Search for packages
| purl | pkg:deb/debian/linux@6.0.10-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-27mk-jmq8-afcn | kernel: net: macvlan: fix memory leaks of macvlan_common_newlink |
CVE-2022-49853
|
| VCID-2nej-aufc-gbh6 | kernel: net: microchip: sparx5: Fix potential null-ptr-deref in sparx_stats_init() and sparx5_start() |
CVE-2022-49806
|
| VCID-2qu2-e42a-tfce | kernel: scsi: scsi_transport_sas: Fix error handling in sas_phy_add() |
CVE-2022-49839
|
| VCID-3sfr-bkpz-wqd3 | kernel: net: gso: fix panic on frag_list with mixed head alloc types |
CVE-2022-49872
|
| VCID-3znc-kup7-xqf5 | kernel: x86/fpu: Drop fpregs lock before inheriting FPU permissions |
CVE-2022-49783
|
| VCID-4c1c-npw7-bffn | kernel: capabilities: fix undefined behavior in bit shift for CAP_TO_MASK |
CVE-2022-49870
|
| VCID-4nqf-ct5y-6uev | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c |
CVE-2022-42896
|
| VCID-5j9h-9edt-u7a5 | kernel: 9p/trans_fd: always use O_NONBLOCK read/write |
CVE-2022-49767
|
| VCID-5wdy-zt3n-ffcv | kernel: riscv: fix reserved memory setup |
CVE-2022-49851
|
| VCID-6c68-tbba-tkhq | kernel: mISDN: fix possible memory leak in mISDN_dsp_element_register() |
CVE-2022-49821
|
| VCID-6qay-evrq-5ud3 | kernel: can: dev: fix skb drop check |
CVE-2022-49844
|
| VCID-6wkp-khwd-dydm | kernel: phy: qcom-qmp-combo: fix NULL-deref on runtime resume |
CVE-2022-49848
|
| VCID-754k-suks-5ydu | kernel: bpf: Fix memory leaks in __check_func_call |
CVE-2022-49837
|
| VCID-7pw1-ktxm-pyb9 | kernel: ftrace: Fix null pointer dereference in ftrace_add_mod() |
CVE-2022-49802
|
| VCID-7t2t-jz3n-bygn | kernel: gfs2: Check sb_bsize_shift after reading superblock |
CVE-2022-49769
|
| VCID-7xz9-7rne-cbfk | kernel: netdevsim: Fix memory leak of nsim_dev->fa_cookie |
CVE-2022-49803
|
| VCID-7zzm-gqgg-uyep | kernel: ceph: avoid putting the realm twice when decoding snaps fails |
CVE-2022-49770
|
| VCID-834j-avq3-r7fw | kernel: phy: ralink: mt7621-pci: add sentinel to quirks table |
CVE-2022-49868
|
| VCID-85pm-v2n2-tyhh | kernel: Input: iforce - invert valid length check when fetching device IDs |
CVE-2022-49790
|
| VCID-8g8z-ytqx-17cd | kernel: scsi: zfcp: Fix double free of FSF request when qdio send fails |
CVE-2022-49789
|
| VCID-8ssu-mh67-yubm | kernel: drbd: use after free in drbd_create_device() |
CVE-2022-49811
|
| VCID-9c6x-sqnd-ekes | kernel: ntfs: fix use-after-free in ntfs_attr_find() |
CVE-2022-49763
|
| VCID-9gqs-b8tp-bbe9 | kernel: rethook: fix a potential memleak in rethook_alloc() |
CVE-2022-49795
|
| VCID-9xqu-8q58-ebhd | kernel: siox: fix possible memory leak in siox_device_add() |
CVE-2022-49836
|
| VCID-9xsm-nvv9-h3cf | kernel: octeon_ep: fix potential memory leak in octep_device_setup() |
CVE-2022-49819
|
| VCID-avvx-enhb-tfe7 | kernel: ALSA: hda: fix potential memleak in 'add_widget_node' |
CVE-2022-49835
|
| VCID-b37c-6bax-rugr | kernel: wifi: cfg80211: fix memory leak in query_regdb_file() |
CVE-2022-49881
|
| VCID-bcdf-x34w-8bbw | kernel: HID: hyperv: fix possible memory leak in mousevsc_probe() |
CVE-2022-49874
|
| VCID-bmnv-37pm-uka4 | kernel: net: marvell: prestera: fix memory leak in prestera_rxtx_switch_init() |
CVE-2022-49857
|
| VCID-bna3-nrxy-r3eb | kernel: btrfs: zoned: initialize device's zone info for seeding |
