Search for packages
| purl | pkg:deb/debian/linux@5.19.6-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-17vz-uz4f-q3ab | kernel: memory leak in the function vsock_connect of Virtual Socket Protocol |
CVE-2022-3629
|
| VCID-1bm7-48ep-57cw | In binder_vma_close of binder.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254837884References: Upstream kernel |
CVE-2023-20928
|
| VCID-1xyv-2zbn-p3ee | In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel |
CVE-2022-20422
|
| VCID-224g-hwkh-jkh4 | kernel: out-of-bounds read due to improper check of bpf_sys_bpf() arguments |
CVE-2022-2785
|
| VCID-3mzb-7emm-zqbk | kernel: sched/core: Do not requeue task on CPU excluded from cpus_mask |
CVE-2022-50100
|
| VCID-3x8d-u8me-f7ge | kernel: net: 9p: fix refcount leak in p9_read_work() error handling |
CVE-2022-50114
|
| VCID-4qha-wssr-xycg | kernel: nf_tables disallow binding to already bound chain |
CVE-2022-39190
|
| VCID-4sw1-a55s-vkc6 | kernel: dmaengine: dw-axi-dmac: ignore interrupt if no descriptor |
CVE-2022-50023
|
| VCID-54qr-x4vv-xfex | kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path |
CVE-2022-50116
|
| VCID-566d-pv4z-23d6 | kernel: net: lantiq_xrx200: restore buffer if memory allocation failed |
CVE-2022-49997
|
| VCID-56z1-mjdt-87dn | kernel: f2fs: fix null-ptr-deref in f2fs_get_dnode_of_data |
CVE-2022-50009
|
| VCID-5rrj-3aay-ffhz | kernel: use-after-free after removing device in wb_inode_writeback_end in mm/page-writeback.c |
CVE-2024-0562
|
| VCID-5vu8-8xnt-kkc7 | kernel: memory leak in the function vsock_connect for IPsec |
CVE-2022-3630
|
| VCID-68ag-35vk-eycb | kernel: net: tap: NULL pointer derefence in dev_parse_header_protocol when skb->dev is null |
CVE-2022-50073
|
| VCID-6x9m-x6vn-8fbg | kernel: clk: imx: NULL pointer dereference in imx_register_uart_clocks() |
CVE-2022-3114
|
| VCID-7ghp-tjwd-guea | kernel: KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT |
CVE-2022-50224
|
| VCID-96bc-a364-8fd5 | kernel: improper input validation in handling of SMB2_TREE_CONNECT command can result in out-of-bounds read which could result in DoS |
CVE-2022-47938
|
| VCID-9f2j-4n6f-qua7 | kernel: ax25: fix incorrect dev_tracker usage |
CVE-2022-50163
|
| VCID-9zvx-ucpq-v3fv | kernel: soundwire: revisit driver bind/unbind and callbacks |
CVE-2022-50144
|
| VCID-af96-kzgz-fyb9 | kernel: memory leak in the function j1939_session_destroy for j1939 socket |
CVE-2022-3633
|
| VCID-artu-ugr9-9yax | kernel: ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot |
CVE-2022-50016
|
| VCID-bt6z-fyxn-ckgt | kernel: use after in tst_timer in drivers/atm/idt77252.c |
CVE-2022-3635
|
| VCID-byfh-pwcu-cfbs | kernel: improper validation user-supplied data could lead in heap buffer overflow which can result in RCE |
CVE-2022-47942
|
| VCID-c3z5-1arv-kqck | kernel: ext4: use-after-free in ext4_xattr_set_entry() |
CVE-2023-2513
|
| VCID-cv91-nmgd-pye3 | kernel: ARM: OMAP2+: pdata-quirks: Fix refcount leak bug |
CVE-2022-50204
|
| VCID-czy7-c6h9-aub4 | kernel: ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf() |
CVE-2022-50050
|
| VCID-d6zh-c1bm-fbem | kernel: habanalabs/gaudi: fix shift out of bounds |
CVE-2022-50026
|
| VCID-e2mj-rcg8-eqar | kernel: remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init |
CVE-2022-50120
|
| VCID-ejj4-yt8j-c7fm | kernel: race condition in xfrm_probe_algs can lead to OOB read/write |
CVE-2022-3028
|
| VCID-ew2m-yswu-vyfn | kernel: incorrect check for error case in the malidp_check_pages_threshold |
CVE-2023-23004
|
| VCID-fzfp-nqh6-c3ca | kernel: of: check previous kernel's ima-kexec-buffer against memory bounds |
CVE-2022-50159
|
| VCID-g7rs-z62s-6qcn | kernel: usb: cdns3: fix random warning message when driver load |
CVE-2022-50151
|
