Search for packages
| purl | pkg:deb/debian/linux@6.0.3-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-125m-fp2w-tuhe | kernel: riscv: vdso: fix NULL deference in vdso_join_timens() when vfork |
CVE-2022-50674
|
| VCID-1c3z-6d7v-qyct | kernel: cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message |
CVE-2022-50859
|
| VCID-1cjg-p935-n3h5 | kernel: jbd2: fix potential use-after-free in jbd2_fc_wait_bufs |
CVE-2022-50328
|
| VCID-26jx-suvc-dyba | kernel: nvmet-tcp: add bounds check on Transfer Tag |
CVE-2022-50717
|
| VCID-2erk-kmye-vucd | kernel: Bluetooth: avoid hci_dev_test_and_set_flag() in mgmt_init_hdev() |
CVE-2022-50339
|
| VCID-2h8d-g1pd-9yge | kernel: RDMA/rxe: Fix "kernel NULL pointer dereference" error |
CVE-2022-50671
|
| VCID-3537-atnw-gubu | kernel: Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times |
CVE-2022-50419
|
| VCID-37hp-ea1n-gbdy | kernel: scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID |
CVE-2022-50467
|
| VCID-3exz-1der-4khr | kernel: media: cx88: Fix a null-ptr-deref bug in buffer_prepare() |
CVE-2022-50359
|
| VCID-3skb-vq6z-eka1 | kernel: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() |
CVE-2022-50408
|
| VCID-3xa4-a7x2-huh7 | kernel: drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue() |
CVE-2022-50515
|
| VCID-46e5-e2xf-6udw | kernel: ext2: Add sanity checks for group and filesystem size |
CVE-2022-50815
|
| VCID-4d97-s9s9-ubbz | kernel: drm/meson: remove drm bridges at aggregate driver unbind time |
CVE-2022-50256
|
| VCID-4j5w-syvu-hfgg | kernel: blk-throttle: prevent overflow while calculating wait time |
CVE-2022-50580
|
| VCID-4npm-xvf7-gqbb | kernel: UM: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK |
CVE-2022-50296
|
| VCID-4zqp-54zw-5bac | kernel: fpga: prevent integer overflow in dfl_feature_ioctl_set_irq() |
CVE-2022-50623
|
| VCID-546y-9zy8-wuf8 | kernel: dmaengine: qcom-adm: fix wrong sizeof config in slave_config |
CVE-2022-50540
|
| VCID-5xq9-qwbh-8bfp | kernel: clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe |
CVE-2022-50644
|
| VCID-62rh-k676-37by | kernel: xfrm: Update ipcomp_scratches with NULL when freed |
CVE-2022-50569
|
| VCID-64cn-5bjx-bybp | kernel: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory |
CVE-2022-50409
|
| VCID-64g6-pe8r-9yhy | kernel: dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg |
CVE-2022-50721
|
| VCID-657g-4e3s-qbbb | kernel: iomap: iomap: fix memory corruption when recording errors during writeback |
CVE-2022-50406
|
| VCID-66ca-wdys-fqhn | kernel: md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() |
CVE-2022-50752
|
| VCID-6axj-zn2f-tkbp | kernel: Bluetooth: L2CAP: Fix user-after-free |
CVE-2022-50386
|
| VCID-6gf6-ahp4-c7hj | kernel: wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected |
CVE-2022-50665
|
| VCID-6y4w-3ftc-qkgs | Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF |
CVE-2022-41849
|
| VCID-75tm-u3sx-kfbc | kernel: bpf: Propagate error from htab_lock_bucket() to userspace |
CVE-2022-50490
|
| VCID-775y-68ew-93gk | kernel: power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type() |
CVE-2022-50649
|
| VCID-7gtj-pdmf-afg4 | kernel: md: Replace snprintf with scnprintf |
CVE-2022-50299