CVE-2022-49831
|
| VCID-bzqr-g9ws-2qfh | kernel: ata: libata-transport: fix double ata_host_put() in ata_tport_add() |
CVE-2022-49826
|
| VCID-c8ad-ma5z-yqad | kernel: drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram() |
CVE-2022-49864
|
| VCID-cgct-v3k6-wqd4 | kernel: dmaengine: ti: k3-udma-glue: fix memory leak when register device fail |
CVE-2022-49860
|
| VCID-cmwx-t942-7kc5 | kernel: mmc: sdhci-pci: Fix possible memory leak caused by missing pci_dev_put() |
CVE-2022-49787
|
| VCID-csrk-w16v-93c8 | kernel: bpf: Prevent bpf program recursion for raw tracepoint probes |
CVE-2022-49764
|
| VCID-d798-sq84-a7bd | kernel: drm/scheduler: fix fence ref counting |
CVE-2022-49829
|
| VCID-db23-arz4-r3gp | kernel: perf/x86/amd: Fix crash due to race between amd_pmu_enable_all, perf NMI and throttling |
CVE-2022-49781
|
| VCID-dh6v-w57q-8yhg | kernel: tipc: fix the msg->req tlv len check in tipc_nl_compat_name_table_dump_header |
CVE-2022-49862
|
| VCID-eazk-a5xm-87dw | kernel: net: tun: Fix memory leaks of napi_get_frags |
CVE-2022-49871
|
| VCID-fj6c-5nhm-9qfe | kernel: net: ena: Fix error handling in ena_init() |
CVE-2022-49813
|
| VCID-fxr6-mwur-b3ah | kernel: netfs: Fix missing xas_retry() calls in xarray iteration |
CVE-2022-49810
|
| VCID-gbe9-6wr1-jbf6 | kernel: nilfs2: fix use-after-free bug of ns_writer on remount |
CVE-2022-49834
|
| VCID-gphx-7wuy-q7cj | kernel: udf: Fix a slab-out-of-bounds write bug in udf_find_entry() |
CVE-2022-49846
|
| VCID-gqea-6hjd-jyas | kernel: net: wwan: iosm: fix memory leak in ipc_pcie_read_bios_cfg |
CVE-2022-49855
|
| VCID-hegp-vr1e-kqez | kernel: net/9p: use a dedicated spinlock for trans_fd |
CVE-2022-49765
|
| VCID-hn3z-6tan-jqgq | kernel: ASoC: core: Fix use-after-free in snd_soc_exit() |
CVE-2022-49842
|
| VCID-hu4e-g48m-hbaj | kernel: ntfs: check overflow when iterating ATTR_RECORDs |
CVE-2022-49762
|
| VCID-hxya-xaxm-c3cw | kernel: pinctrl: devicetree: fix null pointer dereferencing in pinctrl_dt_to_map |
CVE-2022-49832
|
| VCID-jda2-k7b7-eyfb | kernel: octeontx2-pf: Fix SQE threshold checking |
CVE-2022-49858
|
| VCID-jffh-xhdn-kqh1 | kernel: net/x25: Fix skb leak in x25_lapb_receive_frame() |
CVE-2022-49809
|
| VCID-jmu6-f19t-3yck | kernel: misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram() |
CVE-2022-49788
|
| VCID-jsg2-btst-tuh1 | kernel: kcm: close race conditions on sk_receive_queue |
CVE-2022-49814
|
| VCID-kfka-g2c1-3bdh | kernel: riscv: process: fix kernel info leakage |
CVE-2022-49852
|
| VCID-kn99-yhfm-2kc8 | kernel: ALSA: usb-audio: Drop snd_BUG_ON() from snd_usbmidi_output_open() |
CVE-2022-49772
|
| VCID-krke-gmxn-v3ee | kernel: net: lan966x: Fix potential null-ptr-deref in lan966x_stats_init() |
CVE-2022-49805
|
| VCID-m4hu-szmn-d7bu | kernel: iio: adc: at91_adc: fix possible memory leak in at91_adc_allocate_trigger() |
CVE-2022-49794
|
| VCID-m6wv-adz4-xbfn | kernel: bpf, sockmap: Fix the sk->sk_forward_alloc warning of sk_stream_kill_queues |
CVE-2022-49877
|
| VCID-mbbx-ctp1-2fgb | kernel: net: dsa: don't leak tagger-owned storage on switch driver unbind |
CVE-2022-49808
|
| VCID-mcjq-x6w1-gue8 | kernel: net: lapbether: fix issue of invalid opcode in lapbeth_open() |
