搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-39730 | NFS:修复FileHandle界限在NFS_FH_TO_DENTRY()(CVE-2025-39730)中检查 | 2025-09-08 | ||
| AVD-2025-39724 | 串行:8250:由于PSLVERR(CVE-2025-39724)引起的恐慌 | 2025-09-06 | ||
| AVD-2025-39716 | Parisc:修订__get_user()以探测用户阅读访问(CVE-2025-39716) | 2025-09-06 | ||
| AVD-2025-39719 | IIO:IMU:BNO055:修复HW_Xlate Array的OOB访问(CVE-2025-39719) | 2025-09-06 | ||
| AVD-2025-39718 | vsock/firtio:skb_put()之前的数据包标头验证长度(CVE-2025-39718) | 2025-09-06 | ||
| AVD-2025-39715 | PARISC:修订网关LWS呼叫探测用户阅读访问(CVE-2025-39715) | 2025-09-06 | ||
| AVD-2025-39713 | 媒体:Rainshadow-cec:修复Rain_interrupt中的TOCTOU竞赛条件()(CVE-2025-39713) | 2025-09-06 | ||
| AVD-2025-39709 | 媒体:金星:防止探针期间的伪造中断(CVE-2025-39709) | 2025-09-06 | ||
| AVD-2025-39714 | 媒体:USBTV:流媒体时锁定分辨率(CVE-2025-39714) | 2025-09-06 | ||
| AVD-2025-39710 | 媒体:金星:从共享存储器(CVE-2025-39710)阅读后,添加了数据包大小的支票 | 2025-09-06 | ||
| AVD-2025-39701 | ACPI:PFR_UPDATE:修复驱动程序更新版本检查(CVE-2025-39701) | 2025-09-06 | ||
| AVD-2025-39706 | DRM/AMDKFD:销毁KFD WQ之后销毁KFD Debugfs(CVE-2025-39706) | 2025-09-06 | ||
| AVD-2025-39702 | IPv6:SR:修复MAC比较为恒定时间(CVE-2025-39702) | 2025-09-06 | ||
| AVD-2025-39703 | NET,HSR:如果SKB无法持有标签(CVE-2025-39703),则拒绝HSR框架 | 2025-09-06 | ||
| AVD-2025-39694 | S390/SCLP:修复SCCB现在检查(CVE-2025-39694) | 2025-09-06 | ||
| AVD-2025-39697 | NFS:更新现有写作时修复比赛(CVE-2025-39697) | 2025-09-06 | ||
| AVD-2025-39693 | DRM/AMD/显示:避免零指针取消(CVE-2025-39693) | 2025-09-06 | ||
| AVD-2025-39691 | FS/缓冲区:呼叫BH_READ()助手(CVE-2025-39691)时,请使用使用时使用。 | 2025-09-06 | ||
| AVD-2025-39684 | comedi:在do_insn_ioctl()和do_insnlist_ioctl()(CVE-2025-39684)中使用非初始化内存的修复使用 | 2025-09-06 | ||
| AVD-2025-39689 | ftrace:还分配和复制哈希读,以读取过滤器文件(CVE-2025-39689) | 2025-09-06 | ||
| AVD-2025-39687 | IIO:LIGHT:AS73211:确保零孔为零(CVE-2025-39687) | 2025-09-06 | ||
| AVD-2025-39692 | SMB:服务器:split KSMBD_RDMA_STOP_LISTENING()以KSMBD_RDMA_DESTROY()(CVE-2025-39692)出发 | 2025-09-06 | ||
| AVD-2025-39686 | comedi:make insn_rw_emulate_bits()do insn-> n样品(CVE-2025-39686) | 2025-09-06 | ||
| AVD-2025-39685 | Comedi:PCL726:防止无效的IRQ编号(CVE-2025-39685) | 2025-09-06 | ||
| AVD-2025-39682 | TLS:RX_LIST上的零长度记录的修复处理(CVE-2025-39682) | 2025-09-06 | ||
| AVD-2025-39681 | x86/cpu/hygon:在bsp_init helper(CVE-2025-39681)中添加缺少RESCTRL_CPU_DETECT() | 2025-09-06 | ||
| AVD-2025-39683 | 跟踪:限制对Parser->缓冲区的访问时,trace_get_user失败时(CVE-2025-39683) | 2025-09-06 | ||
| AVD-2025-39673 | PPP:修复ppp_fill_forward_path中的比赛条件(CVE-2025-39673) | 2025-09-06 | ||
| AVD-2025-39676 | SCSI:QLA4XXX:防止潜在的错误指针解除(CVE-2025-39676) | 2025-09-06 | ||
| AVD-2025-39675 | drm/amd/display:添加null指针检查mod_hdcp_hdcp1_create_session()(CVE-2025-39675) | 2025-09-06 |