搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38020 | NET/MLX5E:禁用MACSEC卸载用于上行链路代表配置文件(CVE-2025-38020) | 2025-06-18 | ||
| AVD-2025-38034 | BTRFS:在BTRFS__PRELIM_REF(CVE-2025-38034)中更正PRELIM_REF参数的顺序 | 2025-06-18 | ||
| AVD-2025-38018 | NET/TLS:Alloc_page失败时修复内核恐慌(CVE-2025-38018) | 2025-06-18 | ||
| AVD-2025-38044 | 媒体:CX231XX:设置417(CVE-2025-38044)的设置Device_caps | 2025-06-18 | ||
| AVD-2025-38004 | CAN:BCM:为BCM_OP运行时更新(CVE-2025-38004)添加锁定 | 2025-06-08 | ||
| AVD-2025-38003 | CAN:BCM:添加缺少的RCU阅读Procfs Content(CVE-2025-38003) | 2025-06-08 | ||
| AVD-2025-38001 | net_sched:HFSC:地址重新入口辅助式将类添加到Eltree两次(CVE-2025-38001) | 2025-06-06 | ||
| AVD-2025-38000 | SCH_HFSC:在HFSC_ENQUEUE()中使用PEEK(CVE-2025-38000)时修复QLEN会计错误 | 2025-06-06 | ||
| AVD-2025-48432 | Django 日志注入漏洞(CVE-2025-48432) | 2025-06-05 | ||
| AVD-2025-49113 | Roundcube Webmail upload.php _from 反序列化代码执行漏洞(CVE-2025-49113) | 2025-06-02 | ||
| AVD-2025-37994 | USB:Typec:UCSI:DisplayPort:FIX NULL指针访问(CVE-2025-37994) | 2025-05-29 | ||
| AVD-2025-37997 | NetFilter:IPSET:修复区域锁定在哈希类型中(CVE-2025-37997) | 2025-05-29 | ||
| AVD-2025-37995 | 模块:确保Kobject_put()对于模块类型Kobjects(CVE-2025-37995)安全 | 2025-05-29 | ||
| AVD-2025-37998 | OpenVswitch:fix upput_userspace()(CVE-2025-37998)中的不安全属性解析 | 2025-05-29 | ||
| AVD-2025-37992 | net_sched:flush gso_skb列表 - > change()(CVE-2025-37992) | 2025-05-26 | ||
| AVD-2025-3887 | GSTREAMER H265编解码器解析基于堆栈的缓冲区溢出远程代码执行漏洞(CVE-2025-3887) | 2025-05-22 | ||
| AVD-2025-37989 | 网络:PHY:LED:修复内存泄漏(CVE-2025-37989) | 2025-05-21 | ||
| AVD-2025-37991 | Parisc:修复双SIGFPE崩溃(CVE-2025-37991) | 2025-05-21 | ||
| AVD-2025-37983 | QIBFS:FIX _ANOTHOR_泄漏(CVE-2025-37983) | 2025-05-21 | ||
| AVD-2025-37985 | USB:WDM:WDM_OPEN和WDM_WWAN_PORT_STOP之间的近距离比赛(CVE-2025-37985) | 2025-05-21 | ||
| AVD-2025-37990 | WiFi:BRCM80211:FMAC:添加BRCMF_USB_DL_WRITEIMAGE()的添加错误处理(CVE-2025-37990) | 2025-05-21 | ||
| AVD-2025-37970 | IIO:IMU:ST_LSM6DSX:修复ST_LSM6DSX_READ_FIFO中的可能锁定(CVE-2025-37970) | 2025-05-21 | ||
| AVD-2025-37972 | 输入:mtk-pmic-keys-修复可能的空指针删除(CVE-2025-37972) | 2025-05-21 | ||
| AVD-2025-37967 | USB:Typec:UCSI:DisplayPort:修复死锁(CVE-2025-37967) | 2025-05-21 | ||
| AVD-2025-37979 | ASOC:QCOM:修复SC7280 LAPS潜在缓冲溢出(CVE-2025-37979) | 2025-05-21 | ||
| AVD-2025-37982 | WiFi:WL1251:修复内存泄漏WL1251_TX_WORK(CVE-2025-37982) | 2025-05-21 | ||
| AVD-2025-37969 | IIO:IMU:ST_LSM6DSX:修复ST_LSM6DSX_READ_TAGGED_FIFO中的可能锁定(CVE-2025-37969) | 2025-05-21 | ||
| AVD-2025-37968 | IIO:LIGHT:OPT3001:由于并发旗输入(CVE-2025-37968),修复了僵局 | 2025-05-21 | ||
| AVD-2025-37930 | drm/nouveau:nouveau_fence_context_kill()(cve-2025-37930)中的warn_on fix warn_on | 2025-05-21 | ||
| AVD-2025-37949 | Xenbus:使用KREF跟踪REQ寿命(CVE-2025-37949) | 2025-05-21 |