Search for packages
| purl | pkg:deb/debian/linux@5.16.10-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1551-z28m-3ba4 | kernel: IB/hfi1: Fix panic with larger ipoib send_queue_size |
CVE-2022-48729
|
| VCID-183k-79rm-aua9 | kernel: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path |
CVE-2022-48810
|
| VCID-1hvg-fxwp-bbhr | kernel: scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe |
CVE-2022-48715
|
| VCID-2j84-346v-rugc | kernel: NFSD: Fix the behavior of READ near OFFSET_MAX |
CVE-2022-48827
|
| VCID-2s15-39et-qyar | kernel: memory corruption in AX88179_178A based USB ethernet device. |
CVE-2022-2964
|
| VCID-2s5e-z92k-5qeu | kernel: net: dsa: mv88e6xxx: don't use devres for mdiobus |
CVE-2022-48818
|
| VCID-3c8w-7dr2-ebb1 | kernel: KVM: arm64: Avoid consuming a stale esr value when SError occur |
CVE-2022-48727
|
| VCID-3xxx-6uyq-tqds | kernel: net: dsa: fix panic when DSA master device unbinds on shutdown |
CVE-2022-48808
|
| VCID-43b8-a1tx-rqce | kernel: mm: vmscan: remove deadlock due to throttling failing to make progress |
CVE-2022-48800
|
| VCID-4cyz-4ndz-k7gc | kernel: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes |
CVE-2022-48829
|
| VCID-4xhc-1b1u-gubc | kernel: btrfs: fix deadlock between quota disable and qgroup rescan worker |
CVE-2022-48734
|
| VCID-58tv-gd4q-8ygu | kernel: spi: uniphier: fix reference count leak in uniphier_spi_probe() |
CVE-2022-48723
|
| VCID-5f94-e1fb-yuan | kernel: net: dsa: ar9331: register the mdiobus under devres |
CVE-2022-48817
|
| VCID-5htr-qaeg-6kc6 | kernel: iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() |
CVE-2022-48724
|
| VCID-5qhs-xmwg-uber | kernel: net: fix a memleak when uncloning an skb dst and its metadata |
CVE-2022-48809
|
| VCID-62kn-n9n7-tqar | kernel: missing check in ioctl allows kernel memory read/write |
CVE-2022-0516
|
| VCID-68xu-bfsj-mfdd | kernel: scsi: qedf: Add stag_work to all the vports |
CVE-2022-48825
|
| VCID-6b51-wtjj-jfaf | kernel: drm: mxsfb: Fix NULL pointer dereference |
CVE-2022-48718
|
| VCID-6fq9-s8yn-gqbf | kernel: powerpc/fixmap: Fix VM debug warning on unmap |
CVE-2021-47623
|
| VCID-7a92-8b2d-1ye4 | kernel: perf: Fix list corruption in perf_cgroup_switch() |
CVE-2022-48799
|
| VCID-8re5-541e-kke8 | kernel: can: isotp: fix potential CAN frame reception race in isotp_rcv() |
CVE-2022-48830
|
| VCID-9e5c-6h6x-uuaj | kernel: net: dsa: felix: don't use devres for mdiobus |
CVE-2022-48813
|
| VCID-9qxy-2bjx-yfd9 | kernel: iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL |
CVE-2022-48801
|
| VCID-9wqc-6m4w-4fhe | kernel: security issues in the OS descriptor handling section of composite_setup function (composite.c) |
CVE-2022-25258
|
| VCID-9y6d-2qeg-2ket | kernel: iommu: Fix potential use-after-free during probe |
CVE-2022-48796
|
| VCID-a71r-r8gp-uffc | kernel: net: macsec: Fix offload support for NETDEV_UNREGISTER event |
CVE-2022-48720
|
| VCID-a8ff-fttr-due9 | kernel: ext4: fix error handling in ext4_fc_record_modified_inode() |
CVE-2022-48712
|
| VCID-abta-5svd-83fy | kernel: ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler |
CVE-2022-48807
|
| VCID-bbwe-ydak-d3e9 | kernel: ASoC: codecs: wcd938x: fix incorrect used of portid |
CVE-2022-48716
|
| VCID-c5d3-vkmz-nqbv | kernel: ibmvnic: don't release napi in __ibmvnic_open() |
CVE-2022-48811
|
| VCID-c9nu-2vvc-yycf | kernel: selinux: fix double free of cond_list on error paths |
CVE-2022-48740
|
| VCID-cz4y-cf7u-ukbc | kernel: IB/hfi1: Fix AIP early init panic |
CVE-2022-48728
|
| VCID-d1g5-afpz-d3em | kernel: SUNRPC: lock against ->sock changing during sysfs read |
CVE-2022-48816
|
| VCID-d5df-sn4v-t3as | kernel: scsi: qedf: Fix refcount issue when LOGO is received during TMF |
CVE-2022-48823
|
| VCID-eanw-3nnr-2qh5 | kernel: ima: fix reference leak in asymmetric_verify() |
CVE-2022-48831
|
| VCID-ejem-swtq-sygh | kernel: s390/cio: verify the driver availability for path_event call |
CVE-2022-48798
|
