Search for packages
| purl | pkg:deb/debian/linux@5.15.3-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-22cf-cyjw-6qb9 | kernel: fs/quota/quota_tree.c does not validate the block number in the quota tree |
CVE-2021-45868
|
| VCID-245u-8cqk-97g1 | kernel: net/tls: Fix flipped sign in tls_err_abort() calls |
CVE-2021-47496
|
| VCID-3v3e-wqhj-syaf | kernel: riscv, bpf: Fix potential NULL dereference |
CVE-2021-47486
|
| VCID-4vd2-y8nz-gqgm | kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion |
CVE-2022-0480
|
| VCID-6hmq-bbpx-1yb2 | kernel: KVM: arm64: Fix host stage-2 PGD refcount |
CVE-2021-47450
|
| VCID-7r4b-zmdq-9qdq | kernel: mm: khugepaged: skip huge page collapse for special files |
CVE-2021-47491
|
| VCID-8nby-7htg-j7cs | kernel: drm/amdgpu: Fix even more out of bound writes from debugfs |
CVE-2021-47489
|
| VCID-b13u-nbgf-u3c1 | kernel: comedi: vmk80xx: fix transfer-buffer overflows |
CVE-2021-47475
|
| VCID-c16u-1416-37b8 | kernel: comedi: dt9812: fix DMA buffers on stack |
CVE-2021-47477
|
| VCID-ce4d-arhp-2fh7 | kernel: use-after-free vulnerability in function sco_sock_sendmsg() |
CVE-2021-3640
|
| VCID-cmjx-jabf-6ufz | kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks |
CVE-2021-3759
|
| VCID-csmr-hg3s-c7gs | kernel: Use after free in f2fs_available_memory |
CVE-2022-20148
|
| VCID-cwn5-wa4c-eqd7 | kernel: isofs: Fix out of bound access for corrupted isofs image |
CVE-2021-47478
|
| VCID-d1uc-apk8-qked | kernel: concurrency use-after-free between drm_setmaster_ioctl and drm_mode_getresources |
CVE-2022-1280
|
| VCID-d7f5-4qm9-e7a8 | kernel: mm, thp: bail out early in collapse_file for writeback page |
CVE-2021-47492
|
| VCID-gs8w-v2yr-a7dg | kernel: possible use-after-free in bluetooth module |
CVE-2021-3752
|
| VCID-gud3-xy2h-jyeh | kernel: staging: rtl8712: fix use-after-free in rtl8712_dl_fw |
CVE-2021-47479
|
| VCID-jumx-u9rj-afgh | kernel: regmap: Fix possible double-free in regcache_rbtree_exit() |
CVE-2021-47483
|
| VCID-kftr-z65e-hkew | kernel: comedi: ni_usb6501: fix NULL-deref in command paths |
CVE-2021-47476
|
| VCID-m7c6-tfzj-s3ec | kernel: can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path |
CVE-2021-47671
|
| VCID-nehb-4p2d-rbhy | kernel: RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR |
CVE-2021-47481
|
| VCID-ns66-nv3d-qfgw | kernel: net: batman-adv: fix error handling |
CVE-2021-47482
|
| VCID-qpjt-j1pg-6kgc | kernel: out-of-bounds read in iov_iter_revert() in lib/iov_iter.c |
CVE-2022-1508
|
| VCID-rpf5-vud3-kqhp | kernel: IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields |
CVE-2021-47485
|
| VCID-sgfa-g2b1-zudv | kernel: ocfs2: fix race between searching chunks and release journal_head from buffer_head |
CVE-2021-47493
|
| VCID-tu48-5rp4-kybt | kernel: comedi: vmk80xx: fix bulk-buffer overflow |
CVE-2021-47474
|
| VCID-wkqp-w7rg-hqd3 | kernel: scsi: core: Put LLD module refcnt after SCSI device is released |
CVE-2021-47480
|
| VCID-wqrb-v41r-y7bn | kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts |
CVE-2021-3669
|
| VCID-x49w-9jng-7qg1 | kernel: cfg80211: fix management registrations locking |
CVE-2021-47494
|
| VCID-xtmf-n68y-53cf | kernel: Improper IO-uring request cancellation operation allows local users to cause a crash |
CVE-2021-4023
|
| VCID-xztw-ys7y-f3dj | kernel: drm/ttm: fix memleak in ttm_transfered_destroy |
CVE-2021-47490
|
| VCID-zr8u-verb-wqhy | kernel: heap-based overflow in LightNVM Subsystem may lead to privilege escalation |
CVE-2022-2991
|