搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49979 | NET:SK_PSOCK_GET(2)(CVE-2022-49979)中的修复重新数错误 | 2025-06-18 | ||
| AVD-2022-49978 | FBDEV:fb_pm2fb:避免使用零错误的潜在划分(CVE-2022-49978) | 2025-06-18 | ||
| AVD-2022-49977 | ftrace:frace ftrace死亡时,请在is_ftrace_trampoline中修复null指针删除(CVE-2022-49977) | 2025-06-18 | ||
| AVD-2022-49975 | BPF:不要使用无效的PKT_LEN重定向数据包(CVE-2022-49975) | 2025-06-18 | ||
| AVD-2022-49973 | SKMSG:修复了错误的最后SG检查SK_MSG_RECVMSG()(CVE-2022-49973) | 2025-06-18 | ||
| AVD-2022-49970 | BPF,CGROUP:PURGE_EFFECTIVE_PROGS中的内核错误(CVE-2022-49970) | 2025-06-18 | ||
| AVD-2022-49969 | DRM/AMD/显示:关闭ODM时钟之前清除OPTC底流(CVE-2022-49969) | 2025-06-18 | ||
| AVD-2022-49968 | IEEE802154/ADF7242:DEFER DESTOR_WORKQUEUE CALL(CVE-2022-49968) | 2025-06-18 | ||
| AVD-2022-49966 | DRM/AMD/PM:添加缺失 - > Sienna Cichlid的Fini_microcode接口(CVE-2022-49966) | 2025-06-18 | ||
| AVD-2022-49964 | ARM64:CACHEINFO:修复对未签名的FW_Level(CVE-2022-49964)的签名错误值的错误分配 | 2025-06-18 | ||
| AVD-2022-49959 | OpenVswitch:FIX DATAPATH创建失败的内存泄漏(CVE-2022-49959) | 2025-06-18 | ||
| AVD-2022-49958 | net/sched:修复netdevice参考泄漏中的eacteact_default_qdiscs()(CVE-2022-49958) | 2025-06-18 | ||
| AVD-2022-49957 | KCM:FIX STRP_INIT()订单和清理(CVE-2022-49957) | 2025-06-18 | ||
| AVD-2022-49956 | 登台:RTL8712:免费错误后修复使用(CVE-2022-49956) | 2025-06-18 | ||
| AVD-2022-49954 | 输入:iForce-清除IFORCE_XMIT_RUNNNENN FLAG后醒来(CVE-2022-49954) | 2025-06-18 | ||
| AVD-2022-49952 | MISC:FASTRPC:修复探针上的内存损坏(CVE-2022-49952) | 2025-06-18 | ||
| AVD-2022-49950 | MISC:FASTRPC:修复Open上的内存损坏(CVE-2022-49950) | 2025-06-18 | ||
| AVD-2022-49948 | VT:更改字体之前的清晰选择(CVE-2022-49948) | 2025-06-18 | ||
| AVD-2022-49947 | 活页夹:修复Alloc-> vma_vm_mm null-ptr删除(CVE-2022-49947) | 2025-06-18 | ||
| AVD-2022-49946 | CLK:BCM:RPI:防止越野访问(CVE-2022-49946) | 2025-06-18 | ||
| AVD-2022-49945 | hwmon :( gpio-fan)固定数组从界限访问(CVE-2022-49945) | 2025-06-18 | ||
| AVD-2022-49942 | WiFi:MAC80211:如果状态断开连接(CVE-2022-49942),请勿在IBSS模式下最终确定CSA | 2025-06-18 | ||
| AVD-2022-49939 | 活页夹:修复由种族条件引起的Ref-> Proc的UAF(CVE-2022-49939) | 2025-06-18 | ||
| AVD-2022-49938 | CIFS:修复SMB2_NEGOTIATE()(CVE-2022-49938)中的小备忘录泄漏 | 2025-06-18 | ||
| AVD-2022-49937 | 媒体:MCEUSB:使用新的USB_CONTROL_MSG _*()例程(CVE-2022-49937) | 2025-06-18 | ||
| AVD-2022-49936 | USB:核心:防止嵌套设备 - 呼叫(CVE-2022-49936) | 2025-06-18 | ||
| AVD-2022-49934 | WiFi:MAC80211:修复IEEE80211_SCAN_RX()(CVE-2022-49934)中的UAF | 2025-06-18 | ||
| AVD-2025-38079 | 加密:algif_hash- hash_accept(CVE-2025-38079)中的双重修复双免费修复 | 2025-06-18 | ||
| AVD-2025-38078 | ALSA:PCM:修复PCM OSS层的缓冲区访问赛(CVE-2025-38078) | 2025-06-18 | ||
| AVD-2025-38077 | 平台/x86:dell-wmi-sysman:避免在current_password_store()(CVE-2025-38077)中的缓冲区溢出 | 2025-06-18 |