|
| VCID-81rm-qknn-57c3 | kernel: io_uring/rw: defer fsnotify calls to task context |
CVE-2022-50705
|
| VCID-8d95-uau1-j7bs | kernel: Linux kernel: Denial of Service in mt7921e driver during module unload |
CVE-2022-50714
|
| VCID-8hqn-cmae-53dg | kernel: blk-mq: use quiesced elevator switch when reinitializing queues |
CVE-2022-50552
|
| VCID-8pdf-nkhe-1ydk | kernel: xen/gntdev: Accommodate VMA splitting |
CVE-2022-50471
|
| VCID-8u8a-sa9s-6uct | kernel: i2c: designware: Fix handling of real but unexpected device interrupts |
CVE-2022-50370
|
| VCID-8yjc-erzv-y3ar | kernel: dmaengine: hisilicon: Add multi-thread support for a DMA channel |
CVE-2022-50362
|
| VCID-98b2-bte2-wfd3 | kernel: A flaw in unix_sock_destructor/unix_release_sock in net/unix/af_unix.c leads to memory leak |
CVE-2022-3543
|
| VCID-9bwe-fr4p-dfe3 | kernel: dm: verity-loadpin: Only trust verity targets with enforcement |
CVE-2022-50621
|
| VCID-9e8s-d6bj-kba4 | kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c |
CVE-2022-41850
|
| VCID-9ekb-fmv2-7yhw | kernel: drm/meson: explicitly remove aggregate driver at module unload time |
CVE-2022-50560
|
| VCID-9fzm-6dud-47g2 | kernel: ftrace: Fix recursive locking direct_mutex in ftrace_modify_direct_caller |
CVE-2022-50648
|
| VCID-9mam-pneh-5yhy | kernel: nfsd buffer overflow by RPC message over TCP with garbage data |
CVE-2022-43945
|
| VCID-a4k4-ch4y-27c9 | kernel: tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown |
CVE-2022-50375
|
| VCID-a7te-4g1h-d7ah | kernel: drivers: serial: jsm: fix some leaks in probe |
CVE-2022-50312
|
| VCID-a9cp-jj3b-g3by | kernel: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() |
CVE-2022-50709
|
| VCID-afwb-6d63-qbbq | kernel: drm/virtio: Check whether transferred 2D BO is shmem |
CVE-2022-50842
|
| VCID-aq9h-kfyd-7bcc | kernel: staging: greybus: audio_helper: remove unused and wrong debugfs usage |
CVE-2022-50400
|
| VCID-ar1z-pudt-vfb9 | kernel: Linux kernel (ext4): Memory leak due to improper handling of krealloc failure |
CVE-2022-50622
|
| VCID-arva-magd-gyaw | kernel: nbd: Fix hung when signal interrupts nbd_start_device_ioctl() |
CVE-2022-50314
|
| VCID-au1n-5n84-cfey | kernel: use-after-free when an io_uring request is being processed |
CVE-2022-2602
|
| VCID-auky-3szs-mbhn | kernel: Linux kernel: Denial of Service via refcount leak in ocxl afu_ioctl() |
CVE-2022-50742
|
| VCID-ba3a-11hz-q7e4 | kernel: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() |
CVE-2022-50698
|
| VCID-c3rn-zqxh-tqdt | kernel: powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() |
CVE-2022-50635
|
| VCID-c49x-pj4y-r3dj | kernel: staging: vt6655: fix some erroneous memory clean-up loops |
CVE-2022-50355
|
| VCID-c4uq-rfmc-fugt | kernel: udmabuf: Set ubuf->sg = NULL if the creation of sg table fails |
CVE-2022-50819
|
| VCID-cs99-jacq-qkey | kernel: use-after-free in l1oip timer handlers |
CVE-2022-3565
|
| VCID-d6ux-y5jf-pkgb | kernel: regulator: core: Prevent integer underflow |
CVE-2022-50582
|
| VCID-dcyy-895z-syd7 | kernel: clk: tegra20: Fix refcount leak in tegra20_clock_init |
CVE-2022-50444
|
| VCID-ddag-5a3j-7fdx | kernel: Kernel: Denial of Service via memory leak in mqueue component |
CVE-2022-50748
