Search for packages
| purl | pkg:deb/debian/linux@5.15.15-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-12pz-myp3-g3gf | kernel: mptcp: clear 'kern' flag from fallback sockets |
CVE-2021-47593
|
| VCID-1546-8uj4-q7dw | kernel: platform/x86: intel_pmc_core: fix memleak on registration failure |
CVE-2021-47093
|
| VCID-15a8-jgkv-w7gf | kernel: nfp: Fix memory leak in nfp_cpp_area_cache_add() |
CVE-2021-47516
|
| VCID-1bc9-3kmx-5uae | kernel: mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() |
CVE-2021-47090
|
| VCID-1bdf-2rf9-93g8 | kernel: ice: avoid bpf_prog refcount underflow |
CVE-2021-47563
|
| VCID-1dvn-hvx6-wfhn | kernel: net/sched: fq_pie: prevent dismantle issue |
CVE-2021-47512
|
| VCID-1es7-z7ns-rqgy | kernel: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done |
CVE-2021-47518
|
| VCID-1msc-3f66-9kdw | kernel: pointer leak in check_alu_op() of kernel/bpf/verifier.c |
CVE-2021-45402
|
| VCID-27zp-qxtc-cfc8 | kernel: drm/vc4: kms: Clear the HVS FIFO commit pointer once done |
CVE-2021-47533
|
| VCID-2jda-3qf9-6kg2 | kernel: scsi: scsi_debug: Fix type in min_t to avoid stack OOB |
CVE-2021-47580
|
| VCID-2p9g-1tas-qyek | kernel: net/sched: sch_ets: don't remove idle classes from the round-robin list |
CVE-2021-47595
|
| VCID-318j-29gk-77hv | kernel: refcount leak in pep_sock_accept() in net/phonet/pep.c |
CVE-2021-45095
|
| VCID-359q-grx4-p3ez | kernel: ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module |
CVE-2021-47100
|
| VCID-37n3-q5hz-g7bb | kernel: ALSA: pcm: oss: Fix negative period/buffer sizes |
CVE-2021-47511
|
| VCID-3f9e-1rkr-3bd3 | kernel: information leak due to uninitialized memory in __tipc_sendmsg() in net/tipc/socket.c |
CVE-2022-0382
|
| VCID-3unt-fzts-pbcn | Guest can force Linux netback driver to hog large amounts of kernel memory |
CVE-2021-28715
|
| VCID-3wkm-yugb-7ydw | kernel: KVM: VMX: Always clear vmx->fail on emulation_required |
CVE-2021-47092
|
| VCID-45du-dgkd-p3b8 | kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL |
CVE-2021-4155
|
| VCID-4aem-vhug-r7c2 | kernel: mac80211: fix locking in ieee80211_start_ap error path |
CVE-2021-47091
|
| VCID-4gqj-bk1k-uqcf | kernel: net: fix use-after-free in tw_timer_handler |
CVE-2021-46936
|
| VCID-4jde-qpwh-m7gm | kernel: fs/mount_setattr: always cleanup mount_kattr |
CVE-2021-46923
|
| VCID-4kde-655t-4fhq | kernel: io_uring: fail cancellation for EXITING tasks |
CVE-2021-47569
|
| VCID-4xfs-1qx2-7yak | kernel: IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr |
CVE-2021-47523
|
| VCID-4zdw-ad9q-jfcv | kernel: ksmbd server communicates in cleartext even though encryption has been enabled due to a violation of the SMB protocol specification |
CVE-2021-45100
|
| VCID-5q5v-aec5-57e7 | kernel: tee: amdtee: fix an IS_ERR() vs NULL bug |
CVE-2021-47601
|
| VCID-5srj-1rb4-13bg | kernel: usb: mtu3: fix list_head check warning |
CVE-2021-46930
|
| VCID-5vm1-bnhx-sfdp | kernel: kfence: fix memory leak when cat kfence objects |
CVE-2021-47089
|
| VCID-5w5a-azrm-3feu | kernel: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() |
CVE-2021-47559
|
| VCID-5x2q-9c69-ybfx | kernel: A possible race condition (use-after-free) in drivers/net/hamradio/6pack ( mkiss.c) after unregister_netdev |
