搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49684 | IIO:ADC:ASPEED:修复ASPEED_ADC_SET_TRIM_DATA中的重新数泄漏(CVE-2022-49684) | 2025-02-26 | ||
| AVD-2022-49683 | IIO:ADC:ADI-AXI-ADC:ADI_AXI_ADC_ATTACH_CLIENT(CVE-2022-49683)中的修复重新计算泄漏 | 2025-02-26 | ||
| AVD-2022-49682 | XTENSA:FIX REFCBOUNT Leak bug in time.c(CVE-2022-49682) | 2025-02-26 | ||
| AVD-2022-49681 | XTENSA:XTFPGA:修复设置中的重新数泄漏错误(CVE-2022-49681) | 2025-02-26 | ||
| AVD-2022-49680 | ARM:EXYNOS:FIX REFCOUNT泄漏在Exynos_map_pmu(CVE-2022-49680)中 | 2025-02-26 | ||
| AVD-2022-49679 | ARM:AXXIA_BOOT_SECONDARY中的修复重新泄漏(CVE-2022-49679) | 2025-02-26 | ||
| AVD-2022-49678 | SOC:BCM:BRCMSTB:PM:PM-ARM:FIX REFCOUNT泄漏BRCMSTB_PM_PROBE(CVE-2022-49678) | 2025-02-26 | ||
| AVD-2022-49677 | ARM:CNS3XXX:CNS3XXX_INIT(CVE-2022-49677)中的修复重新数泄漏 | 2025-02-26 | ||
| AVD-2022-49676 | 内存:三星:exynos5422-dmc:fix refcount泄漏ef_get_dram_timings(CVE-2022-49676) | 2025-02-26 | ||
| AVD-2022-49675 | tick/nohz:unexport __init宣布的tick_nohz_full_setup()(CVE-2022-49675) | 2025-02-26 | ||
| AVD-2022-49674 | DM RAID:修复访问超出RAID成员阵列的末端(CVE-2022-49674) | 2025-02-26 | ||
| AVD-2022-49673 | DM RAID:修复RAID5_ADD_DISKS中的Kasan警告(CVE-2022-49673) | 2025-02-26 | ||
| AVD-2022-49672 | NET:TUN:破坏设备的Unlink NAPI(CVE-2022-49672) | 2025-02-26 | ||
| AVD-2022-49671 | RDMA/CM:修复内存泄漏IB_CM_INSERT_LISTEN(CVE-2022-49671) | 2025-02-26 | ||
| AVD-2022-49670 | linux/dim:在rdma dim(CVE-2022-49670)中固定除以0 | 2025-02-26 | ||
| AVD-2022-49669 | MPTCP:修复未接受的MPTCP插座的比赛(CVE-2022-49669) | 2025-02-26 | ||
| AVD-2022-49668 | PM / DEVFREQ:Exynos-PPMU:FIX REFCOUNT泄漏ef_get_devfreq_events(CVE-2022-49668) | 2025-02-26 | ||
| AVD-2022-49667 | 网络:键合:修复802.3AD奴隶解开后无使用时使用(CVE-2022-49667) | 2025-02-26 | ||
| AVD-2022-49666 | POWERPC/MEMHOTPLUG:add_pages ppc(CVE-2022-49666)替代 | 2025-02-26 | ||
| AVD-2022-49665 | 平台/X86:ThinkPad_ACPI:修复EFCH MMIO资源的内存泄漏(CVE-2022-49665) | 2025-02-26 | ||
| AVD-2022-49664 | TIPC:将BC链接创建回到TIPC_NODE_CREATE(CVE-2022-49664) | 2025-02-26 | ||
| AVD-2022-49663 | 隧道:不要假设在SKB_TUNNEL_CHECK_PMTU()(CVE-2022-49663)中设置Mac标头 | 2025-02-26 | ||
| AVD-2022-49662 | IPv6:修复in6_dump_addrs()(CVE-2022-49662)中的lockdep splat | 2025-02-26 | ||
| AVD-2022-49661 | CAN:GS_USB:GS_USB_OPEN/CLOSS():修复内存泄漏(CVE-2022-49661) | 2025-02-26 | ||
| AVD-2022-49659 | 可以:m_can:m_can_ {read_fifo,echo_tx_event}():将时间戳移至完整32位(CVE-2022-49659) | 2025-02-26 | ||
| AVD-2022-49658 | BPF:修复界限不足的范围传播,来自Adpad_scalar_min_max_vals(CVE-2022-49658) | 2025-02-26 | ||
| AVD-2022-49657 | USBNET:修复错误情况中的内存泄漏(CVE-2022-49657) | 2025-02-26 | ||
| AVD-2022-49656 | ARM:MESON:MESON_SMP_PREPARE_CPUS中的FIX重新数泄漏(CVE-2022-49656) | 2025-02-26 | ||
| AVD-2022-49655 | FSCACHE:修复无效/查找竞赛(CVE-2022-49655) | 2025-02-26 | ||
| AVD-2022-49654 | 网络:DSA:QCA8K:MTU变更上的重置CPU端口(CVE-2022-49654) | 2025-02-26 |