搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49262 | 加密:Octeontx2-删除config_dm_crypt check(CVE-2022-49262) | 2025-02-26 | ||
| AVD-2022-49261 | DRM/I915/GEM:在VM_ACCESS中添加缺失边界检查(CVE-2022-49261) | 2025-02-26 | ||
| AVD-2022-49260 | 加密:Hisilicon/sec-修复AEAD软件后备发动机(CVE-2022-49260) | 2025-02-26 | ||
| AVD-2022-49259 | 块:不要在孩子之前删除队列Kobject(CVE-2022-49259) | 2025-02-26 | ||
| AVD-2022-49258 | 加密:CCREE-在CC_CIPHER_EXIT()(CVE-2022-49258)中免费使用后修复使用。 | 2025-02-26 | ||
| AVD-2022-49257 | watch_queue:修复错误清理中的无效解释(CVE-2022-49257) | 2025-02-26 | ||
| AVD-2022-49256 | watch_queue:实际上免费手表(CVE-2022-49256) | 2025-02-26 | ||
| AVD-2022-49255 | F2FS:F2FS_HANDLE_FAILED_INODE(CVE-2022-49255)中缺少免费的NID。 | 2025-02-26 | ||
| AVD-2022-49254 | 媒体:TI-VPE:CAL:修复cal_ctx_v4l2_init_formats()(CVE-2022-49254)中的无效指针删除 | 2025-02-26 | ||
| AVD-2022-49253 | 媒体:USB:GO7007:S2250-Board:修复Probe()中的泄漏(CVE-2022-49253) | 2025-02-26 | ||
| AVD-2022-49252 | ASOC:编解码器:RX-MACRO:修复枚举类型的范围访问阵列(CVE-2022-49252) | 2025-02-26 | ||
| AVD-2022-49251 | ASOC:编解码器:VA-MACRO:修复枚举类型的范围访问阵列(CVE-2022-49251) | 2025-02-26 | ||
| AVD-2022-49250 | ASOC:编解码器:RX-MACRO:修复AUX的访问Compander(CVE-2022-49250) | 2025-02-26 | ||
| AVD-2022-49249 | ASOC:编解码器:WC938X:修复枚举类型的范围访问阵列(CVE-2022-49249) | 2025-02-26 | ||
| AVD-2022-49248 | ALSA:FireWire-Lib:修复AV/C递延交易的非初始化标志(CVE-2022-49248) | 2025-02-26 | ||
| AVD-2022-49247 | 媒体:STK1160:如果开始流失败,请使用VB2_BUF_STATE_QUEEDER返回缓冲区(CVE-2022-49247) | 2025-02-26 | ||
| AVD-2022-49246 | ASOC:ATMEL:SND_PROTO_PROBE中的修复错误处理(CVE-2022-49246) | 2025-02-26 | ||
| AVD-2022-49245 | ASOC:Rockchip:修复PM使用参考Rockchip_i2s_tdm_resume(CVE-2022-49245) | 2025-02-26 | ||
| AVD-2022-49244 | ASOC:Mediatek:MT8192-MT6359:MT8192_MT6359_DEV_PROBE中的修复错误处理(CVE-2022-49244) | 2025-02-26 | ||
| AVD-2022-49243 | ASOC:ATMEL:在AT91SAM9G20EK_AUDIO_PROBE(CVE-2022-49243)中添加noff_node_put() | 2025-02-26 | ||
| AVD-2022-49242 | ASOC:MXS:MXS_SGTL5000_PROBE中的修复错误处理(CVE-2022-49242) | 2025-02-26 | ||
| AVD-2022-49241 | ASOC:ATMEL:SAM9X5_WM8731_DRIVER_PROBE中的修复错误处理(CVE-2022-49241) | 2025-02-26 | ||
| AVD-2022-49240 | ASOC:MediAtek:MT8195:MT8195_MT6359_RT1019_RT5682_DEV_DEV_PROBE(CVE-2022-49240)中的修复错误处理 | 2025-02-26 | ||
| AVD-2022-49239 | ASOC:编解码器:WCD934X:在WCD934X_CODEC_PARSE_DATA(CVE-2022-49239)中添加of_node_put()添加缺失的of_node_put() | 2025-02-26 | ||
| AVD-2022-49238 | ATH11K:从AP与QCA6390/WCN6855(CVE-2022-49238)断开AP时,免费的同行 | 2025-02-26 | ||
| AVD-2022-49237 | ATH11K:添加缺失的of_node_put()以避免泄漏(CVE-2022-49237) | 2025-02-26 | ||
| AVD-2022-49236 | BPF:由于BTF_TRY_GET_MODULE和LOAD_MODULE(CVE-2022-49236)之间的竞赛而修复UAF | 2025-02-26 | ||
| AVD-2022-49235 | ATH9K_HTC:修复Uninit Value Bugs(CVE-2022-49235) | 2025-02-26 | ||
| AVD-2022-49234 | 网络:DSA:避免VLAN过滤的跨芯片同步(CVE-2022-49234) | 2025-02-26 | ||
| AVD-2022-49233 | drm/amd/display:call dc_stream_release for remove link Enc分配(CVE-2022-49233) | 2025-02-26 |