| VCID-ge37-2by5-yudu | kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges |
CVE-2022-1679
|
| VCID-h6x6-v8yq-3yed | kernel: Use after free in prepare_to_relocate in fs/btrfs/relocation.c |
CVE-2023-3111
|
| VCID-h82m-mnhk-67e2 | kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning |
CVE-2022-39189
|
| VCID-hn2x-k1gc-gyc5 | kernel: ASoC: mt6359: Fix refcount leak bug |
CVE-2022-50111
|
| VCID-jmuj-eekq-gqfm | kernel: netdevsim: fib: reference count leak on route deletion failure |
CVE-2023-2019
|
| VCID-k9sg-urdd-ukby | In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is set using commands like "sg_write_same --ndob" we will crash in target_core_iblock/file's execute_write_same handlers when we go to access the se_cmd->t_data_sg because its NULL. This patch adds a check for the NDOB bit in the common WRITE SAME code because we don't support it. And, it adds a check for zero SG elements in each handler in case the initiator tries to send a normal WRITE SAME with no data buffer. |
CVE-2022-21546
|
| VCID-kp46-11g7-uybk | kernel: bpf: fix potential 32-bit overflow when accessing ARRAY map element |
CVE-2022-50167
|
| VCID-n35j-xquk-vkhc | kernel: venus: pm_helpers: Fix warning in OPP during probe |
CVE-2022-50011
|
| VCID-n469-h7yw-vqds | kernel: Bluetooth: When HCI work queue is drained, only queue chained work |
CVE-2022-50166
|
| VCID-nck8-brgn-hkdx | kernel: use-after-free after failed devlink reload in devlink_param_get |
CVE-2022-3625
|
| VCID-pqzm-vutm-hkhn | Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write |
CVE-2022-39842
|
| VCID-q5kt-n8qx-57dd | kernel: netfilter: NULL pointer dereference in nf_tables due to zeroed list head |
CVE-2023-1095
|
| VCID-qmdw-hcza-cycq | kernel: use-after-free and memory errors in ext4 when mounting and operating on a corrupted image |
CVE-2022-1184
|
| VCID-rj99-p8mt-pqg9 | kernel: netfilter: flowtable: fix stuck flows on cleanup due to pending work |
CVE-2022-50000
|
| VCID-rmjh-44j9-xyhq | kernel: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot |
CVE-2022-50015
|
| VCID-rqsj-t9nu-ufbf | kernel: block: don't allow the same type rq_qos add more than once |
CVE-2022-50086
|
| VCID-s3tt-1m91-afar | kernel: smb2_write() fails to validate user supplied data which can result in out-of-bounds read |
CVE-2022-47940
|
| VCID-sxuq-3azc-fqa2 | kernel: iavf: Fix reset error handling |
CVE-2022-50053
|
| VCID-sybh-ybu8-mfhv | kernel: handling of SMB2_NEGOTIATE command doesn't properly release memory which could result in DoS |
CVE-2022-47941
|
| VCID-t31x-8u7h-sffy | kernel: btrfs: memory leak in btrfs_get_dev_args_from_path() |
CVE-2023-4394
|
| VCID-uf5w-fwbf-jqe8 | kernel: use after free in i2c |
CVE-2019-25162
|
| VCID-vfnm-5h1y-vqff | kernel: slab-out-of-bound read in bpf |
CVE-2022-2905
|
| VCID-vvgm-gt3j-7bg6 | kernel: octeontx2-af: Fix mcam entry resource leak |
CVE-2022-50060
|
| VCID-wkju-5p5k-z3g1 | kernel: mptcp: do not queue data on closed subflows |
CVE-2022-50070
|
| VCID-wudq-7hws-aqft | kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry |
CVE-2022-39188
|
| VCID-x475-zt7j-47dc | kernel: binder: fix UAF of alloc->vma in race with munmap() |
CVE-2022-50240
|
| VCID-xdyu-fbfb-huh1 | kernel: smb2_tree_disconnect() fails to validate object existance prior to performing opertions on it |
CVE-2022-47939
|
| VCID-ycce-86bv-qfed | kernel: large length in the zero DataOffset case in smb2_write() processing could result in out-of-bounds read |
CVE-2022-47943
|
| VCID-ycsn-mey4-ufca | kernel: dmaengine: dw-axi-dmac: do not print NULL LLI during error |
CVE-2022-50024
|
| VCID-ydck-rzam-6ygx | kernel: arm64: set UXN on swapper page tables |
CVE-2022-50230
|
| VCID-zbar-pb6y-t7ad | kernel: scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts |
CVE-2022-50098
|