搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49976 | 平台/x86:x86-android-tablets:用Windows BIOS(CVE-2022-49976)在Chuwi HI8上修复损坏的触摸屏 | 2025-06-18 | ||
| AVD-2022-49975 | BPF:不要使用无效的PKT_LEN重定向数据包(CVE-2022-49975) | 2025-06-18 | ||
| AVD-2022-49974 | HID:任天堂:修复Rumble Worker Null指针Deref(CVE-2022-49974) | 2025-06-18 | ||
| AVD-2022-49973 | SKMSG:修复了错误的最后SG检查SK_MSG_RECVMSG()(CVE-2022-49973) | 2025-06-18 | ||
| AVD-2022-49972 | XSK:修复XDP_SHARED_UMEM的损坏数据包(CVE-2022-49972) | 2025-06-18 | ||
| AVD-2022-49971 | DRM/AMD/PM:修复潜在的GPU_Metrics_table内存泄漏(CVE-2022-49971) | 2025-06-18 | ||
| AVD-2022-49970 | BPF,CGROUP:PURGE_EFFECTIVE_PROGS中的内核错误(CVE-2022-49970) | 2025-06-18 | ||
| AVD-2022-49969 | DRM/AMD/显示:关闭ODM时钟之前清除OPTC底流(CVE-2022-49969) | 2025-06-18 | ||
| AVD-2022-49968 | IEEE802154/ADF7242:DEFER DESTOR_WORKQUEUE CALL(CVE-2022-49968) | 2025-06-18 | ||
| AVD-2022-49967 | BPF:围绕BPF_JIT_LIMIT修复数据量。 (CVE-2022-49967) | 2025-06-18 | ||
| AVD-2022-49966 | DRM/AMD/PM:添加缺失 - > Sienna Cichlid的Fini_microcode接口(CVE-2022-49966) | 2025-06-18 | ||
| AVD-2022-49965 | DRM/AMD/PM:添加一些SMU13 ASIC(CVE-2022-49965)的Fini_xxxx接口添加 - > fini_xxxx接口 | 2025-06-18 | ||
| AVD-2022-49964 | ARM64:CACHEINFO:修复对未签名的FW_Level(CVE-2022-49964)的签名错误值的错误分配 | 2025-06-18 | ||
| AVD-2022-49963 | DRM/I915/TTM:修复CCS处理(CVE-2022-49963) | 2025-06-18 | ||
| AVD-2022-49962 | XHCI:如果XHC只有一个Roothub(CVE-2022-49962) | 2025-06-18 | ||
| AVD-2022-49961 | bpf:do mark_chain_precision for arg_const_alloc_size_or_zero(CVE-2022-49961) | 2025-06-18 | ||
| AVD-2022-49960 | DRM/i915:修复Null指针删除(CVE-2022-49960) | 2025-06-18 | ||
| AVD-2022-49959 | OpenVswitch:FIX DATAPATH创建失败的内存泄漏(CVE-2022-49959) | 2025-06-18 | ||
| AVD-2022-49958 | net/sched:修复netdevice参考泄漏中的eacteact_default_qdiscs()(CVE-2022-49958) | 2025-06-18 | ||
| AVD-2022-49957 | KCM:FIX STRP_INIT()订单和清理(CVE-2022-49957) | 2025-06-18 | ||
| AVD-2022-49956 | 登台:RTL8712:免费错误后修复使用(CVE-2022-49956) | 2025-06-18 | ||
| AVD-2022-49955 | POWERPC/RTA:修复RTAS MSR [HV]用于细胞的处理(CVE-2022-49955) | 2025-06-18 | ||
| AVD-2022-49954 | 输入:iForce-清除IFORCE_XMIT_RUNNNENN FLAG后醒来(CVE-2022-49954) | 2025-06-18 | ||
| AVD-2022-49953 | IIO:LIGHT:CM3605:修复CM3605_Probe()(CVE-2022-49953)中的错误处理路径 | 2025-06-18 | ||
| AVD-2022-49952 | MISC:FASTRPC:修复探针上的内存损坏(CVE-2022-49952) | 2025-06-18 | ||
| AVD-2022-49951 | 固件_loader:未注册期间修复无用的使用(CVE-2022-49951) | 2025-06-18 | ||
| AVD-2022-49950 | MISC:FASTRPC:修复Open上的内存损坏(CVE-2022-49950) | 2025-06-18 | ||
| AVD-2022-49949 | 固件加载程序:修复固件上传中的内存泄漏(CVE-2022-49949) | 2025-06-18 | ||
| AVD-2022-49948 | VT:更改字体之前的清晰选择(CVE-2022-49948) | 2025-06-18 | ||
| AVD-2022-49947 | 活页夹:修复Alloc-> vma_vm_mm null-ptr删除(CVE-2022-49947) | 2025-06-18 |