CVE-2022-1195
|
| VCID-5zcb-gkp7-fkcq | kernel: net: marvell: prestera: fix incorrect structure access |
CVE-2021-47102
|
| VCID-5zvt-1mft-sye7 | kernel: net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering |
CVE-2021-47513
|
| VCID-64vz-tj5a-x3f2 | kernel: staging: r8188eu: fix a memory leak in rtw_wx_read32() |
CVE-2021-47570
|
| VCID-66u6-zmud-1fe2 | kernel: serial: liteuart: fix minor-number leak on probe errors |
CVE-2021-47524
|
| VCID-68sw-pe6f-5qbx | kernel: blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() |
CVE-2021-47552
|
| VCID-69rk-etva-ebdm | kernel: can: pch_can: pch_can_rx_normal: fix use after free |
CVE-2021-47520
|
| VCID-6spq-ru85-nyhv | kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc |
CVE-2021-47501
|
| VCID-767a-utp1-gucs | kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize() |
CVE-2022-3105
|
| VCID-79ee-xz7f-7yax | kernel: asix: fix uninit-value in asix_mdio_read() |
CVE-2021-47101
|
| VCID-7cfh-fdht-e3ek | kernel: NFSD: Fix READDIR buffer overflow |
CVE-2021-47107
|
| VCID-7k36-vdy6-9bd5 | kernel: io-wq: check for wq exit after adding new worker task_work |
CVE-2021-47577
|
| VCID-7mhs-9xxr-dyf2 | kernel: scsi: mpt3sas: Fix kernel panic during drive powercycle test |
CVE-2021-47565
|
| VCID-7nng-kzzs-b7ff | Rogue backends can cause DoS of guests via high frequency events |
CVE-2021-28712
|
| VCID-84hp-4y8u-puhs | kernel: RDMA: Fix use-after-free in rxe_queue_cleanup |
CVE-2021-47616
|
| VCID-89ws-26sr-hfd2 | kernel: USB: core: Make do_proc_control() and do_proc_bulk() killable |
CVE-2021-47582
|
| VCID-8bg6-ees7-d3d5 | kernel: mm/damon/dbgfs: protect targets destructions with kdamond_lock |
CVE-2021-47088
|
| VCID-8nf3-vy2g-nugs | kernel: scsi: pm80xx: Do not call scsi_remove_host() in pm8001_alloc() |
CVE-2021-47503
|
| VCID-8rc8-ndc8-mbar | kernel: drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP |
CVE-2021-47531
|
| VCID-8sqj-8d6g-c3cd | kernel: sched/scs: Reset task stack state in bringup_cpu() |
CVE-2021-47553
|
| VCID-8tv2-9rnq-dqf7 | kernel: inet: fully convert sk->sk_rx_dst to RCU rules |
CVE-2021-47103
|
| VCID-93br-vwzx-rkc6 | kernel: vdpa_sim: avoid putting an uninitialized iova_domain |
CVE-2021-47554
|
| VCID-974s-79jd-4qak | kernel: ipv6: fix memory leak in fib6_rule_suppress |
CVE-2021-47546
|
| VCID-976s-6zc1-8fer | kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm |
CVE-2021-47614
|
| VCID-978p-j5hf-rqbq | kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce() |
CVE-2021-47556
|
| VCID-9fxk-mazs-uff6 | kernel: tun: avoid double free in tun_free_netdev |
CVE-2021-47082
|
| VCID-9jzh-wpjd-dqez | kernel: btrfs: fix re-dirty process of tree-log nodes |
CVE-2021-47510
|
| VCID-9kjg-mavd-kqa3 | kernel: tcp: fix page frag corruption on page fault |
CVE-2021-47544
|
| VCID-9ph9-qb8g-tug5 | kernel: net/mlx5e: Wrap the tx reporter dump callback to extract the sq |
CVE-2021-46931
|
| VCID-a19e-1h2h-euf2 | kernel: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() |
CVE-2021-47542
|
| VCID-a5jg-3sk6-eqhw | kernel: tun: avoid double free in tun_free_netdev |
CVE-2022-4744
|
| VCID-a6vf-sbvv-5uay | kernel: igbvf: fix double free in `igbvf_probe` |
CVE-2021-47589
|
