Search for packages
| purl | pkg:deb/debian/linux@5.18.16-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-18e7-kygq-cbay | kernel: igc: Reinstate IGC_REMOVED logic and implement it properly |
CVE-2022-49605
|
| VCID-2ph4-r6ek-3ybm | kernel: crypto: qat - add param check for DH |
CVE-2022-49564
|
| VCID-2zjw-3duv-sbbq | kernel: posix cpu timer use-after-free may lead to local privilege escalation |
CVE-2022-2585
|
| VCID-3n8x-aav2-3ubf | kernel: tcp: Fix data-races around sysctl_tcp_fastopen. |
CVE-2022-49586
|
| VCID-4bnq-ggyk-23a7 | kernel: tcp: Fix a data-race around sysctl_tcp_notsent_lowat. |
CVE-2022-49587
|
| VCID-5149-phe6-eqh5 | kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c |
CVE-2022-36946
|
| VCID-5eak-ex5p-vkff | kernel: net: stmmac: fix dma queue left shift overflow issue |
CVE-2022-49592
|
| VCID-5q7j-2ypm-zfh7 | kernel: tcp: Fix data-races around sysctl_tcp_max_reordering. |
CVE-2022-49571
|
| VCID-5we4-cmum-y7dm | kernel: use-after-free in free_pipe_info() could lead to privilege escalation |
CVE-2022-1882
|
| VCID-5zzw-du1s-gyf2 | hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions |
CVE-2022-26373
|
| VCID-7uwj-9e57-7bf3 | kernel: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() |
CVE-2022-49607
|
| VCID-7vqk-uq5v-7bdy | kernel: tcp: Fix data-races around sysctl_tcp_recovery. |
CVE-2022-49574
|
| VCID-83r4-48te-bqd8 | kernel: tcp: Fix data-races around sysctl_tcp_mtu_probing. |
CVE-2022-49598
|
| VCID-95j6-7pb9-k3fu | kernel: igmp: Fix data-races around sysctl_igmp_qrv. |
CVE-2022-49589
|
| VCID-9kmg-ma4u-77hp | kernel: KVM: Don't null dereference ops->destroy |
CVE-2022-49568
|
| VCID-9mrh-ufyc-tkfx | kernel: ip: Fix data-races around sysctl_ip_fwd_use_pmtu. |
CVE-2022-49604
|
| VCID-9pmb-g7fz-3kd6 | kernel: lockdown bypass using IMA |
CVE-2022-21505
|
| VCID-9u1a-fwp8-83dx | kernel: ip: Fix data-races around sysctl_ip_fwd_update_priority. |
CVE-2022-49603
|
| VCID-ckzu-ttjc-hfc8 | kernel: spi: bcm2835: bcm2835_spi_handle_err(): fix NULL pointer deref for non DMA transfers |
CVE-2022-49569
|
| VCID-cw3m-jquj-1uag | kernel: tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor. |
CVE-2022-49594
|
| VCID-dmgz-q633-6qa2 | kernel: tcp: Fix a data-race around sysctl_tcp_probe_threshold. |
CVE-2022-49595
|
| VCID-eqcc-uvxf-wbhf | kernel: Linux kernel: be2net buffer overflow in be_get_module_eeprom |
CVE-2022-49581
|
| VCID-fsu4-23rp-p3ha | kernel: mm/mempolicy: fix uninit-value in mpol_rebind_policy() |
CVE-2022-49567
|
| VCID-hhdu-h17a-6uap | kernel: net: dsa: microchip: ksz_common: Fix refcount leak bug |
CVE-2022-49591
|
| VCID-hmjk-8p1g-qugt | kernel: possible use after free due to improper locking in l2cap_chan_put of l2cap_core |
CVE-2022-20566
|
| VCID-k6fe-6ykb-4ffu | kernel: crypto: qat - add param check for RSA |
CVE-2022-49563
|
| VCID-kesz-mesy-z3hj | kernel: ip: Fix a data-race around sysctl_ip_autobind_reuse. |
CVE-2022-49600
|
| VCID-kvjz-pwry-eqgg | kernel: tcp: Fix data-races around sysctl_tcp_base_mss. |
CVE-2022-49597
|
| VCID-kxay-8svb-8fe4 | kernel: ip: Fix a data-race around sysctl_fwmark_reflect. |
