搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49830 | DRM/DRV:修复drm_dev_init()(CVE-2022-49830)中的潜在内存泄漏 | 2025-05-01 | ||
| AVD-2022-49829 | DRM/调度程序:修复围栏涉及计数(CVE-2022-49829) | 2025-05-01 | ||
| AVD-2022-49828 | HUGETLBFS:不要从PageCache删除错误页面(CVE-2022-49828) | 2025-05-01 | ||
| AVD-2022-49827 | DRM:修复drm_vblank_destroy_worker()(CVE-2022-49827)中的潜在null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49826 | ATA:Libata-Transport:ATA_TPORT_ADD()(CVE-2022-49826)中的Double ata_host_put() | 2025-05-01 | ||
| AVD-2022-49825 | ATA:LIBATA-TRANSPORT:ATA_TPORT_ADD()中的修复错误处理(CVE-2022-49825) | 2025-05-01 | ||
| AVD-2022-49824 | ATA:libata-transport:修复ATA_TLINK_ADD()中的错误处理(CVE-2022-49824) | 2025-05-01 | ||
| AVD-2022-49823 | ATA:libata-transport:修复ATA_TDEV_ADD中的错误处理()(CVE-2022-49823) | 2025-05-01 | ||
| AVD-2022-49822 | CIFS:fix连接泄漏当TLink设置失败时(CVE-2022-49822) | 2025-05-01 | ||
| AVD-2022-49821 | MISDN:修复MISDN_DSP_ELEMENT_REGISTER中可能的内存泄漏()(CVE-2022-49821) | 2025-05-01 | ||
| AVD-2022-49820 | MCTP I2C:请勿计算未使用 /无效的流量释放键(CVE-2022-49820) | 2025-05-01 | ||
| AVD-2022-49819 | OCTEON_EP:修复Octep_device_setup()(CVE-2022-49819)中的潜在内存泄漏 | 2025-05-01 | ||
| AVD-2022-49818 | MISDN:修复误用put_device()在misdn_register_device()(CVE-2022-49818)中 | 2025-05-01 | ||
| AVD-2022-49817 | NET:MHI:修复MHI_NET_DELLINK()(CVE-2022-49817)中的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49815 | EROFS:FSCACHE模式下的XAS_RETRY()(CVE-2022-49815)中的XAS_RETRY() | 2025-05-01 | ||
| AVD-2022-49814 | KCM:SK_RECEIVE_QUEUE(CVE-2022-49814)上的近距离比赛条件 | 2025-05-01 | ||
| AVD-2022-49813 | NET:ENA:ENA_INIT()中的修复错误处理(CVE-2022-49813) | 2025-05-01 | ||
| AVD-2022-49812 | 桥梁:SwitchDev:更改VLAN协议时修复内存泄漏(CVE-2022-49812) | 2025-05-01 | ||
| AVD-2022-49811 | DRBD:在DRBD_CREATE_DEVICE()(CVE-2022-49811)中免费使用后使用。 | 2025-05-01 | ||
| AVD-2022-49810 | NETFS:修复缺少XAS_RETRY()在Xarray Iteration中调用(CVE-2022-49810) | 2025-05-01 | ||
| AVD-2022-49809 | net/x25:修复x25_lapb_receive_frame中的SKB泄漏()(CVE-2022-49809) | 2025-05-01 | ||
| AVD-2022-49808 | NET:DSA:请勿在开关驱动程序Unbind上泄漏标记器拥有的存储(CVE-2022-49808) | 2025-05-01 | ||
| AVD-2022-49807 | NVMET:修复NVMET_AUTH_SET_KEY中的内存泄漏(CVE-2022-49807) | 2025-05-01 | ||
| AVD-2022-49806 | 网络:Microchip:Sparx5:修复sparx_stats_init()和sparx5_start()(CVE-2022-49806)中的潜在null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49805 | 网络:LAN966X:在LAN966X_STATS_INIT()(CVE-2022-49805)中修复潜在的null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49804 | S390:避免使用current_stack_pointer的全局寄存器(CVE-2022-49804) | 2025-05-01 | ||
| AVD-2022-49803 | NETDEVSIM:修复NSIM_DEV-> FA_COOKIE的内存泄漏(CVE-2022-49803) | 2025-05-01 | ||
| AVD-2022-49802 | ftrace:fix ftrace_add_mod()(CVE-2022-49802)中的null指针解码 | 2025-05-01 | ||
| AVD-2022-49801 | 跟踪:修复记忆泄漏tracing_read_pipe()(CVE-2022-49801) | 2025-05-01 | ||
| AVD-2022-49800 | 跟踪:修复内存泄漏在test_gen_synth_cmd()和test_empty_synth_event()(CVE-2022-49800)中 | 2025-05-01 |