Search for packages
| purl | pkg:deb/debian/linux@5.16.12-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1c55-tgpz-fuc9 | kernel: nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() |
CVE-2022-48934
|
| VCID-1knh-axb4-wydd | kernel: iio: adc: men_z188_adc: Fix a resource leak in an error handling path |
CVE-2022-48928
|
| VCID-1yfz-9f5x-tyec | kernel: riscv: fix oops caused by irqsoff latency tracer |
CVE-2022-48922
|
| VCID-37tv-2sfx-3qb8 | hw: cpu: intel: Branch History Injection (BHI) |
CVE-2022-0001
|
| VCID-4kdc-tjt4-37g5 | kernel: bpf: Fix crash due to out of bounds access into reg2btf_ids. |
CVE-2022-48929
|
| VCID-5cz4-j2dw-fyha | kernel: io_uring: add a schedule point in io_add_buffers() |
CVE-2022-48937
|
| VCID-98fw-sye6-4qhh | kernel: hwmon: Handle failure to register sensor with thermal zone correctly |
CVE-2022-48942
|
| VCID-ajnt-4nnk-fqfa | kernel: net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte |
CVE-2022-48932
|
| VCID-b1pv-19cz-8kfk | kernel: btrfs: prevent copying too big compressed lzo segment |
CVE-2022-48923
|
| VCID-e9ha-8z35-8ub1 | kernel: thermal: int340x: fix memory leak in int3400_notify() |
CVE-2022-48924
|
| VCID-ekwu-nqyx-u7c6 | kernel: CDC-NCM: avoid overflow in sanity checking |
CVE-2022-48938
|
| VCID-fmtw-j6ht-vqam | kernel: heap memory leak in drivers/net/usb/sr9700.c |
CVE-2022-26966
|
| VCID-g366-14qj-tfdb | kernel: ice: fix concurrent reset and removal of VFs |
CVE-2022-48941
|
| VCID-g5uw-5ye7-k3gg | kernel: usb: gadget: rndis: add spinlock for rndis response list |
CVE-2022-48926
|
| VCID-j9h8-8wtf-rka9 | kernel: bpf: Add schedule points in batch ops |
CVE-2022-48939
|
| VCID-mae2-wcpy-67e2 | kernel: RDMA/ib_srp: Fix a deadlock |
CVE-2022-48930
|
| VCID-mbg5-vqsz-ruc6 | kernel: RDMA/cma: Do not change route.addr.src_addr outside state checks |
CVE-2022-48925
|
| VCID-mm4c-9qbn-9uh3 | kernel: spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() |
CVE-2021-4441
|
| VCID-n4jz-n97m-puhf | kernel: iio: adc: tsc2046: fix memory corruption by preventing array overflow |
CVE-2022-48927
|
| VCID-nhmu-a7kt-nfe5 | kernel: rtrs-clt.c rtrs_clt_dev_release double free |
CVE-2022-29156
|
| VCID-nssg-bpjj-d3be | kernel: KVM: x86/mmu: make apf token non-zero to fix bug |
CVE-2022-48943
|
| VCID-pmuz-arwg-sbat | kernel: configfs: fix a race in configfs_{,un}register_subsystem() |
CVE-2022-48931
|
| VCID-ptyb-8rbd-jbfg | kernel: In drivers/usb/gadget/udc/udc-xilinx.c the endpoint index is not validated |
CVE-2022-27223
|
| VCID-s9et-hf17-jqdz | kernel: netfilter: nf_tables: fix memory leak during stateful obj update |
CVE-2022-48933
|
| VCID-trb1-udwk-q3cm | kernel: bpf: Fix crash due to incorrect copy_map_value |
CVE-2022-48940
|
| VCID-ubd7-uvky-5ugr | kernel: netfilter: nf_tables: unregister flowtable hooks on netns exit |
CVE-2022-48935
|
| VCID-vuzj-f6kq-jqfv | hw: cpu: intel: Intra-Mode BTI |
CVE-2022-0002
|
| VCID-z4rz-94cg-wfby | hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 |
CVE-2021-26401
|