Search for packages
| purl | pkg:alpm/archlinux/linux-zen@5.17.2.zen3-1 |
| Next non-vulnerable version | 5.17.3.zen1-1 |
| Latest non-vulnerable version | 6.2-1 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-11yc-kbzp-4kca
Aliases: CVE-2022-1205 |
kernel: Null pointer dereference and use after free in net/ax25/ax25_timer.c |
Affected by 0 other vulnerabilities. |
|
VCID-4xaf-p3np-2kbp
Aliases: CVE-2022-1158 |
kernel: KVM: cmpxchg_gpte can write to pfns outside the userspace region |
Affected by 0 other vulnerabilities. |
|
VCID-5pt2-wwc2-zbfy
Aliases: CVE-2022-1016 |
kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM |
Affected by 0 other vulnerabilities. |
|
VCID-5x2q-9c69-ybfx
Aliases: CVE-2022-1195 |
kernel: A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after unregister_netdev |
Affected by 0 other vulnerabilities. |
|
VCID-adpr-958r-eke7
Aliases: CVE-2022-1048 |
kernel: race condition in snd_pcm_hw_free leading to use-after-free |
Affected by 0 other vulnerabilities. |
|
VCID-f9md-7hmr-qucr
Aliases: CVE-2022-0168 |
kernel: smb2_ioctl_query_info NULL pointer dereference |
Affected by 0 other vulnerabilities. |
|
VCID-jptx-14zk-5bat
Aliases: CVE-2022-1353 |
kernel: kernel info leak issue in pfkey_register |
Affected by 0 other vulnerabilities. |
|
VCID-kabz-9vtq-y3hh
Aliases: CVE-2022-1199 |
kernel: Null pointer dereference and use after free in ax25_release() |
Affected by 0 other vulnerabilities. |
|
VCID-mcws-28bv-57fu
Aliases: CVE-2022-29582 |
kernel: Race condition that allows container escape to system root |
Affected by 0 other vulnerabilities. |
|
VCID-nx44-nkyq-fucj
Aliases: CVE-2022-28389 |
kernel: a double free in mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c |
Affected by 0 other vulnerabilities. |
|
VCID-pv2y-hzvr-hyad
Aliases: CVE-2022-28390 |
kernel: double free in ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c |
Affected by 0 other vulnerabilities. |
|
VCID-qr9t-hvpr-17dd
Aliases: CVE-2022-27666 |
kernel: buffer overflow in IPsec ESP transformation code |
Affected by 0 other vulnerabilities. |
|
VCID-t7v5-quk6-zqhz
Aliases: CVE-2022-26490 |
kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca |
Affected by 0 other vulnerabilities. |
|
VCID-tvtr-wtbs-jkhk
Aliases: CVE-2022-1516 |
kernel: null-ptr-deref caused by x25_disconnect |
Affected by 0 other vulnerabilities. |
|
VCID-ufjv-zjxw-uufm
Aliases: CVE-2022-1204 |
kernel: Use after free in net/ax25/af_ax25.c |
Affected by 0 other vulnerabilities. |
|
VCID-wxfm-2u2z-euad
Aliases: CVE-2022-28388 |
kernel: double free in usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c |
Affected by 0 other vulnerabilities. |
|
VCID-xx3h-3cmf-f7ct
Aliases: CVE-2022-1015 |
kernel: arbitrary code execution in linux/net/netfilter/nf_tables_api.c |
Affected by 0 other vulnerabilities. |
|
VCID-ygfh-8nsv-zkbb
Aliases: CVE-2022-1198 |
kernel: use-after-free in drivers/net/hamradio/6pack.c |
Affected by 0 other vulnerabilities. |
|
VCID-zt7m-55n5-3ygp
Aliases: CVE-2021-4197 |
kernel: cgroup: Use open-time creds and namespace for migration perm checks |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:25:07.888183+00:00 | Arch Linux Importer | Affected by | VCID-mcws-28bv-57fu | https://security.archlinux.org/AVG-2693 | 38.0.0 |
| 2026-04-01T18:25:07.141529+00:00 | Arch Linux Importer | Affected by | VCID-zt7m-55n5-3ygp | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:07.120206+00:00 | Arch Linux Importer | Affected by | VCID-f9md-7hmr-qucr | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:07.099544+00:00 | Arch Linux Importer | Affected by | VCID-xx3h-3cmf-f7ct | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:07.076194+00:00 | Arch Linux Importer | Affected by | VCID-5pt2-wwc2-zbfy | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:07.047074+00:00 | Arch Linux Importer | Affected by | VCID-adpr-958r-eke7 | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:07.021115+00:00 | Arch Linux Importer | Affected by | VCID-4xaf-p3np-2kbp | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.997003+00:00 | Arch Linux Importer | Affected by | VCID-5x2q-9c69-ybfx | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.973741+00:00 | Arch Linux Importer | Affected by | VCID-ygfh-8nsv-zkbb | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.952033+00:00 | Arch Linux Importer | Affected by | VCID-kabz-9vtq-y3hh | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.927905+00:00 | Arch Linux Importer | Affected by | VCID-ufjv-zjxw-uufm | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.904416+00:00 | Arch Linux Importer | Affected by | VCID-11yc-kbzp-4kca | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.881730+00:00 | Arch Linux Importer | Affected by | VCID-jptx-14zk-5bat | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.856747+00:00 | Arch Linux Importer | Affected by | VCID-tvtr-wtbs-jkhk | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.834478+00:00 | Arch Linux Importer | Affected by | VCID-t7v5-quk6-zqhz | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.813079+00:00 | Arch Linux Importer | Affected by | VCID-qr9t-hvpr-17dd | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.790526+00:00 | Arch Linux Importer | Affected by | VCID-wxfm-2u2z-euad | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.768954+00:00 | Arch Linux Importer | Affected by | VCID-nx44-nkyq-fucj | https://security.archlinux.org/AVG-2699 | 38.0.0 |
| 2026-04-01T18:25:06.747264+00:00 | Arch Linux Importer | Affected by | VCID-pv2y-hzvr-hyad | https://security.archlinux.org/AVG-2699 | 38.0.0 |