搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38158 | HISI_ACC_VFIO_PCI:修复XQE DMA地址错误(CVE-2025-38158) | 2025-07-03 | ||
| AVD-2025-38107 | NET_SCHED:ETS:在ETS_QDISC_CHANGE()(CVE-2025-38107)中修复比赛 | 2025-07-03 | ||
| AVD-2025-38148 | NET:PHY:MSCC:使用一步时间戳时修复内存泄漏(CVE-2025-38148) | 2025-07-03 | ||
| AVD-2025-38112 | NET:修复SK_IS_REDABLE()(CVE-2025-38112)中的TOCTOU问题 | 2025-07-03 | ||
| AVD-2025-38163 | F2FS:修复理智检查SBI-> total_valid_block_count(CVE-2025-38163) | 2025-07-03 | ||
| AVD-2025-38166 | BPF:用sockmap(CVE-2025-38166)解决KTLS恐慌 | 2025-07-03 | ||
| AVD-2025-38160 | CLK:BCM:RPI:添加null检查raspberrypi_clk_register()(CVE-2025-38160) | 2025-07-03 | ||
| AVD-2025-38119 | SCSI:核心:UFS:修复挂在错误处理程序中(CVE-2025-38119) | 2025-07-03 | ||
| AVD-2025-38159 | WiFi:RTW88:修复“ Para”缓冲区大小,以避免读取范围(CVE-2025-38159) | 2025-07-03 | ||
| AVD-2025-38103 | HID:USBHID:在USBHID_PARSE()(CVE-2025-38103)中消除反复出现的故障错误 | 2025-07-03 | ||
| AVD-2025-38118 | 蓝牙:MGMT:修复MGMT_REMOVE_ADV_MONITOR_COMPLETE上的UAF(CVE-2025-38118) | 2025-07-03 | ||
| AVD-2025-38151 | RDMA/CMA:CMA_NETEVENT_CALLBACK未能Queue_work(CVE-2025-38151)时修复挂起 | 2025-07-03 | ||
| AVD-2025-38111 | NET/MDIOBUS:修复潜在的外部读/写入访问(CVE-2025-38111) | 2025-07-03 | ||
| AVD-2025-38095 | DMA-BUF:更新num_fences之前插入内存屏障(CVE-2025-38095) | 2025-07-03 | ||
| AVD-2025-38094 | NET:CADENCE:MACB:修复MACB_HALT_TX中可能的僵局。 (CVE-2025-38094) | 2025-07-03 | ||
| AVD-2025-38088 | PowerPC/PowerNV/Memtrace:修复MEMTRACE MMAP中的界限问题(CVE-2025-38088) | 2025-06-30 | ||
| AVD-2025-38090 | 驱动程序/rapidio/rio_cm.c:防止可能的堆覆盖(CVE-2025-38090) | 2025-06-30 | ||
| AVD-2025-38084 | mm/hugetlb:在VMA拆分期间的解开页面表,而不是在(CVE-2025-38084)之前 | 2025-06-28 | ||
| AVD-2025-38085 | mm/hugetlb:修复bumet_pmd_unshare()vs vs gup-fast Race(CVE-2025-38085) | 2025-06-28 | ||
| AVD-2025-38086 | 网络:CH9200:修复MII_NWAY_RESTART期间的非初始化访问(CVE-2025-38086) | 2025-06-28 | ||
| AVD-2025-38083 | net_sched:prio:修复prio_tune()(CVE-2025-38083)中的比赛 | 2025-06-20 | ||
| AVD-2025-38068 | 加密:LZO-修复压缩缓冲液超支(CVE-2025-38068) | 2025-06-18 | ||
| AVD-2025-38065 | Orangefs:请勿截断文件大小(CVE-2025-38065) | 2025-06-18 | ||
| AVD-2025-38079 | 加密:algif_hash- hash_accept(CVE-2025-38079)中的双重修复双免费修复 | 2025-06-18 | ||
| AVD-2025-38051 | SMB:客户端:CIFS_FILL_DIRENT中的不使用时使用(CVE-2025-38051) | 2025-06-18 | ||
| AVD-2025-38027 | 调节器:Max20086:修复无效的内存访问(CVE-2025-38027) | 2025-06-18 | ||
| AVD-2025-38075 | SCSI:目标:ISCSI:修复已删除连接(CVE-2025-38075)上的超时 | 2025-06-18 | ||
| AVD-2025-38043 | 固件:ARM_FFA:为FFA设备设置DMA_MASK(CVE-2025-38043) | 2025-06-18 | ||
| AVD-2025-38062 | genirq/msi:将iommu iova直接存储在msi_desc中,而不是iommu_cookie(CVE-2025-38062) | 2025-06-18 | ||
| AVD-2025-38040 | 序列:MCTRL_GPIO:将Disable_ms分为同步和NO_SYNC API(CVE-2025-38040) | 2025-06-18 |