CVE-2022-49859
|
| VCID-mczz-1hys-2fhc | kernel: arm64/mm: fix incorrect file_map_count for non-leaf pmd/pud |
CVE-2022-49778
|
| VCID-mewr-4ghf-u3eg | kernel: nilfs2: fix deadlock in nilfs_count_free_blocks() |
CVE-2022-49850
|
| VCID-mwtr-jenv-3kcw | kernel: btrfs: zoned: clone zoned device info when cloning a device |
CVE-2022-49833
|
| VCID-npga-qv8p-afef | kernel: bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE |
CVE-2022-49875
|
| VCID-nq4d-sqqs-3kfq | kernel: bpf: Fix wrong reg type conversion in release_reference() |
CVE-2022-49873
|
| VCID-nrtf-9jqm-33b7 | kernel: mctp: Fix an error handling path in mctp_init() |
CVE-2022-49854
|
| VCID-p3xp-hhk8-h7a7 | kernel: dm ioctl: fix misbehavior if list_versions races with module loading |
CVE-2022-49771
|
| VCID-p4rd-2gcn-sua7 | kernel: nvmet: fix a memory leak in nvmet_auth_set_key |
CVE-2022-49807
|
| VCID-pcvj-te93-m3eb | kernel: scsi: target: tcm_loop: Fix possible name leak in tcm_loop_setup_hba_bus() |
CVE-2022-49780
|
| VCID-pdwr-43xc-dbea | kernel: can: af_can: fix NULL pointer dereference in can_rx_register() |
CVE-2022-49863
|
| VCID-pf7n-auyu-uuam | kernel: drm/drv: Fix potential memory leak in drm_dev_init() |
CVE-2022-49830
|
| VCID-pkp5-pas3-5kc3 | kernel: hugetlbfs: don't delete error page from pagecache |
CVE-2022-49828
|
| VCID-pm4x-2r7d-guhz | kernel: netlink: Bounds-check struct nlmsgerr creation |
CVE-2022-49766
|
| VCID-ppbz-jvz8-b7eb | kernel: KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign() |
CVE-2022-49774
|
| VCID-pvaz-ucsb-yyd3 | kernel: perf/x86/amd/uncore: Fix memory leak for events array |
CVE-2022-49784
|
| VCID-qduz-7d3p-3kb9 | kernel: tcp: cdg: allow tcp_cdg_release() to be called multiple times |
CVE-2022-49775
|
| VCID-qtcn-smf4-bfak | kernel: s390: avoid using global register for current_stack_pointer |
CVE-2022-49804
|
| VCID-r561-3w9m-b7em | kernel: mctp i2c: don't count unused / invalid keys for flow release |
CVE-2022-49820
|
| VCID-rad8-zdvt-g3dv | kernel: 9p: trans_fd/p9_conn_cancel: drop client lock earlier |
CVE-2022-49768
|
| VCID-s41g-eexw-x3h1 | kernel: net: ethernet: ti: am65-cpsw: Fix segmentation fault at module unload |
CVE-2022-49847
|
| VCID-s73j-mzkp-cydx | kernel: tracing: Fix memory leak in tracing_read_pipe() |
CVE-2022-49801
|
| VCID-sh2d-cpaq-mqb8 | kernel: ata: libata-transport: fix error handling in ata_tdev_add() |
CVE-2022-49823
|
| VCID-ss1u-z7g7-8bhd | kernel: tracing: kprobe: Fix potential null-ptr-deref on trace_event_file in kprobe_event_gen_test_exit() |
CVE-2022-49797
|
| VCID-sz3j-kms1-y3hj | kernel: bridge: switchdev: Fix memory leaks when changing VLAN protocol |
CVE-2022-49812
|
| VCID-tgd4-zrsa-9yf4 | kernel: perf: Improve missing SIGTRAP checking |
CVE-2022-49782
|
| VCID-tz5k-gaaf-37f2 | kernel: net: wwan: iosm: fix memory leak in ipc_wwan_dellink |
CVE-2022-49867
|
| VCID-tz8a-ry67-s3a7 | kernel: wifi: mac80211: fix general-protection-fault in ieee80211_subif_start_xmit() |
CVE-2022-49876
|
| VCID-u9ah-5bf4-17gj | Kernel: Request to NVME_IOCTL_RESET and NVME_IOCTL_SUBSYS_RESET may cause a DOS. |
CVE-2022-3169
|
| VCID-ubeg-s3fq-87an | kernel: kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case |
CVE-2022-49779
|
