搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-38399 | SCSI:目标:修复null指针在core_scsi3_decode_spec_i_port()(cve-2025-38399)中 | 2025-07-25 | ||
| AVD-2025-38375 | virtio-net:确保接收长度不超过分配的尺寸(CVE-2025-38375) | 2025-07-25 | ||
| AVD-2025-38377 | 玫瑰:修复Rose_rt_device_down()(CVE-2025-38377)中的悬挂式邻居指针 | 2025-07-25 | ||
| AVD-2025-38362 | drm/amd/display:添加null指针检查get_first_active_display()(CVE-2025-38362) | 2025-07-25 | ||
| AVD-2025-38363 | DRM/TEGRA:修复可能的无效指针解除(CVE-2025-38363) | 2025-07-25 | ||
| AVD-2025-38354 | DRM/MSM/GPU:在启动期间立即限制GPU时修复崩溃(CVE-2025-38354) | 2025-07-25 | ||
| AVD-2025-38385 | 网络:USB:LAN78XX:在__NETIF_NAPI_DEL_LOCKED中修复警告(CVE-2025-38385) | 2025-07-25 | ||
| AVD-2025-38401 | MTK-SD:防止DMA地图故障发生的内存损坏(CVE-2025-38401) | 2025-07-25 | ||
| AVD-2025-38371 | DRM/V3D:重置GPU之前禁用中断(CVE-2025-38371) | 2025-07-25 | ||
| AVD-2025-38400 | NFS:清理/proc/net/rpc/nfs nfs_fs_proc_net_init()失败。 (CVE-2025-38400) | 2025-07-25 | ||
| AVD-2025-38350 | Linux kernel net/sched通知释放后使用漏洞(CVE-2025-38350) | 2025-07-19 | ||
| AVD-2025-38326 | AOE:aoedev_downdev()(CVE-2025-38326)中的清洁设备RQ_LIST | 2025-07-10 | ||
| AVD-2025-38324 | MPLS:在mpls_route_input_rcu()中使用rcu_dereference_rtnl()。 (CVE-2025-38324) | 2025-07-10 | ||
| AVD-2025-38335 | 输入:gpio-keys-用preempt_rt(CVE-2025-38335)修复睡眠 | 2025-07-10 | ||
| AVD-2025-38332 | SCSI:LPFC:使用memcpy()用于BIOS版本(CVE-2025-38332) | 2025-07-10 | ||
| AVD-2025-38322 | perf/x86/intel:修复ICL_UPDATE_TOPDOWN_EVENT()(CVE-2025-38322)中的崩溃 | 2025-07-10 | ||
| AVD-2025-38328 | JFFS2:检查JFFS2_PREALLOC_RAW_NODE_REFS()会导致其他地方(CVE-2025-38328) | 2025-07-10 | ||
| AVD-2025-38337 | JBD2:jbd2_journal_dirty_metadata(CVE-2025-38337)中的data-race和null-ptr-deref | 2025-07-10 | ||
| AVD-2025-38342 | 软件节点:在software_node_get_reference_args()(CVE-2025-38342)中更正OOB检查 | 2025-07-10 | ||
| AVD-2025-38346 | ftrace:在ftrace禁用后查找kallsym时修复UAF(CVE-2025-38346) | 2025-07-10 | ||
| AVD-2025-38336 | ATA:PATA_VIA:VT6415/VT6330(CVE-2025-38336)上ATAPI设备的强制PIO | 2025-07-10 | ||
| AVD-2025-38344 | ACPICA:修复ACPI Parse和Parseext缓存泄漏(CVE-2025-38344) | 2025-07-10 | ||
| AVD-2025-38347 | F2FS:修复理智的INO和XNID(CVE-2025-38347) | 2025-07-10 | ||
| AVD-2025-38345 | ACPICA:修复DSWSTATE.C(CVE-2025-38345)的ACPI操作数缓存泄漏 | 2025-07-10 | ||
| AVD-2025-38323 | 网络:ATM:添加LEC_MUTEX(CVE-2025-38323) | 2025-07-10 | ||
| AVD-2025-38320 | ARM64/ptrace:修复堆叠式绑定在regs_get_kernel_stack_nth()(CVE-2025-38320)中 | 2025-07-10 | ||
| AVD-2025-38331 | 网络:以太网:Cortina:在所有TCP上使用脚趾/TSO(CVE-2025-38331) | 2025-07-10 | ||
| AVD-2025-38334 | X86/SGX:防止尝试回收有毒页面(CVE-2025-38334) | 2025-07-10 | ||
| AVD-2025-38348 | wifi:p54:在p54_rx_eeprom_readback()(CVE-2025-38348)中预防缓冲区流动 | 2025-07-10 | ||
| AVD-2025-38319 | DRM/AMD/pp:修复Atomctrl_initialize中的潜在零指针删除率 | 2025-07-10 |