搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49410 | 跟踪:在create_var_ref()(CVE-2022-49410)中修复电位双免费 | 2025-02-26 | ||
| AVD-2022-49409 | EXT4:fix bug_on在__es_tree_search(CVE-2022-49409)中 | 2025-02-26 | ||
| AVD-2022-49408 | EXT4:修复内存泄漏,parse_apply_sb_mount_options()(CVE-2022-49408) | 2025-02-26 | ||
| AVD-2022-49407 | DLM:修复Plock无效读取(CVE-2022-49407) | 2025-02-26 | ||
| AVD-2022-49406 | 块:blk_ia_range_sysfs_show()(CVE-2022-49406)中的潜在僵局 | 2025-02-26 | ||
| AVD-2022-49405 | 分期:R8188EU:预防 - > rtw_wx_set_scan()(CVE-2022-49405)中的SSID溢出 | 2025-02-26 | ||
| AVD-2022-49404 | RDMA/HFI1:修复潜在的整数乘法溢出错误(CVE-2022-49404) | 2025-02-26 | ||
| AVD-2022-49403 | lib/string_helpers:修复不在设备的资源列表(CVE-2022-49403)中添加Strarray | 2025-02-26 | ||
| AVD-2022-49402 | ftrace:清理寄存器故障上的Hash Direct_functions(CVE-2022-49402) | 2025-02-26 | ||
| AVD-2022-49401 | mm/page_owner:使用strscpy()代替strlcpy()(CVE-2022-49401) | 2025-02-26 | ||
| AVD-2022-49400 | MD:不要将MDDEV私有设置为raid0 pers-> free(CVE-2022-49400) | 2025-02-26 | ||
| AVD-2022-49399 | TTY:Goldfish:使用TTY_PORT_DESTROY()销毁端口(CVE-2022-49399) | 2025-02-26 | ||
| AVD-2022-49398 | USB:DWC3:小工具:替换list_for_each_entry_safe()如果使用放电(CVE-2022-49398) | 2025-02-26 | ||
| AVD-2022-49397 | PHY:QCOM-QMP:修复探针错误上的结构CLK泄漏(CVE-2022-49397) | 2025-02-26 | ||
| AVD-2022-49396 | PHY:QCOM-QMP:修复探针错误上的重置控制器泄漏(CVE-2022-49396) | 2025-02-26 | ||
| AVD-2022-49395 | UM:在LDT设置(CVE-2022-49395)中读取的修复外部读取 | 2025-02-26 | ||
| AVD-2022-49394 | blk-iolatiency:修复机上计数不平衡,IO悬挂在离线上(CVE-2022-49394) | 2025-02-26 | ||
| AVD-2022-49393 | MISC:FASTRPC:FIX LIST ITERATOR在Fastrpc_req_mem_unmap_impl(CVE-2022-49393) | 2025-02-26 | ||
| AVD-2022-49392 | 序列:8250_aspeed_vuart:修复Aspeed_vuart_probe中的潜在null解释(CVE-2022-49392) | 2025-02-26 | ||
| AVD-2022-49391 | remoteproc:mtk_scp:修复潜在的双免费(CVE-2022-49391) | 2025-02-26 | ||
| AVD-2022-49390 | MACSEC:修复real_dev的UAF错误(CVE-2022-49390) | 2025-02-26 | ||
| AVD-2022-49389 | USB:USBIP:修复stub_probe()(CVE-2022-49389)中的重新数泄漏 | 2025-02-26 | ||
| AVD-2022-49388 | UBI:UBI_CREATE_VOLUME:在创建卷失败时不使用时使用(CVE-2022-49388) | 2025-02-26 | ||
| AVD-2022-49387 | 看门狗:RZG2L_WDT:修复32位溢出问题(CVE-2022-49387) | 2025-02-26 | ||
| AVD-2022-49386 | 网络:以太网:TI:AM65-CPSW-NUSS:修复一些重新泄漏(CVE-2022-49386) | 2025-02-26 | ||
| AVD-2022-49385 | 驱动程序:基础:driver_attach失败时修复UAF(CVE-2022-49385) | 2025-02-26 | ||
| AVD-2022-49384 | MD:Fix double for IO_ACCT_SET BIOSET(CVE-2022-49384) | 2025-02-26 | ||
| AVD-2022-49383 | 看门狗:rzg2l_wdt:修复'错误:无效等待上下文'(CVE-2022-49383) | 2025-02-26 | ||
| AVD-2022-49382 | SOC:Rockchip:Rockchip_grf_init(CVE-2022-49382)中的修复重新数泄漏 | 2025-02-26 | ||
| AVD-2022-49381 | JFFS2:修复内存泄漏在JFFS2_DO_FILL_SUPER中(CVE-2022-49381) | 2025-02-26 |