| VCID-abcs-kb87-1yc2 | kernel: usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init() |
CVE-2021-47528
|
| VCID-akfs-gab7-3ygv | kernel: media: mxl111sf: change mutex_init() location |
CVE-2021-47583
|
| VCID-ame2-815y-nkhp | kernel: net/smc: fix kernel panic caused by race of smc_sock |
CVE-2021-46925
|
| VCID-ansa-781r-bbb1 | kernel: ALSA: rawmidi - fix the uninitalized user_pversion |
CVE-2021-47096
|
| VCID-auem-y96v-xbbf | kernel: drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf |
CVE-2021-47108
|
| VCID-axqk-7emv-9yfh | Rogue backends can cause DoS of guests via high frequency events |
CVE-2021-28711
|
| VCID-b5qt-x64b-17b5 | kernel: i2c: validate user data in compat ioctl |
CVE-2021-46934
|
| VCID-b7am-ruwz-nyem | kernel: tee: optee: Fix incorrect page free bug |
CVE-2021-47087
|
| VCID-b9aq-ssa8-ubhr | kernel: hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations |
CVE-2021-47098
|
| VCID-bbc4-tggy-hken | kernel: net: netlink: af_netlink: Prevent empty skb by adding a check on len. |
CVE-2021-47606
|
| VCID-bfue-cktw-1bdc | kernel: pinctrl: mediatek: fix global-out-of-bounds issue |
CVE-2021-47083
|
| VCID-bh2w-fy1b-q7f5 | kernel: out-of-bounds memory access in __f2fs_setxattr() in fs/f2fs/xattr.c when an inode has an invalid last xattr entry |
CVE-2021-45469
|
| VCID-bpz7-gnb7-77dv | kernel: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() |
CVE-2021-47571
|
| VCID-btf1-rxpb-27cw | kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats() |
CVE-2022-3106
|
| VCID-cdg1-duvw-fugu | kernel: proc/vmcore: fix clearing user buffer by properly using clear_user() |
CVE-2021-47566
|
| VCID-cdv6-gakb-pbas | kernel: ipmi: ssif: initialize ssif_info->client early |
CVE-2021-47095
|
| VCID-d486-ss31-ayah | kernel: dm btree remove: fix use after free in rebalance_children() |
CVE-2021-47600
|
| VCID-daq5-4knm-xubz | kernel: ALSA: pcm: oss: Limit the period size to 16MB |
CVE-2021-47509
|
| VCID-dqmv-4ghe-xub3 | kernel: mptcp: fix deadlock in __mptcp_push_pending() |
CVE-2021-47590
|
| VCID-e9q3-96u6-ryeu | kernel: parisc: Clear stale IIR value on instruction access rights trap |
CVE-2021-46928
|
| VCID-ecx5-m7ps-m3b2 | kernel: iio: mma8452: Fix trigger reference couting |
CVE-2021-47500
|
| VCID-ee81-gwef-x7hg | kernel: local privileges escalation in kernel/bpf/verifier.c |
CVE-2022-23222
|
| VCID-eedz-zxcx-b7an | kernel: iocost: Fix divide-by-zero on donation from low hweight cgroup |
CVE-2021-47584
|
| VCID-ef31-t3q3-due1 | kernel: Out of bounds read in lg_probe and related functions of hid-lg.c |
CVE-2022-20132
|
| VCID-end8-2vjb-z3gf | kernel: io_uring: ensure task_work gets run as part of cancelations |
CVE-2021-47504
|
| VCID-enmw-bjyg-ebb5 | kernel: devlink: fix netns refcount leak in devlink_nl_cmd_reload() |
CVE-2021-47514
|
| VCID-ep2r-37u6-a7ht | kernel: veth: ensure skb entering GRO are not cloned. |
CVE-2021-47099
|
| VCID-ev77-y5nu-eqcf | kernel: serial: liteuart: Fix NULL pointer dereference in ->remove() |
CVE-2021-47526
|
| VCID-exts-w8xm-mbfj | kernel: HID: bigbenff: prevent null pointer dereference |
CVE-2021-47522
|
| VCID-f1bg-8ztk-17e3 | kernel: net/sched: sch_ets: don't peek at classes beyond 'nbands' |
CVE-2021-47557
|
