搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49279 | NFSD:防止32位系统上的整数溢出(CVE-2022-49279) | 2025-02-26 | ||
| AVD-2022-49278 | remoteproc:修复计数检查在RPROC_COREDUMP_WRITE()(CVE-2022-49278)中 | 2025-02-26 | ||
| AVD-2022-49277 | JFFS2:修复记忆泄漏在JFFS2_DO_MOUNT_FS中(CVE-2022-49277) | 2025-02-26 | ||
| AVD-2022-49276 | JFFS2:修复记忆泄漏在JFFS2_SCAN_MEDIUM中(CVE-2022-49276) | 2025-02-26 | ||
| AVD-2022-49275 | CAN:M_CAN:M_CAN_TX_HANDLER():免费使用SKB后使用(CVE-2022-49275) | 2025-02-26 | ||
| AVD-2022-49274 | OCFS2:启用配额安装时修复崩溃(CVE-2022-49274) | 2025-02-26 | ||
| AVD-2022-49273 | RTC:PL031:FIX RTC功能NULL指针解除(CVE-2022-49273) | 2025-02-26 | ||
| AVD-2022-49272 | ALSA:PCM:使用Buffer_Mutex和MMAP_LOCK(CVE-2022-49272)修复潜在的AB/BA锁 | 2025-02-26 | ||
| AVD-2022-49271 | CIFS:预防SMB2_IOCTL_QUERY_INFO()(CVE-2022-49271)中的不良输出长度 | 2025-02-26 | ||
| AVD-2022-49270 | DM:dm_cleanup_zoned_dev()(CVE-2022-49270) | 2025-02-26 | ||
| AVD-2022-49269 | CAN:ISOTP:ISOTP_BIND()(CVE-2022-49269)中的Sanitize CAN ID检查 | 2025-02-26 | ||
| AVD-2022-49268 | ASOC:SOF:INTEL:INOMEM(CVE-2022-49268)时修复NULL PTR解释 | 2025-02-26 | ||
| AVD-2022-49267 | MMC:核心:使用sysfs_emit()代替sprintf()(CVE-2022-49267) | 2025-02-26 | ||
| AVD-2022-49266 | 块:修复RQ-QOS从跳过RQ_QOS_DONE_BIO()(CVE-2022-49266) | 2025-02-26 | ||
| AVD-2022-49265 | PM:域:修复由genpd_debug_remove()(CVE-2022-49265)引起的原子错误 | 2025-02-26 | ||
| AVD-2022-49264 | 执行:ARGV为空时强制单个空字符串(CVE-2022-49264) | 2025-02-26 | ||
| AVD-2022-49263 | BRCMFMAC:PCIE:BRCMF_PCIE_SETUP错误路径(CVE-2022-49263) | 2025-02-26 | ||
| AVD-2022-49262 | 加密:Octeontx2-删除config_dm_crypt check(CVE-2022-49262) | 2025-02-26 | ||
| AVD-2022-49261 | DRM/I915/GEM:在VM_ACCESS中添加缺失边界检查(CVE-2022-49261) | 2025-02-26 | ||
| AVD-2022-49260 | 加密:Hisilicon/sec-修复AEAD软件后备发动机(CVE-2022-49260) | 2025-02-26 | ||
| AVD-2022-49259 | 块:不要在孩子之前删除队列Kobject(CVE-2022-49259) | 2025-02-26 | ||
| AVD-2022-49258 | 加密:CCREE-在CC_CIPHER_EXIT()(CVE-2022-49258)中免费使用后修复使用。 | 2025-02-26 | ||
| AVD-2022-49257 | watch_queue:修复错误清理中的无效解释(CVE-2022-49257) | 2025-02-26 | ||
| AVD-2022-49256 | watch_queue:实际上免费手表(CVE-2022-49256) | 2025-02-26 | ||
| AVD-2022-49255 | F2FS:F2FS_HANDLE_FAILED_INODE(CVE-2022-49255)中缺少免费的NID。 | 2025-02-26 | ||
| AVD-2022-49254 | 媒体:TI-VPE:CAL:修复cal_ctx_v4l2_init_formats()(CVE-2022-49254)中的无效指针删除 | 2025-02-26 | ||
| AVD-2022-49253 | 媒体:USB:GO7007:S2250-Board:修复Probe()中的泄漏(CVE-2022-49253) | 2025-02-26 | ||
| AVD-2022-49252 | ASOC:编解码器:RX-MACRO:修复枚举类型的范围访问阵列(CVE-2022-49252) | 2025-02-26 | ||
| AVD-2022-49251 | ASOC:编解码器:VA-MACRO:修复枚举类型的范围访问阵列(CVE-2022-49251) | 2025-02-26 | ||
| AVD-2022-49250 | ASOC:编解码器:RX-MACRO:修复AUX的访问Compander(CVE-2022-49250) | 2025-02-26 |