搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49822 | CIFS:fix连接泄漏当TLink设置失败时(CVE-2022-49822) | 2025-05-01 | ||
| AVD-2022-49821 | MISDN:修复MISDN_DSP_ELEMENT_REGISTER中可能的内存泄漏()(CVE-2022-49821) | 2025-05-01 | ||
| AVD-2022-49820 | MCTP I2C:请勿计算未使用 /无效的流量释放键(CVE-2022-49820) | 2025-05-01 | ||
| AVD-2022-49819 | OCTEON_EP:修复Octep_device_setup()(CVE-2022-49819)中的潜在内存泄漏 | 2025-05-01 | ||
| AVD-2022-49818 | MISDN:修复误用put_device()在misdn_register_device()(CVE-2022-49818)中 | 2025-05-01 | ||
| AVD-2022-49817 | NET:MHI:修复MHI_NET_DELLINK()(CVE-2022-49817)中的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49815 | EROFS:FSCACHE模式下的XAS_RETRY()(CVE-2022-49815)中的XAS_RETRY() | 2025-05-01 | ||
| AVD-2022-49814 | KCM:SK_RECEIVE_QUEUE(CVE-2022-49814)上的近距离比赛条件 | 2025-05-01 | ||
| AVD-2022-49813 | NET:ENA:ENA_INIT()中的修复错误处理(CVE-2022-49813) | 2025-05-01 | ||
| AVD-2022-49812 | 桥梁:SwitchDev:更改VLAN协议时修复内存泄漏(CVE-2022-49812) | 2025-05-01 | ||
| AVD-2022-49811 | DRBD:在DRBD_CREATE_DEVICE()(CVE-2022-49811)中免费使用后使用。 | 2025-05-01 | ||
| AVD-2022-49810 | NETFS:修复缺少XAS_RETRY()在Xarray Iteration中调用(CVE-2022-49810) | 2025-05-01 | ||
| AVD-2022-49809 | net/x25:修复x25_lapb_receive_frame中的SKB泄漏()(CVE-2022-49809) | 2025-05-01 | ||
| AVD-2022-49808 | NET:DSA:请勿在开关驱动程序Unbind上泄漏标记器拥有的存储(CVE-2022-49808) | 2025-05-01 | ||
| AVD-2022-49807 | NVMET:修复NVMET_AUTH_SET_KEY中的内存泄漏(CVE-2022-49807) | 2025-05-01 | ||
| AVD-2022-49806 | 网络:Microchip:Sparx5:修复sparx_stats_init()和sparx5_start()(CVE-2022-49806)中的潜在null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49805 | 网络:LAN966X:在LAN966X_STATS_INIT()(CVE-2022-49805)中修复潜在的null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49804 | S390:避免使用current_stack_pointer的全局寄存器(CVE-2022-49804) | 2025-05-01 | ||
| AVD-2022-49803 | NETDEVSIM:修复NSIM_DEV-> FA_COOKIE的内存泄漏(CVE-2022-49803) | 2025-05-01 | ||
| AVD-2022-49802 | ftrace:fix ftrace_add_mod()(CVE-2022-49802)中的null指针解码 | 2025-05-01 | ||
| AVD-2022-49801 | 跟踪:修复记忆泄漏tracing_read_pipe()(CVE-2022-49801) | 2025-05-01 | ||
| AVD-2022-49800 | 跟踪:修复内存泄漏在test_gen_synth_cmd()和test_empty_synth_event()(CVE-2022-49800)中 | 2025-05-01 | ||
| AVD-2022-49799 | 跟踪:在register_synth_event()(CVE-2022-49799)中修复wild-memory-access | 2025-05-01 | ||
| AVD-2022-49798 | 跟踪:修复竞赛,在活动之前可以调用Eprobes(CVE-2022-49798) | 2025-05-01 | ||
| AVD-2022-49797 | 跟踪:kprobe:在kprobe_event_gen_test_exit()(cve-2022-49797)中,在trace_event_file上修复潜在的null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49796 | 跟踪:kprobe:在kprobe_event_gen_gen_test_exit()(CVE-2022-49796)中的Trace_Array上修复潜在的NULL-PTR-DEREF | 2025-05-01 | ||
| AVD-2022-49795 | Rethook:修复Rethook_alloc()(CVE-2022-49795)中的潜在memleak | 2025-05-01 | ||
| AVD-2022-49794 | IIO:ADC:AT91_ADC:修复AT91_ADC_ALLOCES_TRIGGER()(CVE-2022-49794)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49793 | IIO:触发器:SYSFS:修复IIO_SYSFS_TRIG_INIT()(CVE-2022-49793)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49792 | IIO:ADC:MP2629:将潜在阵列固定在边界访问中(CVE-2022-49792) | 2025-05-01 |