Search for packages
| purl | pkg:deb/debian/linux@3.16.7-ckt4-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6wjn-gmdm-yfdg | security update |
CVE-2014-9584
|
| VCID-7b7c-qxa7-pufw | Kernel: fs: udf: heap overflow in __udf_adinicb_readpage |
CVE-2014-9729
|
| VCID-cc9g-r15p-93gg | Kernel: fs: udf: heap overflow in __udf_adinicb_readpage |
CVE-2014-9730
|
| VCID-dq8f-fyea-a3ar | security update |
CVE-2014-9419
|
| VCID-h3qg-1tqs-jked | security update |
CVE-2014-8133
|
| VCID-jtz8-fnxy-r3f8 | kernel: Linux user namespaces can bypass group-based restrictions |
CVE-2014-8989
|
| VCID-jvxb-e9wn-5fb5 | security update |
CVE-2014-9683
|
| VCID-m43z-jeaz-7yh2 | security update |
CVE-2014-8160
|
| VCID-mg4n-r63g-zfgx | security update |
CVE-2014-9585
|
| VCID-n2et-3yjp-2beb | kernel: remote denial of service via batman-adv module |
CVE-2014-9428
|
| VCID-nw7e-at9p-1bfm | security update |
CVE-2014-9529
|
| VCID-pm57-a4vz-u3gn | kernel: x86: espfix not working for 32-bit KVM paravirt guests |
CVE-2014-8134
|
| VCID-qsyy-vt33-vues | Kernel: fs: udf: heap overflow in __udf_adinicb_readpage |
CVE-2014-9728
|
| VCID-sf9w-ubp4-rqaz | Kernel: fs: isofs: infinite loop in CE record entries |
CVE-2014-9420
|
| VCID-syuf-89b4-73b8 | security update |
CVE-2014-8559
|
| VCID-tc1x-j7wa-nqdr | Kernel: fs: udf: information leakage when reading symlink |
CVE-2014-9731
|