| VCID-f5kg-sk6j-8ya8 | kernel: mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode |
CVE-2021-47540
|
| VCID-f5nn-kd61-u3bj | kernel: mac80211: validate extended element ID is present |
CVE-2021-47611
|
| VCID-f7p2-3cfh-3yh4 | kernel: net: nexthop: fix null pointer dereference when IPv6 is not enabled |
CVE-2021-47572
|
| VCID-fna6-hfpv-ruc1 | kernel: drm/msm: Fix wait_fence submitqueue leak |
CVE-2021-47530
|
| VCID-ft5c-s985-cfek | kernel: race condition in the Android binder driver could lead to incorrect security checks |
CVE-2021-39686
|
| VCID-g3kc-vgm6-3fg6 | kernel: iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove |
CVE-2021-47499
|
| VCID-g5px-ag6y-k3dw | kernel: IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() |
CVE-2021-47104
|
| VCID-ga43-5nmf-jkb2 | kernel: drm/msm/devfreq: Fix OPP refcnt leak |
CVE-2021-47532
|
| VCID-gbzg-1w2g-mfcx | kernel: double free in packet_set_ring() in net/packet/af_packet.c |
CVE-2021-22600
|
| VCID-gg7j-39j6-93bd | kernel: net: systemport: Add global locking for descriptor lifecycle |
CVE-2021-47587
|
| VCID-gwpe-bxy3-bye2 | kernel: ice: fix vsi->txq_map sizing |
CVE-2021-47562
|
| VCID-h2je-45q3-h3ex | kernel: an integer overflow in the vhost_vdpa_config_validate() can lead to out-of-bounds access on top of a 32-bit Linux kernel |
CVE-2022-0998
|
| VCID-h7ek-ruzp-q7ah | kernel: net: stmmac: Disable Tx queues when reconfiguring the interface |
CVE-2021-47558
|
| VCID-hap7-99zy-gqcg | kernel: btrfs: fix memory leak in __add_inode_ref() |
CVE-2021-47585
|
| VCID-hax9-qm3b-73gq | kernel: serial: core: fix transmit-buffer reset and memleak |
CVE-2021-47527
|
| VCID-hcka-mzyn-2ycz | kernel: incorrect check for error case in the mlx5_get_uars_page |
CVE-2023-23006
|
| VCID-hdj6-n48v-akhg | kernel: nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert |
CVE-2021-46927
|
| VCID-htan-tpuv-tbgy | kernel: Input: appletouch - initialize work before device registration |
CVE-2021-46932
|
| VCID-hxwk-duzz-2ud1 | kernel: binder: fix async_free_space accounting for empty parcels |
CVE-2021-46935
|
| VCID-j3x1-yths-93ge | kernel: sch_cake: do not call cake_destroy() from cake_init() |
CVE-2021-47598
|
| VCID-j4f3-nhp7-j3a5 | kernel: nfsd: fix use-after-free due to delegation race |
CVE-2021-47506
|
| VCID-j8fw-e955-vqfz | kernel: aio: fix use-after-free due to missing POLLFREE handling |
CVE-2021-47505
|
| VCID-k1d3-pbj6-6bff | kernel: drm/amd/pm: fix a potential gpu_metrics_table memory leak |
CVE-2021-4453
|
| VCID-k1pt-zsjr-wyb7 | kernel: nfsd: Fix nsfd startup race (again) |
CVE-2021-47507
|
| VCID-kcrf-k334-pbe5 | kernel: ASoC: codecs: wcd934x: handle channel mappping list correctly |
CVE-2021-47502
|
| VCID-kfe2-ywvw-pqa8 | kernel: mac80211: track only QoS data frames for admission control |
CVE-2021-47602
|
| VCID-kq8y-m5gk-dfcv | kernel: scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() |
CVE-2021-47576
|
| VCID-kt6z-8b61-7yea | kernel: ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() |
CVE-2021-47548
|
| VCID-m34m-yqp9-6kg7 | Rogue backends can cause DoS of guests via high frequency events |
CVE-2021-28713
|
| VCID-mjff-dett-s3a6 | kernel: KVM: x86/mmu: Don't advance iterator after restart due to yielding |
CVE-2021-47094
|