| VCID-fz24-3kux-sucr | kernel: ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() |
CVE-2022-48738
|
| VCID-g688-fq6a-abas | kernel: Linux ebpf logic vulnerability leads to critical memory read and write gaining root privileges |
CVE-2022-0500
|
| VCID-h4y4-y8zk-s3aw | kernel: ALSA: hda: Fix UAF of leds class devs at unbinding |
CVE-2022-48735
|
| VCID-h8v4-veyp-kfca | kernel: mm/kmemleak: avoid scanning potential huge holes |
CVE-2022-48731
|
| VCID-hjwn-8t4d-2fc9 | kernel: audit: don't deref the syscall args when checking the openat2 open_how::flags |
CVE-2022-48832
|
| VCID-jkyn-ks16-8bew | kernel: net: dsa: seville: register the mdiobus under devres |
CVE-2022-48814
|
| VCID-jqmz-9acp-u7bv | kernel: net: dsa: lantiq_gswip: don't use devres for mdiobus |
CVE-2022-48812
|
| VCID-kg68-d4bz-p3gp | kernel: net/smc: Forward wakeup to smc socket waitqueue after fallback |
CVE-2022-48721
|
| VCID-kgvk-nfx6-t3ez | kernel: scsi: myrs: Fix crash in error case |
CVE-2022-48824
|
| VCID-mxb6-vqn5-6qe7 | kernel: use after free in moxart_remove |
CVE-2022-0487
|
| VCID-n5ak-qsmm-syex | kernel: tipc: improve size validations for received domain records |
CVE-2022-48711
|
| VCID-nh4q-v6td-zkdv | kernel: dma-buf: heaps: Fix potential spectre v1 gadget |
CVE-2022-48730
|
| VCID-nt12-raxf-bfbx | kernel: fs/proc: task_mmu.c: don't read mapcount for migration entry |
CVE-2022-48802
|
| VCID-pmdf-xqme-a3hr | kernel: tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case |
CVE-2022-48819
|
| VCID-qrpd-x2nh-3khj | kernel: vt_ioctl: fix array_index_nospec in vt_setactivate |
CVE-2022-48804
|
| VCID-qs9e-8wu6-9uh6 | kernel: misc: fastrpc: avoid double fput() on failed usercopy |
CVE-2022-48821
|
| VCID-r3f1-63pz-r7h9 | kernel: net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change |
CVE-2021-47624
|
| VCID-r6w8-g7f8-9kez | kernel: usb: f_fs: Fix use-after-free for epfile |
CVE-2022-48822
|
| VCID-rfmq-rs6f-xbd3 | kernel: information disclosure in drivers/usb/gadget/function/rndis.c |
CVE-2022-25375
|
| VCID-rwk5-nah5-sfat | kernel: remote stack overflow via kernel panic on systems using TIPC may lead to DoS |
CVE-2022-0435
|
| VCID-s27w-fpkw-ekb5 | kernel: phy: ti: Fix missing sentinel for clk_div_table |
CVE-2022-48803
|
| VCID-s79e-srjs-1ybc | kernel: bpf: Use VM_MAP instead of VM_ALLOC for ringbuf |
CVE-2022-48714
|
| VCID-snez-utur-rfbg | kernel: RDMA/ucma: Protect mc during concurrent multicast leaves |
CVE-2022-48726
|
| VCID-ta88-jxnc-bkg7 | kernel: RDMA/siw: Fix refcounting leak in siw_create_qp() |
CVE-2022-48725
|
| VCID-tfj4-fhns-skc3 | kernel: eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX |
CVE-2022-48806
|
| VCID-tgdx-6yd1-qka6 | kernel: drm/vc4: Fix deadlock on DSI device attach error |
CVE-2022-48826
|
| VCID-tj7v-82ys-kkae | kernel: ASoC: hdmi-codec: Fix OOB memory accesses |
CVE-2022-48739
|
| VCID-u43q-jeg9-n7bx | kernel: btrfs: fix use-after-free after failure to create a snapshot |
CVE-2022-48733
|
| VCID-uefy-vhm6-73cy | kernel: phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() |
CVE-2022-48820
|
| VCID-v6qj-sywd-eyck | kernel: moxart: fix potential use-after-free on remove path |
CVE-2022-48626
|
| VCID-veaz-r9r8-wkht | kernel: perf/x86/intel/pt: Fix crash with stop filters in single-range mode |
CVE-2022-48713
|
| VCID-wnwr-wq5u-23er | kernel: net: dsa: bcm_sf2: don't use devres for mdiobus |
CVE-2022-48815
|
| VCID-wxc1-79dn-pfb1 | kernel: ASoC: max9759: fix underflow in speaker_gain_control_put() |
CVE-2022-48717
|
| VCID-ykys-9qqs-vqbb | kernel: NFSD: Fix ia_size underflow |
CVE-2022-48828
|
| VCID-yn92-uuwa-fkc8 | kernel: net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work |
CVE-2022-48719
|
| VCID-zeqs-775u-nye4 | kernel: drm/nouveau: fix off by one in BIOS boundary checking |
CVE-2022-48732
|
| VCID-zmur-rwc8-rua3 | kernel: net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup |
CVE-2022-48805
|
| VCID-zv24-uhjd-p3ae | kernel: net: ieee802154: ca8210: Stop leaking skb's |
CVE-2022-48722
|