CVE-2022-49602
|
| VCID-mm7g-dc2t-43ge | kernel: ip: Fix data-races around sysctl_ip_prot_sock. |
CVE-2022-49578
|
| VCID-mrpn-w76g-6bfy | kernel: tcp: Fix data-races around sysctl_tcp_migrate_req. |
CVE-2022-49588
|
| VCID-nge8-nz3d-vkb9 | kernel: udp: Fix a data-race around sysctl_udp_l3mdev_accept. |
CVE-2022-49577
|
| VCID-njq9-dd4y-8ff8 | kernel: tcp: Fix data-races around sysctl_tcp_l3mdev_accept. |
CVE-2022-49599
|
| VCID-pmbu-dsmk-jkaw | kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation |
CVE-2022-2588
|
| VCID-pp47-caqh-9ye1 | kernel: tcp: Fix a data-race around sysctl_tcp_probe_interval. |
CVE-2022-49593
|
| VCID-pq7v-b14b-tuhv | Kernel: NULL pointer dereference problem in sctp_sched_dequeue_common |
CVE-2023-2177
|
| VCID-pz5p-1t5h-s7h4 | kernel: ipv4: Fix data-races around sysctl_fib_multipath_hash_fields. |
CVE-2022-49576
|
| VCID-qb6d-ruan-qkc7 | kernel: ipv4: Fix data-races around sysctl_fib_multipath_hash_policy. |
CVE-2022-49579
|
| VCID-qm1a-762h-zfbe | kernel: igmp: Fix data-races around sysctl_igmp_llm_reports. |
CVE-2022-49590
|
| VCID-rmse-qmj7-eker | kernel: tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts. |
CVE-2022-49575
|
| VCID-ryys-szfq-8qhs | kernel: tcp: Fix data-races around sysctl_tcp_slow_start_after_idle. |
CVE-2022-49572
|
| VCID-sedx-gkym-6ydg | kernel: pinctrl: ralink: Check for null return of devm_kcalloc |
CVE-2022-49608
|
| VCID-sybr-zhwq-ckd1 | kernel: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering |
CVE-2022-49582
|
| VCID-t67e-f8nn-s7h7 | kernel: tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept. |
CVE-2022-49601
|
| VCID-tcry-h84h-47hy | kernel: perf/x86/intel/lbr: Fix unchecked MSR access error on HSW |
CVE-2022-49565
|
| VCID-u6ha-bmby-wqbb | kernel: gpio: gpio-xilinx: Fix integer overflow |
CVE-2022-49570
|
| VCID-uw9m-atc6-2yg8 | kernel: iavf: Fix handling of dummy receive descriptors |
CVE-2022-49583
|
| VCID-vkjp-w1px-y7h6 | kernel: tcp: Fix data-races around sysctl_tcp_min_snd_mss. |
CVE-2022-49596
|
| VCID-vqy7-37ym-eufr | kernel: xfrm_expand_policies() in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice |
CVE-2022-36879
|
| VCID-wevr-e27z-vuf2 | kernel: crypto: qat - fix memory leak in RSA |
CVE-2022-49566
|
| VCID-xbaa-2t96-w3dp | kernel: ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero |
CVE-2022-49584
|
| VCID-xqng-em4b-37a5 | kernel: tcp: Fix data-races around sysctl_tcp_fastopen_blackhole_timeout. |
CVE-2022-49585
|
| VCID-xu1r-a4dk-jugv | kernel: tcp: Fix a data-race around sysctl_tcp_early_retrans. |
CVE-2022-49573
|
| VCID-yr6f-3hvk-fbcs | kernel: power/reset: arm-versatile: Fix refcount leak in versatile_reboot_probe |
CVE-2022-49609
|
| VCID-yv2c-29cg-e3cp | kernel: RDMA/irdma: Fix sleep from invalid context BUG |
CVE-2022-49606
|
| VCID-z6a6-7c5t-8khv | kernel: unprivileged tampering of shmem files |
CVE-2022-2590
|
| VCID-zasw-wwu3-xkaf | kernel: nf_tables cross-table potential use-after-free may lead to local privilege escalation |
CVE-2022-2586
|
| VCID-zqh3-uvmq-ubgb | kernel: ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh. |
CVE-2022-49580
|