搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-39766 | net/chance:make cake_enqueue返回net_xmit_cn过去的buffer_limit(CVE-2025-39766) | 2025-09-12 | ||
| AVD-2025-39756 | FS:防止文件描述符表分配超过INT_MAX(CVE-2025-39756) | 2025-09-12 | ||
| AVD-2025-39757 | ALSA:USB-audio:验证UAC3群集段描述符(CVE-2025-39757) | 2025-09-12 | ||
| AVD-2025-39759 | BTRFS:QGroup:修复配额禁用和配额扫描IOCTL之间的比赛(CVE-2025-39759) | 2025-09-12 | ||
| AVD-2025-39760 | USB:核心:配置:防止OOB在SS Endpoint Companion解析中读取(CVE-2025-39760) | 2025-09-12 | ||
| AVD-2025-39752 | ARM:Rockchip:修复内核在SMP初始化期间挂起(CVE-2025-39752) | 2025-09-12 | ||
| AVD-2025-39749 | rcu:protect-> defer_qs_iw_pending来自数据竞赛(CVE-2025-39749) | 2025-09-12 | ||
| AVD-2025-39743 | JFS:硬链路为0时截断好的Inode页面(CVE-2025-39743) | 2025-09-12 | ||
| AVD-2025-39742 | RDMA:HFI1:FIND_HW_THREAD_MASK()(CVE-2025-39742)中修复可能的划分为零 | 2025-09-12 | ||
| AVD-2025-39738 | BTRFS:不允许搬迁部分掉落的子Volumes(CVE-2025-39738) | 2025-09-12 | ||
| AVD-2025-39737 | mm/kmemleak:避免在__kmemleak_do_cleanup()(CVE-2025-39737)中避免使用软锁定 | 2025-09-12 | ||
| AVD-2025-39736 | mm/kmemleak:避免通过将pr_warn()在kmemleak_lock(CVE-2025-39736)之外移动僵局() | 2025-09-12 | ||
| AVD-2025-39734 | 还原“ FS/NTFS3:用Inode_lock替换Inode_trylock”(CVE-2025-39734) | 2025-09-08 | ||
| AVD-2025-39731 | F2FS:VM_UNMAP_RAM()可以从无效的上下文(CVE-2025-39731)调用 | 2025-09-08 | ||
| AVD-2025-39730 | NFS:修复FileHandle界限在NFS_FH_TO_DENTRY()(CVE-2025-39730)中检查 | 2025-09-08 | ||
| AVD-2025-39724 | 串行:8250:由于PSLVERR(CVE-2025-39724)引起的恐慌 | 2025-09-06 | ||
| AVD-2025-39719 | IIO:IMU:BNO055:修复HW_Xlate Array的OOB访问(CVE-2025-39719) | 2025-09-06 | ||
| AVD-2025-39718 | vsock/firtio:skb_put()之前的数据包标头验证长度(CVE-2025-39718) | 2025-09-06 | ||
| AVD-2025-39716 | Parisc:修订__get_user()以探测用户阅读访问(CVE-2025-39716) | 2025-09-06 | ||
| AVD-2025-39715 | PARISC:修订网关LWS呼叫探测用户阅读访问(CVE-2025-39715) | 2025-09-06 | ||
| AVD-2025-39714 | 媒体:USBTV:流媒体时锁定分辨率(CVE-2025-39714) | 2025-09-06 | ||
| AVD-2025-39709 | 媒体:金星:防止探针期间的伪造中断(CVE-2025-39709) | 2025-09-06 | ||
| AVD-2025-39713 | 媒体:Rainshadow-cec:修复Rain_interrupt中的TOCTOU竞赛条件()(CVE-2025-39713) | 2025-09-06 | ||
| AVD-2025-39710 | 媒体:金星:从共享存储器(CVE-2025-39710)阅读后,添加了数据包大小的支票 | 2025-09-06 | ||
| AVD-2025-39702 | IPv6:SR:修复MAC比较为恒定时间(CVE-2025-39702) | 2025-09-06 | ||
| AVD-2025-39706 | DRM/AMDKFD:销毁KFD WQ之后销毁KFD Debugfs(CVE-2025-39706) | 2025-09-06 | ||
| AVD-2025-39703 | NET,HSR:如果SKB无法持有标签(CVE-2025-39703),则拒绝HSR框架 | 2025-09-06 | ||
| AVD-2025-39701 | ACPI:PFR_UPDATE:修复驱动程序更新版本检查(CVE-2025-39701) | 2025-09-06 | ||
| AVD-2025-39697 | NFS:更新现有写作时修复比赛(CVE-2025-39697) | 2025-09-06 | ||
| AVD-2025-39693 | DRM/AMD/显示:避免零指针取消(CVE-2025-39693) | 2025-09-06 |