搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49970 | BPF,CGROUP:PURGE_EFFECTIVE_PROGS中的内核错误(CVE-2022-49970) | 2025-06-18 | ||
| AVD-2022-49969 | DRM/AMD/显示:关闭ODM时钟之前清除OPTC底流(CVE-2022-49969) | 2025-06-18 | ||
| AVD-2022-49968 | IEEE802154/ADF7242:DEFER DESTOR_WORKQUEUE CALL(CVE-2022-49968) | 2025-06-18 | ||
| AVD-2022-49967 | BPF:围绕BPF_JIT_LIMIT修复数据量。 (CVE-2022-49967) | 2025-06-18 | ||
| AVD-2022-49966 | DRM/AMD/PM:添加缺失 - > Sienna Cichlid的Fini_microcode接口(CVE-2022-49966) | 2025-06-18 | ||
| AVD-2022-49965 | DRM/AMD/PM:添加一些SMU13 ASIC(CVE-2022-49965)的Fini_xxxx接口添加 - > fini_xxxx接口 | 2025-06-18 | ||
| AVD-2022-49964 | ARM64:CACHEINFO:修复对未签名的FW_Level(CVE-2022-49964)的签名错误值的错误分配 | 2025-06-18 | ||
| AVD-2022-49963 | DRM/I915/TTM:修复CCS处理(CVE-2022-49963) | 2025-06-18 | ||
| AVD-2022-49962 | XHCI:如果XHC只有一个Roothub(CVE-2022-49962) | 2025-06-18 | ||
| AVD-2022-49961 | bpf:do mark_chain_precision for arg_const_alloc_size_or_zero(CVE-2022-49961) | 2025-06-18 | ||
| AVD-2022-49960 | DRM/i915:修复Null指针删除(CVE-2022-49960) | 2025-06-18 | ||
| AVD-2022-49959 | OpenVswitch:FIX DATAPATH创建失败的内存泄漏(CVE-2022-49959) | 2025-06-18 | ||
| AVD-2022-49958 | net/sched:修复netdevice参考泄漏中的eacteact_default_qdiscs()(CVE-2022-49958) | 2025-06-18 | ||
| AVD-2022-49957 | KCM:FIX STRP_INIT()订单和清理(CVE-2022-49957) | 2025-06-18 | ||
| AVD-2022-49956 | 登台:RTL8712:免费错误后修复使用(CVE-2022-49956) | 2025-06-18 | ||
| AVD-2022-49955 | POWERPC/RTA:修复RTAS MSR [HV]用于细胞的处理(CVE-2022-49955) | 2025-06-18 | ||
| AVD-2022-49954 | 输入:iForce-清除IFORCE_XMIT_RUNNNENN FLAG后醒来(CVE-2022-49954) | 2025-06-18 | ||
| AVD-2022-49953 | IIO:LIGHT:CM3605:修复CM3605_Probe()(CVE-2022-49953)中的错误处理路径 | 2025-06-18 | ||
| AVD-2022-49952 | MISC:FASTRPC:修复探针上的内存损坏(CVE-2022-49952) | 2025-06-18 | ||
| AVD-2022-49951 | 固件_loader:未注册期间修复无用的使用(CVE-2022-49951) | 2025-06-18 | ||
| AVD-2022-49950 | MISC:FASTRPC:修复Open上的内存损坏(CVE-2022-49950) | 2025-06-18 | ||
| AVD-2022-49949 | 固件加载程序:修复固件上传中的内存泄漏(CVE-2022-49949) | 2025-06-18 | ||
| AVD-2022-49948 | VT:更改字体之前的清晰选择(CVE-2022-49948) | 2025-06-18 | ||
| AVD-2022-49947 | 活页夹:修复Alloc-> vma_vm_mm null-ptr删除(CVE-2022-49947) | 2025-06-18 | ||
| AVD-2022-49946 | CLK:BCM:RPI:防止越野访问(CVE-2022-49946) | 2025-06-18 | ||
| AVD-2022-49945 | hwmon :( gpio-fan)固定数组从界限访问(CVE-2022-49945) | 2025-06-18 | ||
| AVD-2022-49944 | 还原“ USB:typec:ucsi:添加一个常见函数ucsi_unregister_connectors()”(CVE-2022-49944) | 2025-06-18 | ||
| AVD-2022-49943 | USB:小工具:udc_mutex(CVE-2022-49943)修复晦涩的锁定违规行为 | 2025-06-18 | ||
| AVD-2022-49942 | WiFi:MAC80211:如果状态断开连接(CVE-2022-49942),请勿在IBSS模式下最终确定CSA | 2025-06-18 | ||
| AVD-2022-49940 | TTY:N_GSM:添加GSM-->在GSM_RECEIVE_BUF()中接收的理智检查(CVE-2022-49940) | 2025-06-18 |