| VCID-mrkb-fhj6-kygd | kernel: seg6: fix the iif in the IPv6 socket control block |
CVE-2021-47515
|
| VCID-mygs-n22u-hbbz | kernel: i2c: virtio: disable timeout handling |
CVE-2021-47561
|
| VCID-na68-ay25-13gu | kernel: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() |
CVE-2021-47539
|
| VCID-p51s-egv2-y7gv | kernel: drm/amd/amdgpu: fix potential memleak |
CVE-2021-47550
|
| VCID-pcz1-1rwp-pyh3 | kernel: netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() |
CVE-2021-47106
|
| VCID-pgvr-rmpk-pfh1 | kernel: Heap information leak in map_lookup_elem function |
CVE-2021-4135
|
| VCID-phsj-7pww-d7ce | kernel: btrfs: use latest_dev in btrfs_show_devname |
CVE-2021-47599
|
| VCID-pupp-m8x2-zqh9 | kernel: phonet/pep: refuse to enable an unbound pipe |
CVE-2021-47086
|
| VCID-pxsd-rt3n-guaj | kernel: possible use after free in lock_sock_nested of sock.c for the SCTP protocol |
CVE-2022-20154
|
| VCID-pz8p-c3pu-vkej | kernel: firmware: arm_scpi: Fix string overflow in SCPI genpd driver |
CVE-2021-47609
|
| VCID-q9ym-ms2j-ckek | kernel: mptcp: never allow the PM to close a listener subflow |
CVE-2021-47594
|
| VCID-qhjx-az7e-x7ce | kernel: scsi: scsi_debug: Don't call kcalloc() if size arg is zero |
CVE-2021-47578
|
| VCID-qxcz-4cn6-9bhx | kernel: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() |
CVE-2021-47538
|
| VCID-r4k1-m7wn-5ugx | kernel: btrfs: free exchange changeset on failures |
CVE-2021-47508
|
| VCID-rbaq-2dap-y7bt | kernel: fs_context: heap overflow in legacy parameter handling |
CVE-2022-0185
|
| VCID-rffa-kv9k-tkhz | kernel: serial: liteuart: fix use-after-free and memleak on unbind |
CVE-2021-47525
|
| VCID-rgxg-avqt-cqdu | kernel: net/smc: fix wrong list_del in smc_lgr_cleanup_early |
CVE-2021-47536
|
| VCID-rpn4-des2-sqbb | kernel: nfc: fix segfault in nfc_genl_dump_devices_done |
CVE-2021-47612
|
| VCID-rvvz-2qb6-63hm | kernel: inet_diag: fix kernel-infoleak for UDP sockets |
CVE-2021-47597
|
| VCID-s2ez-6hm5-nqcs | kernel: Input: elantech - fix stack out of bound access in elantech_change_report_id() |
CVE-2021-47097
|
| VCID-s2q6-jwxx-dbeq | kernel: audit: improve robustness of the audit queue handling |
CVE-2021-47603
|
| VCID-s4s3-7xbf-xfdd | kernel: usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. |
CVE-2021-46933
|
| VCID-s4uk-pvq8-6yfn | kernel: NFC: st21nfca: Fix memory leak in device probe and remove |
CVE-2021-46924
|
| VCID-s6wh-1hrj-xqd7 | kernel: use-after-free in the TEE subsystem |
CVE-2021-44733
|
| VCID-s9c9-e4qk-pbb4 | kernel: drm/msm: Fix null ptr access msm_ioctl_gem_submit() |
CVE-2021-47610
|
| VCID-sgcn-8pxq-vqaf | kernel: net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() |
CVE-2021-47541
|
| VCID-smrn-64by-hyd2 | kernel: net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg |
CVE-2021-47596
|
| VCID-suku-dsne-vyb8 | kernel: sctp: use call_rcu to free endpoint |
CVE-2021-46929
|
| VCID-svpc-cq3p-y3gw | kernel: mlxsw: spectrum: Protect driver from buggy firmware |
CVE-2021-47560
|
| VCID-t49z-au64-uyf8 | kernel: stack information leak in infiniband RDMA |
CVE-2021-3923
|
| VCID-tben-kq6j-a7a8 | kernel: ethtool: do not perform operations on net devices being unregistered |
CVE-2021-47517
|
