搜索结果
关于「debian_linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2024-35899 | netfilter:nf_tables:在 exit_net 发布之前刷新待处理的销毁工作(CVE-2024-35899) | 2024-05-19 | ||
| AVD-2024-35902 | net/rds:修复可能的 cp null 取消引用 (CVE-2024-35902) | 2024-05-19 | ||
| AVD-2024-35947 | CVE-2024-35947 | 2024-05-19 | ||
| AVD-2024-35847 | irqchip/gic-v3-its:防止错误时双重释放 (CVE-2024-35847) | 2024-05-17 | ||
| AVD-2023-52679 | of:修复 of_parse_phandle_with_args_map 中的双重释放 (CVE-2023-52679) | 2024-05-17 | ||
| AVD-2024-35854 | mlxsw:spectrum_acl_tcam:修复重新哈希期间可能出现的使用后释放问题(CVE-2024-35854) | 2024-05-17 | ||
| AVD-2024-35853 | mlxsw:spectrum_acl_tcam:修复重新哈希期间的内存泄漏 (CVE-2024-35853) | 2024-05-17 | ||
| AVD-2023-52691 | drm/amd/pm:修复 si_dpm_init 中的双重释放 (CVE-2023-52691) | 2024-05-17 | ||
| AVD-2023-52696 | powerpc/powernv:在 opal_powercap_init() 中添加空指针检查 (CVE-2023-52696) | 2024-05-17 | ||
| AVD-2024-35849 | btrfs:修复 btrfs_ioctl_logic_to_ino() 中的信息泄漏 (CVE-2024-35849) | 2024-05-17 | ||
| AVD-2024-35845 | wifi:iwlwifi:dbg-tlv:确保 NUL 终止 (CVE-2024-35845) | 2024-05-17 | ||
| AVD-2024-35828 | wifi:libertas:修复 lbs_allocate_cmd_buffer() 中的一些 memleaks (CVE-2024-35828) | 2024-05-17 | ||
| AVD-2024-35811 | wifi:brcmfmac:修复 brcmf_cfg80211_detach 中的释放后使用错误 (CVE-2024-35811) | 2024-05-17 | ||
| AVD-2024-35823 | vt:修复删除字符时 unicode 缓冲区损坏的问题(CVE-2024-35823) | 2024-05-17 | ||
| AVD-2024-35806 | soc: fsl: qbman:获取 cgr_lock 时始终禁用中断 (CVE-2024-35806) | 2024-05-17 | ||
| AVD-2024-35829 | drm/lima:修复 lima_heap_alloc 中的 memleak (CVE-2024-35829) | 2024-05-17 | ||
| AVD-2024-35835 | CVE-2024-35835 | 2024-05-17 | ||
| AVD-2024-27405 | CVE-2024-27405 | 2024-05-17 | ||
| AVD-2024-35833 | CVE-2024-35833 | 2024-05-17 | ||
| AVD-2024-4769 | Inclusion of Functionality from Untrusted Control Sphere (CVE-2024-4769) | 2024-05-14 | ||
| AVD-2024-4767 | Improper Removal of Sensitive Information Before Storage or Transfer (CVE-2024-4767) | 2024-05-14 | ||
| AVD-2024-4777 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CVE-2024-4777) | 2024-05-14 | ||
| AVD-2024-4367 | Improper Check for Unusual or Exceptional Conditions (CVE-2024-4367) | 2024-05-14 | ||
| AVD-2024-4768 | User Interface (UI) Misrepresentation of Critical Information (CVE-2024-4768) | 2024-05-14 | ||
| AVD-2024-34397 | glib2 安全漏洞 (CVE-2024-34397) | 2024-05-08 | ||
| AVD-2024-33601 | nscd:网络组缓存可能会在内存分配失败时终止守护进程 (CVE-2024-33601) | 2024-05-07 | ||
| AVD-2024-33600 | nscd:未找到响应后空指针崩溃 (CVE-2024-33600) | 2024-05-07 | ||
| AVD-2024-33599 | nscd:网络组缓存中基于堆栈的缓冲区溢出 (CVE-2024-33599) | 2024-05-07 | ||
| AVD-2024-33602 | nscd:网络组缓存假定 NSS 回调使用缓冲区内字符串 (CVE-2024-33602) | 2024-05-07 | ||
| AVD-2024-34508 | N/A | 2024-05-06 |