搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38018 | NET/TLS:Alloc_page失败时修复内核恐慌(CVE-2025-38018) | 2025-06-18 | ||
| AVD-2025-38074 | vhost-scsi:protect vq-> log_used用vq-> mutex(CVE-2025-38074) | 2025-06-18 | ||
| AVD-2025-38072 | libnvdimm/labels:nd_label_data_init()(CVE-2025-38072)中的修复分隔错误 | 2025-06-18 | ||
| AVD-2025-38031 | PADATA:请勿在Reorder_work(CVE-2025-38031)中泄漏重新数 | 2025-06-18 | ||
| AVD-2025-38007 | HID:uclogic:添加null检查uclogic_input_configured()(CVE-2025-38007) | 2025-06-18 | ||
| AVD-2025-38071 | x86/mm:从memblock_phys_alloc_range()(CVE-2025-38071)检查返回值 | 2025-06-18 | ||
| AVD-2025-38052 | net/tipc:修复板条无后用来阅读tipc_aead_encrypt_done(CVE-2025-38052) | 2025-06-18 | ||
| AVD-2025-38075 | SCSI:目标:ISCSI:修复已删除连接(CVE-2025-38075)上的超时 | 2025-06-18 | ||
| AVD-2025-38063 | DM:修复由REQ_PREFLUSH引起的无条件IO油门(CVE-2025-38063) | 2025-06-18 | ||
| AVD-2025-38009 | WiFi:MT76:驾驶员拆除的NAPI(CVE-2025-38009) | 2025-06-18 | ||
| AVD-2025-38005 | DMAENGINE:TI:K3-UDMA:添加缺失的锁定(CVE-2025-38005) | 2025-06-18 | ||
| AVD-2025-38068 | 加密:LZO-修复压缩缓冲液超支(CVE-2025-38068) | 2025-06-18 | ||
| AVD-2025-38043 | 固件:ARM_FFA:为FFA设备设置DMA_MASK(CVE-2025-38043) | 2025-06-18 | ||
| AVD-2025-38035 | NVMET-TCP:不要恢复NULL SK_STATE_CHANGE(CVE-2025-38035) | 2025-06-18 | ||
| AVD-2025-38065 | Orangefs:请勿截断文件大小(CVE-2025-38065) | 2025-06-18 | ||
| AVD-2025-38078 | ALSA:PCM:修复PCM OSS层的缓冲区访问赛(CVE-2025-38078) | 2025-06-18 | ||
| AVD-2025-38020 | NET/MLX5E:禁用MACSEC卸载用于上行链路代表配置文件(CVE-2025-38020) | 2025-06-18 | ||
| AVD-2025-38040 | 序列:MCTRL_GPIO:将Disable_ms分为同步和NO_SYNC API(CVE-2025-38040) | 2025-06-18 | ||
| AVD-2025-38034 | BTRFS:在BTRFS__PRELIM_REF(CVE-2025-38034)中更正PRELIM_REF参数的顺序 | 2025-06-18 | ||
| AVD-2025-38024 | rdma/rxe:修复板条 - 使用后免费阅读rxe_queue_cleanup bug(CVE-2025-38024) | 2025-06-18 | ||
| AVD-2025-38079 | 加密:algif_hash- hash_accept(CVE-2025-38079)中的双重修复双免费修复 | 2025-06-18 | ||
| AVD-2025-38015 | DMAENGINE:IDXD:修复IDXD_ALLOC的错误处理路径中的内存泄漏(CVE-2025-38015) | 2025-06-18 | ||
| AVD-2025-38037 | VXLAN:注释FDB数据竞赛(CVE-2025-38037) | 2025-06-18 | ||
| AVD-2025-38051 | SMB:客户端:CIFS_FILL_DIRENT中的不使用时使用(CVE-2025-38051) | 2025-06-18 | ||
| AVD-2025-38067 | RSEQ:RSEQ_CS为非零(CVE-2025-38067)时,请修复注册中的segfault | 2025-06-18 | ||
| AVD-2025-38048 | virtio_ring:通过标记event_ trigger作为kcsan的racy(CVE-2025-38048)来修复数据竞赛 | 2025-06-18 | ||
| AVD-2025-38044 | 媒体:CX231XX:设置417(CVE-2025-38044)的设置Device_caps | 2025-06-18 | ||
| AVD-2025-38061 | NET:PKTGEN:PKTGEN_THREAD_WRITE()(CVE-2025-38061)中给定缓冲区的用户访问权限之外的修复访问 | 2025-06-18 | ||
| AVD-2025-38058 | __legitimize_mnt():检查MNT_SYNC_UMOUNT应在Mount_lock(CVE-2025-38058)下 | 2025-06-18 | ||
| AVD-2025-38077 | 平台/x86:dell-wmi-sysman:避免在current_password_store()(CVE-2025-38077)中的缓冲区溢出 | 2025-06-18 |