搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49543 | ATH11K:修复MHI_PM_Disable_transition()(CVE-2022-49543)中Dev_wake的警告 | 2025-02-26 | ||
| AVD-2022-49542 | SCSI:LPFC:在致电LPFC_DMP_DBG()(CVE-2022-49542)之前,请检查CFG_LOG_VERBOSE检查 | 2025-02-26 | ||
| AVD-2022-49541 | CIFS:在失败的安装座期间修复潜在双免费的电位(CVE-2022-49541) | 2025-02-26 | ||
| AVD-2022-49540 | RCU任务:修复计划和冲洗工作(CVE-2022-49540) | 2025-02-26 | ||
| AVD-2022-49539 | RTW89:SER:修复L2 RESET中发生的CAM泄漏(CVE-2022-49539) | 2025-02-26 | ||
| AVD-2022-49538 | ALSA:Jack:usex下的Access Input_dev(CVE-2022-49538) | 2025-02-26 | ||
| AVD-2022-49537 | SCSI:LPFC:启用CMF在I/O期间观察到的修复呼叫跟踪(CVE-2022-49537) | 2025-02-26 | ||
| AVD-2022-49536 | SCSI:LPFC:修复SCSI I/O完成和中止处理程序僵局(CVE-2022-49536) | 2025-02-26 | ||
| AVD-2022-49535 | SCSI:LPFC:未能发行Flogi和Plogi(CVE-2022-49535)后修复Null指针删除 | 2025-02-26 | ||
| AVD-2022-49534 | SCSI:LPFC:保护NPIV端口的内存泄漏发送PLOGI_RJT(CVE-2022-49534) | 2025-02-26 | ||
| AVD-2022-49533 | ATH11K:更改Active Probe SSID和BSSID的最大最大NO为FW功能(CVE-2022-49533) | 2025-02-26 | ||
| AVD-2022-49532 | DRM/virtio:修复null指针在virtio_gpu_conn_get_modes中(CVE-2022-49532) | 2025-02-26 | ||
| AVD-2022-49531 | 循环:实现 - > free_disk(CVE-2022-49531) | 2025-02-26 | ||
| AVD-2022-49530 | drm/amd/pm:si_parse_power_table()(CVE-2022-49530)中的Double double file file double免费 | 2025-02-26 | ||
| AVD-2022-49529 | DRM/AMDGPU/PM:禁用SMU时修复零指针(CVE-2022-49529) | 2025-02-26 | ||
| AVD-2022-49528 | 媒体:I2C:DW9714:驾驶员未能探测时禁用调节器(CVE-2022-49528) | 2025-02-26 | ||
| AVD-2022-49527 | 媒体:金星:HFI:避免在DEINIT中取消取消(CVE-2022-49527) | 2025-02-26 | ||
| AVD-2022-49526 | MD/位图:如果无法通过理智检查(CVE-2022-49526),请勿设置SB值 | 2025-02-26 | ||
| AVD-2022-49525 | 媒体:CX25821:删除模块时修复警告(CVE-2022-49525) | 2025-02-26 | ||
| AVD-2022-49524 | 媒体:PCI:CX23885:修复CX23885_INITDEV中的错误处理()(CVE-2022-49524) | 2025-02-26 | ||
| AVD-2022-49523 | ATH11K:在光谱降低期间禁用光谱扫描(CVE-2022-49523) | 2025-02-26 | ||
| AVD-2022-49522 | MMC:JZ4740:将DMA发动机限制应用于最大段尺寸(CVE-2022-49522) | 2025-02-26 | ||
| AVD-2022-49521 | SCSI:LPFC:修复资源泄漏LPFC_SLI4_SEND_SEND_SEQ_TO_ULP()(CVE-2022-49521) | 2025-02-26 | ||
| AVD-2022-49520 | ARM64:Compat:请勿将SYSCALL编号视为不良Syscall的ESR_ELX(CVE-2022-49520) | 2025-02-26 | ||
| AVD-2022-49519 | ATH10K:跳过ATH10K_HALT暂停驾驶员状态重新启动(CVE-2022-49519) | 2025-02-26 | ||
| AVD-2022-49518 | ASOC:SOF:IPC3-Topology:for non Bytes有效载荷(CVE-2022-49518)正确的GET_CONTROL_DATA | 2025-02-26 | ||
| AVD-2022-49517 | ASOC:MediAtek:MT2701_WM8960_MACHINE_PROBE中的fix of_node_put缺失(CVE-2022-49517) | 2025-02-26 | ||
| AVD-2022-49516 | 冰:始终检查VF VSI指针值(CVE-2022-49516) | 2025-02-26 | ||
| AVD-2022-49515 | ASOC:CS35L41:修复OTP_PACKED_ELEMENT_T(CVE-2022-49515)中的隔离访问 | 2025-02-26 | ||
| AVD-2022-49514 | ASOC:Mediatek:MT8173_MAX98090_DEV_PROBE中的修复错误处理(CVE-2022-49514) | 2025-02-26 |