搜索结果
关于「linux」的漏洞数据
| AVD编号 | 漏洞名称 | 漏洞类型 | 披露时间 | 漏洞状态 |
|---|---|---|---|---|
| AVD-2022-49805 | 网络:LAN966X:在LAN966X_STATS_INIT()(CVE-2022-49805)中修复潜在的null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49804 | S390:避免使用current_stack_pointer的全局寄存器(CVE-2022-49804) | 2025-05-01 | ||
| AVD-2022-49803 | NETDEVSIM:修复NSIM_DEV-> FA_COOKIE的内存泄漏(CVE-2022-49803) | 2025-05-01 | ||
| AVD-2022-49802 | ftrace:fix ftrace_add_mod()(CVE-2022-49802)中的null指针解码 | 2025-05-01 | ||
| AVD-2022-49801 | 跟踪:修复记忆泄漏tracing_read_pipe()(CVE-2022-49801) | 2025-05-01 | ||
| AVD-2022-49800 | 跟踪:修复内存泄漏在test_gen_synth_cmd()和test_empty_synth_event()(CVE-2022-49800)中 | 2025-05-01 | ||
| AVD-2022-49799 | 跟踪:在register_synth_event()(CVE-2022-49799)中修复wild-memory-access | 2025-05-01 | ||
| AVD-2022-49798 | 跟踪:修复竞赛,在活动之前可以调用Eprobes(CVE-2022-49798) | 2025-05-01 | ||
| AVD-2022-49797 | 跟踪:kprobe:在kprobe_event_gen_test_exit()(cve-2022-49797)中,在trace_event_file上修复潜在的null-ptr-deref | 2025-05-01 | ||
| AVD-2022-49796 | 跟踪:kprobe:在kprobe_event_gen_gen_test_exit()(CVE-2022-49796)中的Trace_Array上修复潜在的NULL-PTR-DEREF | 2025-05-01 | ||
| AVD-2022-49795 | Rethook:修复Rethook_alloc()(CVE-2022-49795)中的潜在memleak | 2025-05-01 | ||
| AVD-2022-49794 | IIO:ADC:AT91_ADC:修复AT91_ADC_ALLOCES_TRIGGER()(CVE-2022-49794)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49793 | IIO:触发器:SYSFS:修复IIO_SYSFS_TRIG_INIT()(CVE-2022-49793)中可能的内存泄漏 | 2025-05-01 | ||
| AVD-2022-49792 | IIO:ADC:MP2629:将潜在阵列固定在边界访问中(CVE-2022-49792) | 2025-05-01 | ||
| AVD-2022-49791 | io_uring:修复Multishot接受请求泄漏(CVE-2022-49791) | 2025-05-01 | ||
| AVD-2022-49790 | 输入:Iforce-倒置有效长度检查时在获取设备ID时检查(CVE-2022-49790) | 2025-05-01 | ||
| AVD-2022-49789 | SCSI:ZFCP:QDIO发送失败时,请免费解决FSF请求的双重修复(CVE-2022-49789) | 2025-05-01 | ||
| AVD-2022-49788 | MISC/VMW_VMCI:修复vmci_host_do_receive_datagram()(CVE-2022-49788)中的Infoleak | 2025-05-01 | ||
| AVD-2022-49787 | MMC:SDHCI-PCI:修复由于缺少PCI_DEV_PUT()(CVE-2022-49787)引起的可能内存泄漏 | 2025-05-01 | ||
| AVD-2022-49786 | blk-group:在blkcg_css_online中正确固定父母(CVE-2022-49786) | 2025-05-01 | ||
| AVD-2022-49785 | x86/sgx:添加溢出检查sgx_validate_offset_length()(CVE-2022-49785) | 2025-05-01 | ||
| AVD-2022-49784 | perf/x86/amd/uncore:修复事件阵列的内存泄漏(CVE-2022-49784) | 2025-05-01 | ||
| AVD-2022-49783 | x86/fpu:在继承FPU权限之前删除FPREGS锁定(CVE-2022-49783) | 2025-05-01 | ||
| AVD-2022-49782 | perf:提高缺失的sigtrap检查(CVE-2022-49782) | 2025-05-01 | ||
| AVD-2022-49781 | perf/x86/amd:由于AMD_PMU_ENABLE_ALL,PERF NMI和TOLTOTTLING之间的竞赛而引起的修复崩溃(CVE-2022-49781) | 2025-05-01 | ||
| AVD-2022-49780 | SCSI:目标:TCM_LOOP:修复TCM_LOOP_SETUP_HBA_BUS()(CVE-2022-49780)中可能的名称泄漏 | 2025-05-01 | ||
| AVD-2022-49779 | Kprobes:跳过kprobe-on-frace案例中的aggrprobe的post_handler(CVE-2022-49779) | 2025-05-01 | ||
| AVD-2022-49778 | ARM64/mm:非叶子PMD/PUD(CVE-2022-49778)修复错误的File_map_count | 2025-05-01 | ||
| AVD-2022-49777 | 输入:i8042-修复平台设备在模块拆卸上的泄漏(CVE-2022-49777) | 2025-05-01 | ||
| AVD-2022-49776 | MacVlan:执行一致的最小MTU(CVE-2022-49776) | 2025-05-01 |