Search for packages
| purl | pkg:deb/debian/linux@5.18.2-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2wkt-a72u-b3ch | kernel: bpf: Fix potential array overflow in bpf_trampoline_get_progs() |
CVE-2022-49548
|
| VCID-3evv-rmrt-9kea | kernel: netfilter: nf_tables: out-of-bounds access in nf_tables_newtable() |
CVE-2023-6040
|
| VCID-5rym-k4vn-nye8 | kernel: NULL pointer dereference in x86_emulate_insn may lead to DoS |
CVE-2022-1852
|
| VCID-6axn-r2sc-euh1 | kernel: buffer overflow in nft_set_desc_concat_parse() |
CVE-2022-2078
|
| VCID-8jdy-1rqx-bbgd | kernel: insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may lead to DoS |
CVE-2021-33061
|
| VCID-94kr-upt7-ducu | kernel: io_uring: io_defer_entry object double free vulnerability |
CVE-2023-21400
|
| VCID-9ujy-9ynv-nkar | kernel: netfilter: conntrack: re-fetch conntrack after insertion |
CVE-2022-49561
|
| VCID-b6su-8hn4-2bd3 | kernel: fs/ntfs3: validate BOOT sectors_per_clusters |
CVE-2022-49553
|
| VCID-bp6k-v3c5-gudy | kernel: LoadPin bypass via dm-verity table reload |
CVE-2022-2503
|
| VCID-cewe-299n-sbfz | kernel: i2c: unbounded length leads to buffer overflow in ismt_access() |
CVE-2022-3077
|
| VCID-csv2-et49-3bhe | kernel: Linux kernel: exfat: Out-of-bounds read leads to denial of service |
CVE-2022-49560
|
| VCID-g327-p594-fqha | kernel: KVM: cache incoherence issue in SEV API may lead to kernel crash |
CVE-2022-0171
|
| VCID-gkac-yybb-pqdv | kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root |
CVE-2022-32250
|
| VCID-jar8-nqnp-pqbw | kernel: KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2 |
CVE-2022-49559
|
| VCID-jgyf-j7vz-v7gm | kernel: KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak |
CVE-2022-49556
|
| VCID-mhc3-1tfu-jfg4 | kernel: zsmalloc: fix races between asynchronous zspage free and page migration |
CVE-2022-49554
|
| VCID-msuk-ynkm-sycm | kernel: bpf: Fix combination of jit blinding and pointers to bpf subprogs. |
CVE-2022-49552
|
| VCID-t7kk-g947-hbg3 | kernel: netfilter: nf_tables: double hook unregistration in netns path |
CVE-2022-49558
|
| VCID-tbqr-e1t1-23cb | kernel: x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave) |
CVE-2022-49557
|
| VCID-v65n-m4bz-3uc6 | kernel: KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits |
CVE-2022-49562
|
| VCID-wmbn-me38-gbaf | kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS |
CVE-2022-3061
|
| VCID-yqat-sxev-bfdt | kernel: missing DM_TARGET_IMMUTABLE feature flag in verity_target in drivers/md/dm-verity-target.c |
CVE-2022-20572
|
| VCID-yytw-sjdy-eba3 | kernel: Bluetooth: hci_qca: Use del_timer_sync() before freeing |
CVE-2022-49555
|
| VCID-zt83-99kn-zkab | kernel: watch queue race condition can lead to privilege escalation |
CVE-2022-2959
|