| VCID-uc5r-xszs-hqd3 | kernel: io_uring: fix multishot accept request leaks |
CVE-2022-49791
|
| VCID-ued9-gub9-hyfg | kernel: drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker() |
CVE-2022-49827
|
| VCID-uj4j-r8s3-pbed | kernel: bnxt_en: Fix possible crash in bnxt_hwrm_set_coal() |
CVE-2022-49869
|
| VCID-ujwe-etw2-9kbd | kernel: Input: i8042 - fix leaking of platform device on module removal |
CVE-2022-49777
|
| VCID-umyh-ms6n-xbgj | kernel: tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() |
CVE-2022-49800
|
| VCID-v229-es4m-kfcj | kernel: ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network |
CVE-2022-49865
|
| VCID-vdk2-bbpw-x3dq | kernel: serial: imx: Add missing .thaw_noirq hook |
CVE-2022-49841
|
| VCID-vrp7-j2xj-y7eu | kernel: erofs: fix missing xas_retry() in fscache mode |
CVE-2022-49815
|
| VCID-w6k2-b9ar-f7fz | kernel: race condition in kcm_tx_work() in net/kcm/kcmsock.c |
CVE-2022-3521
|
| VCID-w6mh-vvyh-dqge | kernel: tracing: kprobe: Fix potential null-ptr-deref on trace_array in kprobe_event_gen_test_exit() |
CVE-2022-49796
|
| VCID-wp7p-cvqn-4qhu | kernel: btrfs: fix match incorrectly in dev_args_match_device |
CVE-2022-49849
|
| VCID-wwcn-6yu3-n3h1 | kernel: blk-cgroup: properly pin the parent in blkcg_css_online |
CVE-2022-49786
|
| VCID-wxer-3nq8-wkat | kernel: bpf, test_run: Fix alignment problem in bpf_prog_test_run_skb() |
CVE-2022-49840
|
| VCID-wycp-m8h6-hbcx | kernel: x86/sgx: Add overflow check in sgx_validate_offset_length() |
CVE-2022-49785
|
| VCID-xcjv-m3zd-4bhd | kernel: bpf, verifier: Fix memory leak in array reallocation for stack state |
CVE-2022-49878
|
| VCID-xsek-a3dv-n3bw | kernel: net: mhi: Fix memory leak in mhi_net_dellink() |
CVE-2022-49817
|
| VCID-xxkj-u1gh-ubf4 | kernel: iio: adc: mp2629: fix potential array out of bound access |
CVE-2022-49792
|
| VCID-xz5n-ps6k-xfgk | kernel: net: wwan: mhi: fix memory leak in mhi_mbim_dellink |
CVE-2022-49866
|
| VCID-y397-gc8f-pfg7 | kernel: can: j1939: j1939_send_one(): fix missing CAN header initialization |
CVE-2022-49845
|
| VCID-y47g-2zsx-77ad | kernel: sctp: clear out_curr if all frag chunks of current msg are pruned |
CVE-2022-49838
|
| VCID-y6r5-t17r-zqgg | kernel: ata: libata-transport: fix error handling in ata_tport_add() |
CVE-2022-49825
|
| VCID-yctc-6784-fff2 | kernel: tracing: Fix race where eprobes can be called before the event |
CVE-2022-49798
|
| VCID-yeuf-t264-1qeg | kernel: ata: libata-transport: fix error handling in ata_tlink_add() |
CVE-2022-49824
|
| VCID-yge6-57az-pkag | kernel: iio: trigger: sysfs: fix possible memory leak in iio_sysfs_trig_init() |
CVE-2022-49793
|
| VCID-yyky-tmx3-mqg7 | kernel: drm/amd/display: Fix optc2_configure warning on dcn314 |
CVE-2022-49773
|
| VCID-yzmm-kkvg-ffaj | kernel: cifs: Fix connections leak when tlink setup failed |
CVE-2022-49822
|
| VCID-z4je-4dry-23gq | kernel: mISDN: fix misuse of put_device() in mISDN_register_device() |
CVE-2022-49818
|
| VCID-zabk-7t7q-77hz | kernel: tracing: Fix wild-memory-access in register_synth_event() |
CVE-2022-49799
|
| VCID-zka8-ndq7-5qbt | kernel: macvlan: enforce a consistent minimal mtu |
CVE-2022-49776
|
| VCID-zvjm-vg86-a3bt | kernel: dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove() |
CVE-2022-49861
|