搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49255 | F2FS:F2FS_HANDLE_FAILED_INODE(CVE-2022-49255)中缺少免费的NID。 | 2025-02-26 | ||
| AVD-2022-49254 | 媒体:TI-VPE:CAL:修复cal_ctx_v4l2_init_formats()(CVE-2022-49254)中的无效指针删除 | 2025-02-26 | ||
| AVD-2022-49253 | 媒体:USB:GO7007:S2250-Board:修复Probe()中的泄漏(CVE-2022-49253) | 2025-02-26 | ||
| AVD-2022-49252 | ASOC:编解码器:RX-MACRO:修复枚举类型的范围访问阵列(CVE-2022-49252) | 2025-02-26 | ||
| AVD-2022-49251 | ASOC:编解码器:VA-MACRO:修复枚举类型的范围访问阵列(CVE-2022-49251) | 2025-02-26 | ||
| AVD-2022-49250 | ASOC:编解码器:RX-MACRO:修复AUX的访问Compander(CVE-2022-49250) | 2025-02-26 | ||
| AVD-2022-49249 | ASOC:编解码器:WC938X:修复枚举类型的范围访问阵列(CVE-2022-49249) | 2025-02-26 | ||
| AVD-2022-49248 | ALSA:FireWire-Lib:修复AV/C递延交易的非初始化标志(CVE-2022-49248) | 2025-02-26 | ||
| AVD-2022-49247 | 媒体:STK1160:如果开始流失败,请使用VB2_BUF_STATE_QUEEDER返回缓冲区(CVE-2022-49247) | 2025-02-26 | ||
| AVD-2022-49246 | ASOC:ATMEL:SND_PROTO_PROBE中的修复错误处理(CVE-2022-49246) | 2025-02-26 | ||
| AVD-2022-49245 | ASOC:Rockchip:修复PM使用参考Rockchip_i2s_tdm_resume(CVE-2022-49245) | 2025-02-26 | ||
| AVD-2022-49244 | ASOC:Mediatek:MT8192-MT6359:MT8192_MT6359_DEV_PROBE中的修复错误处理(CVE-2022-49244) | 2025-02-26 | ||
| AVD-2022-49243 | ASOC:ATMEL:在AT91SAM9G20EK_AUDIO_PROBE(CVE-2022-49243)中添加noff_node_put() | 2025-02-26 | ||
| AVD-2022-49242 | ASOC:MXS:MXS_SGTL5000_PROBE中的修复错误处理(CVE-2022-49242) | 2025-02-26 | ||
| AVD-2022-49241 | ASOC:ATMEL:SAM9X5_WM8731_DRIVER_PROBE中的修复错误处理(CVE-2022-49241) | 2025-02-26 | ||
| AVD-2022-49240 | ASOC:MediAtek:MT8195:MT8195_MT6359_RT1019_RT5682_DEV_DEV_PROBE(CVE-2022-49240)中的修复错误处理 | 2025-02-26 | ||
| AVD-2022-49239 | ASOC:编解码器:WCD934X:在WCD934X_CODEC_PARSE_DATA(CVE-2022-49239)中添加of_node_put()添加缺失的of_node_put() | 2025-02-26 | ||
| AVD-2022-49238 | ATH11K:从AP与QCA6390/WCN6855(CVE-2022-49238)断开AP时,免费的同行 | 2025-02-26 | ||
| AVD-2022-49237 | ATH11K:添加缺失的of_node_put()以避免泄漏(CVE-2022-49237) | 2025-02-26 | ||
| AVD-2022-49236 | BPF:由于BTF_TRY_GET_MODULE和LOAD_MODULE(CVE-2022-49236)之间的竞赛而修复UAF | 2025-02-26 | ||
| AVD-2022-49235 | ATH9K_HTC:修复Uninit Value Bugs(CVE-2022-49235) | 2025-02-26 | ||
| AVD-2022-49234 | 网络:DSA:避免VLAN过滤的跨芯片同步(CVE-2022-49234) | 2025-02-26 | ||
| AVD-2022-49233 | drm/amd/display:call dc_stream_release for remove link Enc分配(CVE-2022-49233) | 2025-02-26 | ||
| AVD-2022-49232 | drm/amd/display:修复AMDGPU_DM_CONNECTOR中的无零指针取消费用(CVE-2022-49232) | 2025-02-26 | ||
| AVD-2022-49231 | RTW88:修复内存超支和HW_SCAN期间的内存泄漏(CVE-2022-49231) | 2025-02-26 | ||
| AVD-2022-49230 | MT76:MT7915:修复MT7915_MCU_ADD_STA中可能的内存泄漏(CVE-2022-49230) | 2025-02-26 | ||
| AVD-2022-49229 | PTP:解开物理时钟时解体虚拟时钟。 (CVE-2022-49229) | 2025-02-26 | ||
| AVD-2022-49228 | BPF:在标记功能时修复BTF exp_tag错误(CVE-2022-49228) | 2025-02-26 | ||
| AVD-2022-49227 | IGC:更改RX环参数时避免内核警告(CVE-2022-49227) | 2025-02-26 | ||
| AVD-2022-49226 | NET:ASIX:添加USB读取错误的正确错误处理(CVE-2022-49226) | 2025-02-26 |