搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49473 | asoc:ti:j721e-evm:修复j721e_soc_probe_**(CVE-2022-49473)中的修复重新数泄漏 | 2025-02-26 | ||
| AVD-2022-49472 | 网络:PHY:MICREL:允许不带.DRIVER_DATA的探测(CVE-2022-49472) | 2025-02-26 | ||
| AVD-2022-49471 | RTW89:CFO:检查MAC_ID以避免越野(CVE-2022-49471) | 2025-02-26 | ||
| AVD-2022-49470 | 蓝牙:BTMTKSDIO:在BTMTKSDIO_RECV_EVENT(CVE-2022-49470)上使用无用的使用。 | 2025-02-26 | ||
| AVD-2022-49469 | BTRFS:修复create_subvol()(CVE-2022-49469)中的ANON_DEV泄漏 | 2025-02-26 | ||
| AVD-2022-49468 | 热/核心:修复内存泄漏__thermal_cooling_device_register()(CVE-2022-49468) | 2025-02-26 | ||
| AVD-2022-49467 | DRM:MSM:修复MDP5_CRTC_CURSOR_SET()(CVE-2022-49467)中可能的内存泄漏 | 2025-02-26 | ||
| AVD-2022-49466 | 调节器:SCMI:SCMI_REGULATOR_PROBE(CVE-2022-49466)中的FIX重新数泄漏 | 2025-02-26 | ||
| AVD-2022-49465 | Blk-throttle:在投产生物时设置Bio_throttled(CVE-2022-49465) | 2025-02-26 | ||
| AVD-2022-49464 | EROF:修复缓冲区Ztailpacking功能的溢出(CVE-2022-49464) | 2025-02-26 | ||
| AVD-2022-49463 | 热/驱动程序/imx_sc_thermal:fix refcount泄漏IMX_SC_THERMAL_PROBE(CVE-2022-49463) | 2025-02-26 | ||
| AVD-2022-49462 | DRM/MSM/A6XX:修复重新计算泄漏A6XX_GPU_INIT(CVE-2022-49462) | 2025-02-26 | ||
| AVD-2022-49461 | AMT:修复广告消息的内存泄漏(CVE-2022-49461) | 2025-02-26 | ||
| AVD-2022-49460 | PM / DEVFREQ:RK3399_DMC:emove()(CVE-2022-49460)上的EDEV | 2025-02-26 | ||
| AVD-2022-49459 | 热/驱动器/broadcom:修复sr_thermal_probe中的潜在无效解释(CVE-2022-49459) | 2025-02-26 | ||
| AVD-2022-49458 | DRM/MSM:如果不要求IRQ,请勿释放IRQ(CVE-2022-49458) | 2025-02-26 | ||
| AVD-2022-49457 | ARM:VELSATILE:在DCSCB_INIT中添加of_node_put(CVE-2022-49457) | 2025-02-26 | ||
| AVD-2022-49456 | 键合:修复错过RCU保护(CVE-2022-49456) | 2025-02-26 | ||
| AVD-2022-49455 | MISC:OCXL:在OCXL_FILE_REGISTER_AFU中修复可能的双重免费(CVE-2022-49455) | 2025-02-26 | ||
| AVD-2022-49454 | PCI:MediAtek:MTK_PCIE_SUBSYS_POWERUP()(CVE-2022-49454)中的修复重新数泄漏 | 2025-02-26 | ||
| AVD-2022-49453 | SOC:TI:TI_SCI_PM_DOMAINS:检查devm_kcalloc的null返回(CVE-2022-49453) | 2025-02-26 | ||
| AVD-2022-49452 | DPAA2-ETH:在DMA_UNMAP之前检索虚拟地址(CVE-2022-49452) | 2025-02-26 | ||
| AVD-2022-49451 | 固件:ARM_SCMI:修复基本协议中的列表协议枚举(CVE-2022-49451) | 2025-02-26 | ||
| AVD-2022-49450 | RXRPC:修复Lister()设置杠铃太高,无法实现Prealloc戒指(CVE-2022-49450) | 2025-02-26 | ||
| AVD-2022-49449 | Pinctrl:Renesas:RZN1:修复SH_PFC_MAP_RESOURCES()(CVE-2022-49449)中的可能的null-ptr-deref | 2025-02-26 | ||
| AVD-2022-49448 | SOC:BCM:检查devm_kzalloc()(CVE-2022-49448)的null返回 | 2025-02-26 | ||
| AVD-2022-49447 | ARM:HISI:添加of_node_put之后添加_Find_compatible_node之后(CVE-2022-49447) | 2025-02-26 | ||
| AVD-2022-49446 | NVDIMM:修复固件激活僵局场景(CVE-2022-49446) | 2025-02-26 | ||
| AVD-2022-49445 | pinctrl:renesas:核心:修复SH_PFC_MAP_RESOURCES()(CVE-2022-49445)中的可能的null-ptr-deref | 2025-02-26 | ||
| AVD-2022-49444 | 模块:fix [e_shstrndx] .sh_size = 0 OOB访问(CVE-2022-49444) | 2025-02-26 |