Search for packages
| purl | pkg:deb/debian/linux@5.16.18-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1ajm-86a9-1kcn | kernel: refcount leak in llc_ui_bind and llc_ui_autobind |
CVE-2022-28356
|
| VCID-1rrq-9e3v-h3bc | kernel: swiotlb: fix info leak with DMA_FROM_DEVICE |
CVE-2022-48853
|
| VCID-1v2g-hq31-m7g6 | kernel: staging: gdm724x: fix use after free in gdm_lte_rx() |
CVE-2022-48851
|
| VCID-4vnh-cmvf-6fdw | kernel: Bluetooth: hci_core: Fix leaking sent_cmd skb |
CVE-2022-48844
|
| VCID-55ag-p9qb-kuhu | kernel: ethernet: Fix error handling in xemaclite_of_probe |
CVE-2022-48860
|
| VCID-5pt2-wwc2-zbfy | kernel: uninitialized registers on stack in nft_do_chain can cause kernel pointer leakage to UM |
CVE-2022-1016
|
| VCID-6dxw-erbm-suey | kernel: Uncontrolled resource consumption in drivers for Intel SGX may lead to DoS |
CVE-2021-33135
|
| VCID-6x2t-8wze-wfhn | kernel: drm/vc4: hdmi: Unregister codec device on unbind |
CVE-2022-48852
|
| VCID-7xbf-wqxj-tfch | kernel: vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command |
CVE-2022-48864
|
| VCID-81f2-jsp8-7yft | kernel: MIPS: smp: fill in sibling and core maps earlier |
CVE-2022-48845
|
| VCID-97gt-4ng3-xkge | kernel: net/mlx5: Fix a race on command flush flow |
CVE-2022-48858
|
| VCID-adpr-958r-eke7 | kernel: race condition in snd_pcm_hw_free leading to use-after-free |
CVE-2022-1048
|
| VCID-bdpj-gk16-a3dz | kernel: net/packet: slab-out-of-bounds access in packet_recvmsg() |
CVE-2022-20368
|
| VCID-djxd-1nhv-v3ae | kernel: net: arc_emac: Fix use after free in arc_mdio_probe() |
CVE-2022-48854
|
| VCID-e12b-8uqz-a7c6 | kernel: vhost: fix hung thread due to erroneous iotlb entries |
CVE-2022-48862
|
| VCID-e6tq-3nyb-zubp | kernel: NFC: port100: fix use-after-free in port100_send_complete |
CVE-2022-48857
|
| VCID-fkxh-mkuc-h7da | kernel: HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts |
CVE-2022-48866
|
| VCID-g4at-rbry-rug6 | kernel: net-sysfs: add check for netdevice being present to speed_show |
CVE-2022-48850
|
| VCID-gwh3-bg5m-k7hk | kernel: tracing/osnoise: Do not unregister events twice |
CVE-2022-48848
|
| VCID-kabz-9vtq-y3hh | kernel: Null pointer dereference and use after free in ax25_release() |
CVE-2022-1199
|
| VCID-knpf-c5j6-tfd2 | kernel: uaccess: fix integer overflow on access_ok() |
CVE-2022-49289
|
| VCID-mwmv-usbb-3kfc | kernel: watch_queue: Fix filter limit check |
CVE-2022-48847
|
| VCID-mx68-mqxr-mub4 | kernel: mISDN: Fix memory leak in dsp_pipeline_build() |
CVE-2022-48863
|
| VCID-pb38-mdfu-sqh5 | kernel: gianfar: ethtool: Fix refcount leak in gfar_get_ts_info |
CVE-2022-48856
|
| VCID-pzb1-g9p8-nbbv | In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel |
CVE-2022-20423
|
| VCID-qpxf-qr5n-nqbj | kernel: sctp: fix kernel-infoleak for SCTP sockets |
CVE-2022-48855
|
| VCID-qr9t-hvpr-17dd | kernel: buffer overflow in IPsec ESP transformation code |
CVE-2022-27666
|
| VCID-rhh5-t7x7-77bt | kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes |
CVE-2022-1011
|
| VCID-rsep-gckr-h7bt | kernel: crypto: qcom-rng - ensure buffer for generate is completely filled |
CVE-2022-48629
|
| VCID-s19j-vvyp-8fgn | kernel: btrfs: skip reserved bytes warning on unmount after log cleanup failure |
CVE-2022-48833
|
| VCID-t454-3ssr-9fhq | kernel: net: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr |
CVE-2022-48859
|
| VCID-t7v5-quk6-zqhz | kernel: potential buffer overflows in EVT_TRANSACTION in st21nfca |
CVE-2022-26490
|
| VCID-u3yv-qgqz-73hg | kernel: drm/amdgpu: bypass tiling flag check in virtual display case (v2) |
CVE-2022-48849
|
| VCID-wdrm-2ct7-7bg5 | kernel: hv_netvsc: NULL pointer dereference in netvsc_get_ethtool_stats() |
CVE-2022-3107
|
| VCID-wq6g-b244-gkgz | kernel: vdpa: fix use-after-free on vp_vdpa_remove |
CVE-2022-48861
|
| VCID-xab2-s98j-6ucc | kernel: ice: Fix race condition during interface enslave |
CVE-2022-48842
|
| VCID-xsvg-z74j-gyhv | kernel: tipc: fix kernel panic when enabling bearer |
CVE-2022-48865
|
| VCID-xx3h-3cmf-f7ct | kernel: arbitrary code execution in linux/net/netfilter/nf_tables_api.c |
CVE-2022-1015
|
| VCID-yb37-m28j-9ff8 | kernel: kernel bug in the watch_queue subsystem |
CVE-2022-0995
|
| VCID-ygfh-8nsv-zkbb | kernel: use-after-free in drivers/net/hamradio/6pack.c |
CVE-2022-1198
|