| VCID-tksa-uevv-47du | kernel: ice: xsk: return xsk buffers back to pool when cleaning the ring |
CVE-2021-47105
|
| VCID-ttdt-a8nd-kuf7 | kernel: vduse: fix memory corruption in vduse_dev_ioctl() |
CVE-2021-47605
|
| VCID-u4z8-zmmx-x3ef | kernel: can: sja1000: fix use after free in ems_pcmcia_add_card() |
CVE-2021-47521
|
| VCID-u7hb-swv7-xue4 | kernel: net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound |
CVE-2021-47547
|
| VCID-udd5-7xkc-uucb | Guest can force Linux netback driver to hog large amounts of kernel memory |
CVE-2021-28714
|
| VCID-uhth-9nah-jud6 | kernel: net: vlan: fix underflow for the real_dev refcnt |
CVE-2021-47555
|
| VCID-ujj7-y251-9bfs | kernel: ovl: fix warning in ovl_create_real() |
CVE-2021-47579
|
| VCID-unpq-fuz2-ybha | kernel: powerpc/32: Fix hardlockup on vmap stack overflow |
CVE-2021-47567
|
| VCID-v9sh-maqh-puec | kernel: Soft lockup occurred during __page_mapcount |
CVE-2023-1582
|
| VCID-vbj7-x5c1-sqca | kernel: ALSA: hda: intel-sdw-acpi: harden detection of controller |
CVE-2021-46926
|
| VCID-vegx-wnnb-37ce | kernel: fix 'struct pid' leaks in 'dbgfs_target_ids_write()' |
CVE-2021-46937
|
| VCID-vfyy-4wcs-t7bu | kernel: octeontx2-af: Fix a memleak bug in rvu_mbox_init() |
CVE-2021-47537
|
| VCID-vrjh-n1x3-ffe8 | kernel: vduse: check that offset is within bounds in get_config() |
CVE-2021-47604
|
| VCID-w18m-46zv-rbbz | kernel: sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl |
CVE-2021-47549
|
| VCID-w3dr-fmbm-s3cv | kernel: ksmbd: fix memleak in get_file_stream_info() |
CVE-2021-47568
|
| VCID-w3sq-bzq5-1fd8 | kernel: drm/vc4: kms: Add missing drm_crtc_commit_put |
CVE-2021-47534
|
| VCID-w44s-mpfr-2ffm | kernel: use-after-free in the file polling implementation |
CVE-2021-39698
|
| VCID-wc7x-av9y-puav | kernel: sit: do not call ipip6_dev_free() from sit_init_net() |
CVE-2021-47588
|
| VCID-whzh-avx6-sbhr | kernel: memory leak in the __rds_conn_create() in net/rds/connection.c |
CVE-2021-45480
|
| VCID-wvh7-17nc-ufeg | kernel: drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again |
CVE-2021-47551
|
| VCID-wx7j-fy2k-j7gv | kernel: bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg |
CVE-2021-47607
|
| VCID-wydz-47s5-v7a3 | kernel: net: marvell: prestera: fix double free issue on err path |
CVE-2021-47564
|
| VCID-xdgq-zkfs-wffd | kernel: net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup |
CVE-2021-47586
|
| VCID-xkux-j33x-fya3 | kernel: iwlwifi: Fix memory leaks in error handling path |
CVE-2021-47529
|
| VCID-xt33-1dvy-27dx | kernel: mptcp: remove tcp ulp setsockopt support |
CVE-2021-47591
|
| VCID-yh1x-9chq-kbgk | kernel: bpf: Fix kernel address leakage in atomic fetch |
CVE-2021-47608
|
| VCID-z3n4-61na-sqen | kernel: i2c: virtio: fix completion handling |
CVE-2021-47613
|
| VCID-z3z3-unrz-ayf9 | kernel: drm/msm/a6xx: Allocate enough space for GMU registers |
CVE-2021-47535
|
| VCID-zc8z-cpdy-xkak | kernel: net: stmmac: fix tc flower deletion for VLAN priority Rx steering |
CVE-2021-47592
|
| VCID-zsby-jtxe-qfeu | kernel: can: m_can: m_can_read_fifo: fix memory leak in error branch |
CVE-2021-47519
|
| VCID-zt7m-55n5-3ygp | kernel: cgroup: Use open-time creds and namespace for migration perm checks |
CVE-2021-4197
|