|
| VCID-djnk-z5ny-97hm | kernel: media: uvcvideo: Fix memory leak in uvc_gpio_parse |
CVE-2022-50882
|
| VCID-dnce-tc37-7yhj | kernel: fsi: occ: Prevent use after free |
CVE-2022-50785
|
| VCID-dpah-3hkx-rbbu | kernel: drm/amd: fix potential memory leak |
CVE-2022-50479
|
| VCID-dpcb-htcf-hbct | kernel: RISC-V: Make port I/O string accessors actually work |
CVE-2022-50647
|
| VCID-dwu3-cv61-7fb4 | kernel: clk: imx: scu: fix memleak on platform_device_add() fails |
CVE-2022-50559
|
| VCID-dzhn-g8fd-4yg1 | kernel: fs: dlm: fix invalid derefence of sb_lvbptr |
CVE-2022-50516
|
| VCID-e11b-m9g4-vfhu | kernel: usb: dwc3: core: fix some leaks in probe |
CVE-2022-50357
|
| VCID-e8xw-sw6g-2bhq | kernel: ext4: fix potential memory leak in ext4_fc_record_regions() |
CVE-2022-50512
|
| VCID-efkk-gv56-dbd8 | kernel: f2fs: fix to do sanity check on summary info |
CVE-2022-50753
|
| VCID-epus-vfcr-qkav | kernel: mm: hugetlb: fix UAF in hugetlb_handle_userfault |
CVE-2022-50630
|
| VCID-esh3-dkyx-43hf | kernel: HSI: omap_ssi: Fix refcount leak in ssi_probe |
CVE-2022-50641
|
| VCID-f74q-hyvf-b7du | kernel: net/ieee802154: don't warn zero-sized raw_sendmsg() |
CVE-2022-50706
|
| VCID-fb7m-jaf7-tugv | kernel: Linux kernel xHCI DbC: Denial of Service via memory leak |
CVE-2022-50809
|
| VCID-fcht-8p3b-fbee | kernel: scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername() |
CVE-2022-50459
|
| VCID-fj6m-sefc-pyg1 | kernel: dmaengine: ti: k3-udma: Reset UDMA_CHAN_RT byte counters to prevent overflow |
CVE-2022-50541
|
| VCID-g3cm-95kg-jfdx | kernel: media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init |
CVE-2022-50309
|
| VCID-g6cn-1z44-2bb3 | kernel: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash |
CVE-2022-50494
|
| VCID-gfkq-757f-vygv | kernel: ACPI: tables: FPDT: Don't call acpi_os_map_memory() on invalid phys address |
CVE-2022-50320
|
| VCID-gg3w-g76t-vkcm | kernel: drm/mipi-dsi: Detach devices when removing the host |
CVE-2022-50489
|
| VCID-gm7v-6v2w-wygh | kernel: drm/amdgpu: SDMA update use unlocked iterator |
CVE-2022-50393
|
| VCID-hkgt-ar69-4bet | kernel: x86/apic: Don't disable x2APIC if locked |
CVE-2022-50720
|
| VCID-hm6m-9cz8-gqeh | kernel: Kernel: Denial of Service via memory leak in wifi power saving mode |
CVE-2022-50863
|
| VCID-hv1y-ut9n-bbgm | kernel: wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state() |
CVE-2022-50880
|
| VCID-hxzu-828c-3qfx | kernel: use after free bug in spl2sw_nvmem_get_mac_address |
CVE-2022-3541
|
| VCID-jrua-87tq-zqd5 | kernel: ALSA: usb-audio: Fix potential memory leaks |
CVE-2022-50484
|
| VCID-jt2d-8j8q-4uac | kernel: btrfs: fix race between quota enable and quota rescan ioctl |
CVE-2022-50379
|
| VCID-jw6y-nfap-jfc2 | kernel: jbd2: fix potential buffer head reference count leak |
CVE-2022-50839
|
| VCID-k13a-9cax-c7hc | kernel: media: airspy: fix memory leak in airspy probe |
CVE-2022-50326
|
| VCID-k4nc-2pq1-yfgy | kernel: Linux kernel: Denial of Service due to memory allocation failure in vhost/vsock |
CVE-2022-50271
|
| VCID-kd42-ujcf-wucd | kernel: HSI: ssi_protocol: fix potential resource leak in ssip_pn_open() |
CVE-2022-50708
|
| VCID-kef6-pu4g-eyeu | kernel: wifi: mac80211: fix use-after-free |
