Linearize时解决恐慌(CVE-2025-38165) | 2025-07-03 | ||
| AVD-2025-38148 | NET:PHY:MSCC:使用一步时间戳时修复内存泄漏(CVE-2025-38148) | 2025-07-03 | ||
| AVD-2025-38120 | NetFilter:NF_SET_PIPAPO_AVX2:修复初始地图填充(CVE-2025-38120) | 2025-07-03 | ||
| AVD-2025-38142 | HWMON :( ASUS-EC传感器)在Read_string()(CVE-2025-38142)中检查传感器索引 | 2025-07-03 |