搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49351 | net:Altera:修复重新计算泄漏中的Altera_tse_mdio_create(CVE-2022-49351) | 2025-02-26 | ||
| AVD-2022-49350 | 网络:mdio:unexport __init宣布的mdio_bus_init()(CVE-2022-49350) | 2025-02-26 | ||
| AVD-2022-49349 | EXT4:ext4_rename_dir_prepare(CVE-2022-49349) | 2025-02-26 | ||
| AVD-2022-49348 | EXT4:从磁盘超级屏蔽字段S_STATE过滤ext4_fc_replay(CVE-2022-49348) | 2025-02-26 | ||
| AVD-2022-49347 | ext4:fix bug_on在ext4_writepages(CVE-2022-49347)中 | 2025-02-26 | ||
| AVD-2022-49346 | 网络:DSA:lantiq_gswip:gswip_gphy_fw_list(cve-2022-49346)中的修复重新计算泄漏 | 2025-02-26 | ||
| AVD-2022-49345 | net:XFRM:unexport __init宣布的XFRM4_PROTOCOL_INIT()(CVE-2022-49345) | 2025-02-26 | ||
| AVD-2022-49344 | af_unix:修复unix_dgram_peer_wake_me()中的数据率。 (CVE-2022-49344) | 2025-02-26 | ||
| AVD-2022-49343 | EXT4:避免在目录H-Tree中的周期(CVE-2022-49343)中 | 2025-02-26 | ||
| AVD-2022-49342 | 网络:以太网:bgmac:修复重新计算泄漏bcma_mdio_mii_register(CVE-2022-49342) | 2025-02-26 | ||
| AVD-2022-49341 | BPF,ARM64:沿Prog-> JIDED(CVE-2022-49341)的清除prog-> jited_len | 2025-02-26 | ||
| AVD-2022-49340 | IP_GRE:测试CSUM_START代替运输标头(CVE-2022-49340) | 2025-02-26 | ||
| AVD-2022-49339 | net:ipv6:unexport __init宣布的seg6_hmac_init()(CVE-2022-49339) | 2025-02-26 | ||
| AVD-2022-49338 | NET/MLX5E:CT:在清理TC CT规则之前修复CT的清理(CVE-2022-49338) | 2025-02-26 | ||
| AVD-2022-49337 | OCFS2:DLMFS:修复USE_DLM_DESTROY_LOCK的错误处理(CVE-2022-49337) | 2025-02-26 | ||
| AVD-2022-49336 | DRM/etnaviv:在etnaviv_iommu_unmap_gem(CVE-2022-49336)中查看收获映射 | 2025-02-26 | ||
| AVD-2022-49335 | DRM/AMDGPU/CS:用0个块非法行为制作命令。 (CVE-2022-49335) | 2025-02-26 | ||
| AVD-2022-49334 | MM/gumet_memory:修复Xarray节点内存泄漏(CVE-2022-49334) | 2025-02-26 | ||
| AVD-2022-49333 | NET/MLX5:E-E-SWitch,仅配对功能的设备(CVE-2022-49333) | 2025-02-26 | ||
| AVD-2022-49332 | SCSI:lpfc:saterget_to_rport()(CVE-2022-49332)之后的null指针删除 | 2025-02-26 | ||
| AVD-2022-49331 | NFC:ST21NFCA:修复EVT_Transaction处理中的内存泄漏(CVE-2022-49331) | 2025-02-26 | ||
| AVD-2022-49330 | TCP:修复TCP_MTUP_PROBE_SUCCESS与错误的SND_CWND(CVE-2022-49330) | 2025-02-26 | ||
| AVD-2022-49329 | VDUSE:修复NULL指针在SYSFS访问(CVE-2022-49329)上取消指示 | 2025-02-26 | ||
| AVD-2022-49328 | MT76:通过删除非RCU WCID指针(CVE-2022-49328)来修复无用的使用。 | 2025-02-26 | ||
| AVD-2022-49327 | BCACHE:避免通过预订1个期刊桶(CVE-2022-49327)来避免日报无空间僵局 | 2025-02-26 | ||
| AVD-2022-49326 | RTL818X:防止不使用初始化队列(CVE-2022-49326) | 2025-02-26 | ||
| AVD-2022-49325 | TCP:将登录器添加到阅读/设置TP-> SND_CWND(CVE-2022-49325) | 2025-02-26 | ||
| AVD-2022-49324 | MIPS:CPC:MIPS_CPC_DEFAULT_PHYS_BASE中的修复重新计算泄漏(CVE-2022-49324) | 2025-02-26 | ||
| AVD-2022-49323 | iommu/arm-smmu:修复ARM_SMMU_DEVICE_PROBE()(CVE-2022-49323)中可能的Null-Ptr-Deref | 2025-02-26 | ||
| AVD-2022-49322 | 跟踪:修复睡眠功能从RT内核上的无效上下文调用(CVE-2022-49322) | 2025-02-26 |