CVE-2022-50413
|
| VCID-kmwg-y1rm-1kf9 | kernel: Linux kernel: Denial of Service in akcipher due to missing set_priv_key stub |
CVE-2022-50731
|
| VCID-m7vs-ucbg-uua9 | kernel: memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings() |
CVE-2022-50429
|
| VCID-m89v-au2s-nuep | kernel: clk: zynqmp: Fix stack-out-of-bounds in strncpy` |
CVE-2022-50828
|
| VCID-mg23-2zn7-wqdb | kernel: NFSD: fix use-after-free on source server when doing inter-server copy |
CVE-2022-50241
|
| VCID-mjmn-n38h-vfg3 | kernel: platform/chrome: fix memory corruption in ioctl |
CVE-2022-50570
|
| VCID-mrhs-1bmb-3bc5 | kernel: drm/virtio: improper return value check in virtio_gpu_object_shmem_init() |
CVE-2023-22998
|
| VCID-mrz8-zxmd-5bf1 | kernel: powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue |
CVE-2022-50366
|
| VCID-mvbf-u5ft-xkbb | kernel: nfsd: Fix a memory leak in an error handling path |
CVE-2022-50348
|
| VCID-n2c4-w748-tyau | kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry |
CVE-2022-3623
|
| VCID-n2ke-u9j1-s3gh | kernel: memory: of: Fix refcount leak bug in of_get_ddr_timings() |
CVE-2022-50249
|
| VCID-n6aw-6a1e-p3h5 | kernel: MIPS: SGI-IP27: Fix platform-device leak in bridge_platform_create() |
CVE-2022-50281
|
| VCID-nape-4unc-xubd | kernel: scsi: libsas: Fix use-after-free bug in smp_execute_task_sg() |
CVE-2022-50422
|
| VCID-nb49-x8f3-z7ah | kernel: ext4: avoid crash when inline data creation follows DIO write |
CVE-2022-50435
|
| VCID-nnwz-xwba-gqcy | kernel: scsi: pm8001: Fix running_req for internal abort commands |
CVE-2022-50818
|
| VCID-nsv2-4qub-93dd | kernel: sctp: handle the error returned from sctp_auth_asoc_init_active_key |
CVE-2022-50243
|
| VCID-nvum-z9k5-sbff | kernel: staging: rtl8723bs: fix potential memory leak in rtw_init_drv_sw() |
CVE-2022-50469
|
| VCID-p7qv-7vba-cyg2 | kernel: arm64: ftrace: fix module PLTs with mcount |
CVE-2022-50579
|
| VCID-p9eh-asff-63hk | kernel: net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks() |
CVE-2022-50676
|
| VCID-qa3a-a7pr-x3a2 | kernel: Linux kernel: Denial of Service in ice driver via uninitialized transmit rings |
CVE-2022-50710
|
| VCID-qd7g-ymh4-xfd1 | kernel: wifi: brcmfmac: fix invalid address access when enabling SCAN log level |
CVE-2022-50678
|
| VCID-qdd1-rxsn-ruan | kernel: erofs: fix order >= MAX_ORDER warning due to crafted negative i_size |
CVE-2022-50313
|
| VCID-qfn9-cfux-nbhz | kernel: drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table() |
CVE-2022-50454
|
| VCID-qq5x-xmtg-t7hd | kernel: fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL |
CVE-2022-50778
|
| VCID-qqwr-5mbd-87ds | kernel: NFSD: Protect against send buffer overflow in NFSv2 READ |
CVE-2022-50410
|
| VCID-qqzx-u8uc-4bdc | kernel: btrfs: set generation before calling btrfs_clean_tree_block in btrfs_init_new_buffer |
CVE-2022-50766
|
| VCID-qspk-728w-dyh3 | kernel: crypto: marvell/octeontx - prevent integer overflows |
CVE-2022-50763
|
| VCID-quug-aggs-sufx | kernel: slimbus: qcom-ngd: cleanup in probe error path |
CVE-2022-50298
|
| VCID-qyaq-9p19-4fe6 | kernel: mm/uffd: fix warning without PTE_MARKER_UFFD_WP compiled in |
CVE-2022-50448
|
