搜索结果
关于「linux_kernel」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49799 | 跟踪:在register_synth_event()(CVE-2022-49799)中修复wild-memory-access | 2025-05-01 | ||
| AVD-2022-49798 | 跟踪:修复竞赛,在活动之前可以调用Eprobes(CVE-2022-49798) | 2025-05-01 | ||
| AVD-2022-49797 | 跟踪:kprobe:在kprobe_event_gen_test_exit()(cve-2022-49797)中,在trace_event_file上修复潜在的null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49796 | 跟踪:kprobe:在kprobe_event_gen_gen_test_exit()(CVE-2022-49796)中的Trace_Array上修复潜在的NULL-PTR-DEREF | 2025-05-01 | ||
| AVD-2022-49795 | Rethook:修复Rethook_alloc()(CVE-2022-49795)中的潜在memleak | 2025-05-01 | ||
| AVD-2022-49794 | IIO:ADC:AT91_ADC:修复AT91_ADC_ALLOCES_TRIGGER()(CVE-2022-49794)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49793 | IIO:触发器:SYSFS:修复IIO_SYSFS_TRIG_INIT()(CVE-2022-49793)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49792 | IIO:ADC:MP2629:将潜在阵列固定在边界访问中(CVE-2022-49792) | 2025-05-01 | ||
| AVD-2022-49791 | io_uring:修复Multishot接受请求泄漏(CVE-2022-49791) | 2025-05-01 | ||
| AVD-2022-49790 | 输入:Iforce-倒置有效长度检查时在获取设备ID时检查(CVE-2022-49790) | 2025-05-01 | ||
| AVD-2022-49789 | SCSI:ZFCP:QDIO发送失败时,请免费解决FSF请求的双重修复(CVE-2022-49789) | 2025-05-01 | ||
| AVD-2022-49788 | MISC/VMW_VMCI:修复vmci_host_do_receive_datagram()(CVE-2022-49788)中的Infoleak | 2025-05-01 | ||
| AVD-2022-49787 | MMC:SDHCI-PCI:修复由于缺少PCI_DEV_PUT()(CVE-2022-49787)引起的可能内存泄漏 | 2025-05-01 | ||
| AVD-2022-49786 | blk-group:在blkcg_css_online中正确固定父母(CVE-2022-49786) | 2025-05-01 | ||
| AVD-2022-49785 | x86/sgx:添加溢出检查sgx_validate_offset_length()(CVE-2022-49785) | 2025-05-01 | ||
| AVD-2022-49784 | perf/x86/amd/uncore:修复事件阵列的内存泄漏(CVE-2022-49784) | 2025-05-01 | ||
| AVD-2022-49783 | x86/fpu:在继承FPU权限之前删除FPREGS锁定(CVE-2022-49783) | 2025-05-01 | ||
| AVD-2022-49782 | perf:提高缺失的sigtrap检查(CVE-2022-49782) | 2025-05-01 | ||
| AVD-2022-49781 | perf/x86/amd:由于AMD_PMU_ENABLE_ALL,PERF NMI和TOLTOTTLING之间的竞赛而引起的修复崩溃(CVE-2022-49781) | 2025-05-01 | ||
| AVD-2022-49780 | SCSI:目标:TCM_LOOP:修复TCM_LOOP_SETUP_HBA_BUS()(CVE-2022-49780)中可能的名称泄漏 | 2025-05-01 | ||
| AVD-2022-49779 | Kprobes:跳过kprobe-on-frace案例中的aggrprobe的post_handler(CVE-2022-49779) | 2025-05-01 | ||
| AVD-2022-49778 | ARM64/mm:非叶子PMD/PUD(CVE-2022-49778)修复错误的File_map_count | 2025-05-01 | ||
| AVD-2022-49777 | 输入:i8042-修复平台设备在模块拆卸上的泄漏(CVE-2022-49777) | 2025-05-01 | ||
| AVD-2022-49776 | MacVlan:执行一致的最小MTU(CVE-2022-49776) | 2025-05-01 | ||
| AVD-2022-49775 | TCP:CDG:允许TCP_CDG_RELEASE()多次调用(CVE-2022-49775) | 2025-05-01 | ||
| AVD-2022-49774 | KVM:X86/XEN:修复EventFD错误处理KVM_XEN_EVENTFD_ASSIGN()(CVE-2022-49774) | 2025-05-01 | ||
| AVD-2022-49773 | DRM/AMD/DISPLAY:fix optc2_configure警告DCN314(CVE-2022-49773) | 2025-05-01 | ||
| AVD-2022-49772 | ALSA:USB-AUDIO:SND_USBMIDI_OUTPUT_OPEN()(CVE-2022-49772)的DROV SND_BUG_ON() | 2025-05-01 | ||
| AVD-2022-49771 | DM ioctl:修复行为不当,如果List_versions与模块加载赛车(CVE-2022-49771) | 2025-05-01 | ||
| AVD-2022-49770 | CEPH:解码快照失败时避免将领域放置两次(CVE-2022-49770) | 2025-05-01 |