搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49292 | ALSA:OSS:修复PCM OSS缓冲分配溢出(CVE-2022-49292) | 2025-02-26 | ||
| AVD-2022-49291 | ALSA:PCM:修复并发HW_PARAMS和HW_FREE呼叫之间的比赛(CVE-2022-49291) | 2025-02-26 | ||
| AVD-2022-49290 | MAC80211:在网状Join上修复潜在双免费(CVE-2022-49290) | 2025-02-26 | ||
| AVD-2022-49289 | UACCESS:fix Integer Overflow上的access_ok()(CVE-2022-49289) | 2025-02-26 | ||
| AVD-2022-49288 | ALSA:PCM:修复并发的PREALLOC PROC写作(CVE-2022-49288) | 2025-02-26 | ||
| AVD-2022-49287 | TPM:struct tpm_chip的修复参考计数(CVE-2022-49287) | 2025-02-26 | ||
| AVD-2022-49286 | tpm:在tpm-space.c中使用try_get_ops()(CVE-2022-49286) | 2025-02-26 | ||
| AVD-2022-49285 | IIO:ACCEL:MMA8452:使用正确的逻辑获取MMA8452_DATA(CVE-2022-49285) | 2025-02-26 | ||
| AVD-2022-49284 | Coresight:SYSCFG:修复CSCFG_CREATE_DEVICE中的注册失败(CVE-2022-49284) | 2025-02-26 | ||
| AVD-2022-49283 | 固件:SYSFB:修复了错误路径中的平台设备泄漏(CVE-2022-49283) | 2025-02-26 | ||
| AVD-2022-49282 | F2FS:配额:F2FS_QUOTA_SYNC()(CVE-2022-49282)的修复环条件 | 2025-02-26 | ||
| AVD-2022-49281 | CIFS:FIX HANDLECACHE和MULTIUSER(CVE-2022-49281) | 2025-02-26 | ||
| AVD-2022-49280 | NFSD:在NFSSVC_DECODE_WRITEARGS()(CVE-2022-49280)中预防底流量 | 2025-02-26 | ||
| AVD-2022-49279 | NFSD:防止32位系统上的整数溢出(CVE-2022-49279) | 2025-02-26 | ||
| AVD-2022-49278 | remoteproc:修复计数检查在RPROC_COREDUMP_WRITE()(CVE-2022-49278)中 | 2025-02-26 | ||
| AVD-2022-49277 | JFFS2:修复记忆泄漏在JFFS2_DO_MOUNT_FS中(CVE-2022-49277) | 2025-02-26 | ||
| AVD-2022-49276 | JFFS2:修复记忆泄漏在JFFS2_SCAN_MEDIUM中(CVE-2022-49276) | 2025-02-26 | ||
| AVD-2022-49275 | CAN:M_CAN:M_CAN_TX_HANDLER():免费使用SKB后使用(CVE-2022-49275) | 2025-02-26 | ||
| AVD-2022-49274 | OCFS2:启用配额安装时修复崩溃(CVE-2022-49274) | 2025-02-26 | ||
| AVD-2022-49273 | RTC:PL031:FIX RTC功能NULL指针解除(CVE-2022-49273) | 2025-02-26 | ||
| AVD-2022-49272 | ALSA:PCM:使用Buffer_Mutex和MMAP_LOCK(CVE-2022-49272)修复潜在的AB/BA锁 | 2025-02-26 | ||
| AVD-2022-49271 | CIFS:预防SMB2_IOCTL_QUERY_INFO()(CVE-2022-49271)中的不良输出长度 | 2025-02-26 | ||
| AVD-2022-49270 | DM:dm_cleanup_zoned_dev()(CVE-2022-49270) | 2025-02-26 | ||
| AVD-2022-49269 | CAN:ISOTP:ISOTP_BIND()(CVE-2022-49269)中的Sanitize CAN ID检查 | 2025-02-26 | ||
| AVD-2022-49268 | ASOC:SOF:INTEL:INOMEM(CVE-2022-49268)时修复NULL PTR解释 | 2025-02-26 | ||
| AVD-2022-49267 | MMC:核心:使用sysfs_emit()代替sprintf()(CVE-2022-49267) | 2025-02-26 | ||
| AVD-2022-49266 | 块:修复RQ-QOS从跳过RQ_QOS_DONE_BIO()(CVE-2022-49266) | 2025-02-26 | ||
| AVD-2022-49265 | PM:域:修复由genpd_debug_remove()(CVE-2022-49265)引起的原子错误 | 2025-02-26 | ||
| AVD-2022-49264 | 执行:ARGV为空时强制单个空字符串(CVE-2022-49264) | 2025-02-26 | ||
| AVD-2022-49263 | BRCMFMAC:PCIE:BRCMF_PCIE_SETUP错误路径(CVE-2022-49263) | 2025-02-26 |