搜索结果
关于「kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2025-37798 | codel:在qdisc_tree_reduce_backlog()(CVE-2025-37798)之前删除SCH-> Q.Q.Q.Q.Q.Q.Q。 | 2025-05-02 | ||
| AVD-2025-37797 | NET_SCHED:HFSC:在类处理中修复UAF漏洞(CVE-2025-37797) | 2025-05-02 | ||
| AVD-2022-49915 | MISDN:修复Misdn_register_device()(CVE-2022-49915)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49913 | BTRFS:FIX INODE列表在BackRef时泄漏find_parent_nodes()(CVE-2022-49913) | 2025-05-01 | ||
| AVD-2022-49909 | 蓝牙:L2CAP:在L2CAP_CONN_DEL()(CVE-2022-49909)中使用无用时使用。 | 2025-05-01 | ||
| AVD-2022-49892 | Ftrace:Dynamic Ftrace_Ops(CVE-2022-49892) | 2025-05-01 | ||
| AVD-2022-49883 | KVM:X86:SMM:SMRAM图像中GPR的数量取决于图像格式(CVE-2022-49883) | 2025-05-01 | ||
| AVD-2022-49881 | WiFi:CFG80211:修复内存泄漏中的QUERY_REGDB_FILE()(CVE-2022-49881) | 2025-05-01 | ||
| AVD-2022-49874 | HID:HYPERV:修复MouseVSC_Probe()(CVE-2022-49874)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49865 | IPv6:AddRlabel:将ifAddrlBlmsg发送到网络时修复InfoLeak(CVE-2022-49865) | 2025-05-01 | ||
| AVD-2022-49846 | UDF:修复绑定的板块写入错误()(CVE-2022-49846) | 2025-05-01 | ||
| AVD-2022-49845 | CAN:J1939:J1939_SEND_ONE():修复缺失CAN Header初始化(CVE-2022-49845) | 2025-05-01 | ||
| AVD-2022-49842 | asoc:core:在snd_soc_exit()(CVE-2022-49842)中修复不使用时使用。 | 2025-05-01 | ||
| AVD-2022-49835 | ALSA:HDA:修复“ add_widget_node”中的潜在memleak(CVE-2022-49835) | 2025-05-01 | ||
| AVD-2022-49832 | Pinctrl:DeviceTree:修复NULL指针在Pinctrl_dt_to_map中的指定(CVE-2022-49832) | 2025-05-01 | ||
| AVD-2022-49829 | DRM/调度程序:修复围栏涉及计数(CVE-2022-49829) | 2025-05-01 | ||
| AVD-2022-49821 | MISDN:修复MISDN_DSP_ELEMENT_REGISTER中可能的内存泄漏()(CVE-2022-49821) | 2025-05-01 | ||
| AVD-2022-49818 | MISDN:修复误用put_device()在misdn_register_device()(CVE-2022-49818)中 | 2025-05-01 | ||
| AVD-2022-49789 | SCSI:ZFCP:QDIO发送失败时,请免费解决FSF请求的双重修复(CVE-2022-49789) | 2025-05-01 | ||
| AVD-2022-49788 | MISC/VMW_VMCI:修复vmci_host_do_receive_datagram()(CVE-2022-49788)中的Infoleak | 2025-05-01 | ||
| AVD-2022-49787 | MMC:SDHCI-PCI:修复由于缺少PCI_DEV_PUT()(CVE-2022-49787)引起的可能内存泄漏 | 2025-05-01 | ||
| AVD-2022-49772 | ALSA:USB-AUDIO:SND_USBMIDI_OUTPUT_OPEN()(CVE-2022-49772)的DROV SND_BUG_ON() | 2025-05-01 | ||
| AVD-2025-37796 | WiFi:AT76C50X:在AT76_Disconnect免费访问后修复使用(CVE-2025-37796) | 2025-05-01 | ||
| AVD-2025-37794 | WiFi:MAC80211:IEEE80211_DO_STOP()(CVE-2025-37794)中的Purge VIF TXQ | 2025-05-01 | ||
| AVD-2025-37793 | ASOC:Intel:AVS:AVS_COMPONENT_PROBE()(CVE-2025-37793)中的Null-Ptr-Deref | 2025-05-01 | ||
| AVD-2025-37792 | 蓝牙:btrtl:防止潜在的无效解雇(CVE-2025-37792) | 2025-05-01 | ||
| AVD-2025-37791 | EthTool:CMIS_CDB:在EthTool_CMIS_MODULE_POLL()(CVE-2025-37791)中使用正确的RPL大小 | 2025-05-01 | ||
| AVD-2025-37790 | NET:MCTP:SET SOCK_RCU_FREE(CVE-2025-37790) | 2025-05-01 | ||
| AVD-2025-37789 | NET:OpenVSwitch:固定嵌套的密钥长度验证()action(CVE-2025-37789) | 2025-05-01 | ||
| AVD-2025-37788 | CXGB4:修复内存泄漏CXGB4_INIT_ETHTOOL_FILTERS()错误路径(CVE-2025-37788) | 2025-05-01 |