Search for packages
| purl | pkg:deb/debian/linux@5.14.16-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-11a5-gm44-dud8 | kernel: drm/msm: Fix null pointer dereference on pointer edp |
CVE-2021-47445
|
| VCID-179w-wqpq-2uee | kernel: scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() |
CVE-2021-47473
|
| VCID-2m14-9szm-s3g6 | kernel: userfaultfd: fix a race between writeprotect and exit_mmap() |
CVE-2021-47461
|
| VCID-3fkh-5j79-yuhm | kernel: can: peak_pci: peak_pci_remove(): fix UAF |
CVE-2021-47456
|
| VCID-3wju-yesf-fbeu | kernel: dm: fix mempool NULL pointer race when completing IO |
CVE-2021-47435
|
| VCID-5pcq-nn5h-nfcz | kernel: can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv |
CVE-2021-47459
|
| VCID-5vy1-wx5j-3bf1 | kernel: drm/amdgpu: fix gart.bo pin_count leak |
CVE-2021-47431
|
| VCID-6h3r-n8ru-bffc | kernel: Insufficient validation of user-supplied sizes for the MSG_CRYPTO message type |
CVE-2021-43267
|
| VCID-6v88-8yt7-g7h4 | kernel: ocfs2: mount fails with buffer overflow in strlen |
CVE-2021-47458
|
| VCID-9529-5dun-m7b4 | kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io |
CVE-2021-4093
|
| VCID-99a2-secb-cqcj | kernel: xhci: Fix command ring pointer corruption while aborting a command |
CVE-2021-47434
|
| VCID-9g9f-rq7n-f3hp | kernel: drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read |
CVE-2021-47444
|
| VCID-a1wn-63kb-wqbc | kernel: drm/msm/a3xx: fix error handling in a3xx_gpu_init() |
CVE-2021-47447
|
| VCID-amh5-cxe3-z7eq | kernel: usbnet: sanity check for maxpacket |
CVE-2021-47495
|
| VCID-bgsf-uw4q-23c1 | kernel: kunit: fix reference count leak in kfree_at_end |
CVE-2021-47467
|
| VCID-br39-r743-n3bu | kernel: drm/msm/a4xx: fix error handling in a4xx_gpu_init() |
CVE-2021-47446
|
| VCID-bsyu-swue-6bh7 | kernel: KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() |
CVE-2021-47465
|
| VCID-cs44-jrsv-vffr | kernel: sctp: Invalid chunks may be used to remotely remove existing associations |
CVE-2021-3772
|
| VCID-d22z-d1vx-wuh3 | kernel: powerpc/smp: do not decrement idle task preempt count in CPU offline |
CVE-2021-47454
|
| VCID-d6bp-wux1-jqcb | kernel: NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() |
CVE-2021-47443
|
| VCID-d7rx-21sc-6kcf | kernel: ocfs2: fix data corruption after conversion from inline format |
CVE-2021-47460
|
| VCID-f7dd-kkab-ayd7 | kernel: NFC: digital: fix possible memory leak in digital_in_send_sdd_req() |
CVE-2021-47442
|
| VCID-fdek-ry7p-gudw | kernel: usb: musb: dsps: Fix the probe error path |
CVE-2021-47436
|
| VCID-fknd-5trm-17aw | kernel: Improper lock operation in btrfs |
CVE-2021-4149
|
| VCID-fnj5-8b82-k3gq | kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c |
CVE-2022-0322
|
| VCID-fv1k-tv98-uubx | kernel: mm, slub: fix potential use-after-free in slab_debugfs_fops |
CVE-2021-47470
|
| VCID-g52x-da3c-1ygu | kernel: ice: fix locking for Tx timestamp tracking flush |
CVE-2021-47449
|
| VCID-ge55-cjrm-vubw | kernel: drm: mxsfb: Fix NULL pointer dereference crash on unload |
CVE-2021-47471
|
| VCID-jakw-x3hg-u3b2 | kernel: netfilter: nf_tables: skip netdev events generated on netns removal |
CVE-2021-47452
|
| VCID-jgkq-gyu6-byhk | kernel: mptcp: fix possible stall on recvmsg() |
CVE-2021-47448
|
| VCID-k7jb-9mt3-pude | kernel: ppc: kvm: allows a malicious KVM guest to crash the host |
CVE-2021-43056
|
| VCID-mhgh-pzws-5ya7 | kernel: netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value |
CVE-2021-47451
|
| VCID-mv79-x5j5-akgf | kernel: isdn: cpai: check ctr->cnr to avoid array index out of bound |
CVE-2021-4439
|
| VCID-pnck-rjwv-mqdd | kernel: nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells |
CVE-2021-47497
|
| VCID-q55w-hud9-9ydw | kernel: ptp: Fix possible memory leak in ptp_clock_register() |
CVE-2021-47455
|
| VCID-qanc-mv4c-3ybd | kernel: audit: fix possible null-pointer dereference in audit_filter_rules |
CVE-2021-47464
|
| VCID-r314-48hu-gfb5 | kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c |
CVE-2021-43389
|
| VCID-r67z-s6ad-aufv | kernel: net: encx24j600: check error in devm_regmap_init_encx24j600 |
CVE-2021-47440
|
| VCID-r83e-3j5y-suem | kernel: Improper implementation of block_invalidatepage() allows users to crash the kernel |
CVE-2021-4148
|
| VCID-redk-9j7a-kugk | kernel: mm, slub: fix potential memoryleak in kmem_cache_open() |
CVE-2021-47466
|
| VCID-rjbu-ehsk-xqar | kernel: ice: Avoid crash from unnecessary IDA free |
CVE-2021-47453
|
| VCID-safa-mt9v-q3h5 | kernel: nfc: Use-After-Free vulnerability of ndev->rf_conn_info object |
CVE-2021-3760
|
| VCID-vsx4-8spa-wkgp | kernel: mm/secretmem: fix NULL page-->mapping dereference in page_is_secretmem() |
CVE-2021-47463
|
| VCID-vx31-fhfb-qfed | kernel: mlxsw: thermal: Fix out-of-bounds memory accesses |
CVE-2021-47441
|
| VCID-vz7d-4nje-nbh3 | kernel: octeontx2-af: Fix possible null pointer dereference. |
CVE-2021-47484
|
| VCID-whfj-b8tn-5kgc | kernel: Heap buffer overflow in firedtv driver |
CVE-2021-42739
|
| VCID-wx8z-agy6-z7dk | kernel: isdn: mISDN: Fix sleeping function called from invalid context |
CVE-2021-47468
|
| VCID-x5ab-kh4x-2kcj | kernel: heap-based buffer overflow in dp_link_settings_write() in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c |
CVE-2021-42327
|
| VCID-xeh1-b5g8-w3fe | kernel: mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind() |
CVE-2021-47462
|
| VCID-xrm1-r6u1-6bbj | kernel: net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work |
CVE-2021-47439
|
| VCID-xtbh-wee7-3qgj | kernel: dm rq: don't queue request to blk-mq during DM suspend |
CVE-2021-47498
|
| VCID-xz5k-yfq2-2ue6 | kernel: net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path |
CVE-2021-47438
|
| VCID-y9t3-ugbr-xkaf | kernel: iio: adis16475: fix deadlock on frequency set |
CVE-2021-47437
|
| VCID-ynjs-1pm5-bkhx | kernel: btrfs: fix abort logic in btrfs_replace_file_extents |
CVE-2021-47433
|
| VCID-z88k-ca6e-4uhm | kernel: can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() |
CVE-2021-47457
|