搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49382 | SOC:Rockchip:Rockchip_grf_init(CVE-2022-49382)中的修复重新数泄漏 | 2025-02-26 | ||
| AVD-2022-49381 | JFFS2:修复内存泄漏在JFFS2_DO_FILL_SUPER中(CVE-2022-49381) | 2025-02-26 | ||
| AVD-2022-49380 | F2FS:修复以避免在dec_valid_node_count()(CVE-2022-49380)中避免F2FS_BUG_ON() | 2025-02-26 | ||
| AVD-2022-49379 | 驱动程序核心:FIX WAIT_FOR_DEVICE_PROBE()&deferred_probe_timeout互动(CVE-2022-49379) | 2025-02-26 | ||
| AVD-2022-49378 | SFC:考虑所有通道都有TX队列(CVE-2022-49378),修复 | 2025-02-26 | ||
| AVD-2022-49377 | blk-mq:不要触摸 - > blk_mq_get_sq_hctx中的标签集(CVE-2022-49377) | 2025-02-26 | ||
| AVD-2022-49376 | SCSI:SD:修复潜在的无效指针解除(CVE-2022-49376) | 2025-02-26 | ||
| AVD-2022-49375 | RTC:MT6397:调用Platform_get_resource()(CVE-2022-49375)之后检查返回值 | 2025-02-26 | ||
| AVD-2022-49374 | 提示:检查载体名称的属性长度(CVE-2022-49374) | 2025-02-26 | ||
| AVD-2022-49373 | 看门狗:ts4800_wdt:修复ts4800_wdt_probe中的重新计算泄漏(CVE-2022-49373) | 2025-02-26 | ||
| AVD-2022-49372 | TCP:TCP_RTX_SYNACK()可以从过程上下文(CVE-2022-49372)调用 | 2025-02-26 | ||
| AVD-2022-49371 | 驱动器核心:修复__Device_attach(CVE-2022-49371)中的死锁 | 2025-02-26 | ||
| AVD-2022-49370 | 固件:DMI-SYSFS:修复DMI_SYSFS_REGISTER_HANDLE中的内存泄漏(CVE-2022-49370) | 2025-02-26 | ||
| AVD-2022-49369 | AMT:修复AMT_RCV()(CVE-2022-49369)中可能的内存泄漏 | 2025-02-26 | ||
| AVD-2022-49368 | net:以太网:mtk_eth_soc:读取MTK_HWLRO_GET_FDIR_ENTRY()(CVE-2022-49368) | 2025-02-26 | ||
| AVD-2022-49367 | net:DSA:MV88E6XXX:修复重新数泄漏MV88E6XXX_MDIOS_REGISTER(CVE-2022-49367) | 2025-02-26 | ||
| AVD-2022-49366 | ksmbd:修复参考计数泄漏中的smb_check_perm_dacl()(CVE-2022-49366) | 2025-02-26 | ||
| AVD-2022-49365 | DRM/AMDGPU:在DM_DMUB_OUTBOX1_LOW_IRQ()(CVE-2022-49365)中oft | 2025-02-26 | ||
| AVD-2022-49364 | F2FS:修复以清除F2FS_EVICT_INODE()(CVE-2022-49364)中的Dirty Inode | 2025-02-26 | ||
| AVD-2022-49363 | F2FS:修复以进行理智检查F2FS_DO_ZERO_RANGE()(CVE-2022-49363)中的块地址 | 2025-02-26 | ||
| AVD-2022-49362 | NFSD:在NFSD_FILE_PUT()(CVE-2022-49362)中修复潜在的使用 - | 2025-02-26 | ||
| AVD-2022-49361 | F2FS:修复以进行理智检查Inline Inode(CVE-2022-49361) | 2025-02-26 | ||
| AVD-2022-49360 | F2FS:修复理智的检查total_data_blocks(CVE-2022-49360) | 2025-02-26 | ||
| AVD-2022-49359 | DRM/PanFrost:作业应参考MMU不file_priv(CVE-2022-49359) | 2025-02-26 | ||
| AVD-2022-49358 | NETFILTER:NF_TABLES:MEMLEAK FLOW规则来自提交路径(CVE-2022-49358) | 2025-02-26 | ||
| AVD-2022-49357 | EFI:请勿从UEFI Secure Boot的T2 MAC进口证书(CVE-2022-49357) | 2025-02-26 | ||
| AVD-2022-49356 | SUNRPC:陷阱RDMA段溢出(CVE-2022-49356) | 2025-02-26 | ||
| AVD-2022-49354 | ATA:PATA_OCTEON_CF:修复重新计算泄漏(CVE-2022-49354) | 2025-02-26 | ||
| AVD-2022-49353 | POWERPC/papr_scm:请勿请求使用“ 0”大小的统计缓冲区(CVE-2022-49353)请求统计信息 | 2025-02-26 | ||
| AVD-2022-49352 | EXT4:ext4_handle_inode_extension中的修复警告(CVE-2022-49352) | 2025-02-26 |