| VCID-qzjj-xut2-hfcd | kernel: usb: idmouse: fix an uninit-value in idmouse_open |
CVE-2022-50733
|
| VCID-rgvu-bner-sfbj | kernel: drm/msm: Make .remove and .shutdown HW shutdown consistent |
CVE-2022-50260
|
| VCID-rhs7-avgn-e7dr | kernel: drm: bridge: adv7511: unregister cec i2c device after cec adapter |
CVE-2022-50412
|
| VCID-rt98-yj63-bqcj | kernel: arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored |
CVE-2022-50675
|
| VCID-rvan-76qw-b7gd | kernel: Linux kernel: Denial of Service due to improper io_uring/af_unix file cleanup |
CVE-2022-50234
|
| VCID-s2n9-r1up-tbhf | kernel: jbd2: add miss release buffer head in fc_do_one_pass() |
CVE-2022-50835
|
| VCID-sbhg-xkzr-sqfn | kernel: eth: alx: take rtnl_lock on resume |
CVE-2022-50498
|
| VCID-skuu-buv9-s7hd | kernel: iommu/omap: Fix buffer overflow in debugfs |
CVE-2022-50301
|
| VCID-spy9-7v3j-5bbn | kernel: clk: tegra: Fix refcount leak in tegra210_clock_init |
CVE-2022-50458
|
| VCID-sr2p-b884-5fa6 | kernel: xen/gntdev: Prevent leaking grants |
CVE-2022-50257
|
| VCID-swu2-ef3y-cygu | kernel: clk: tegra: Fix refcount leak in tegra114_clock_init |
CVE-2022-50823
|
| VCID-sxt6-cu8s-nkd1 | kernel: crypto: cavium - prevent integer overflow loading firmware |
CVE-2022-50330
|
| VCID-sz6z-361q-13h1 | kernel: wifi: mt76: mt7921: fix use after free in mt7921_acpi_read() |
CVE-2022-50852
|
| VCID-t71g-qp5g-3yhz | kernel: crypto: qat - fix DMA transfer direction |
CVE-2022-50774
|
| VCID-t81u-wyws-r7c3 | kernel: Rate limit overflow messages in r8152 in intr_callback |
CVE-2022-3594
|
| VCID-tmdg-ytf3-dkf4 | kernel: f2fs: fix to do sanity check on destination blkaddr during recovery |
CVE-2022-50273
|
| VCID-uhbj-tg49-7yhc | kernel: xfrm: Reinject transport-mode packets through workqueue |
CVE-2022-50445
|
| VCID-uspu-t854-j3an | kernel: NFSD: Protect against send buffer overflow in NFSv2 READDIR |
CVE-2022-50235
|
| VCID-uxd7-rhdp-myak | kernel: crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr |
CVE-2022-50814
|
| VCID-v2ka-1q1b-nyh4 | kernel: drm/meson: reorder driver deinit sequence to fix use-after-free bug |
CVE-2022-50378
|
| VCID-v9q1-cbq6-9bbc | kernel: wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register() |
CVE-2022-50418
|
| VCID-va52-3n1k-vugn | kernel: ext4: fix null-ptr-deref in ext4_write_info |
CVE-2022-50344
|
| VCID-vczs-zdyv-bkaa | kernel: drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl() |
CVE-2022-50667
|
| VCID-ve64-7aw3-gych | kernel: drm/bridge: megachips: Fix a null pointer dereference bug |
CVE-2022-50317
|
| VCID-vf91-sxvs-77at | kernel: usb: musb: Fix musb_gadget.c rxstate overflow bug |
CVE-2022-50876
|
| VCID-vgd5-jh9f-6ygx | kernel: usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info() |
CVE-2022-50544
|
| VCID-wems-qvj9-gkbf | kernel: tracing: Fix reading strings from synthetic events |
CVE-2022-50255
|
| VCID-wpst-btb8-fuht | kernel: staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv() |
CVE-2022-50513
|
| VCID-wx18-wkfb-wqa9 | kernel: drm: Prevent drm_copy_field() to attempt copying a NULL pointer |
CVE-2022-50884
|
| VCID-x1vv-m8mn-6yff | kernel: rpmsg: char: Avoid double destroy of default endpoint |
CVE-2022-50421
|
| VCID-x88m-6k5m-1qcz | kernel: Linux kernel: Denial of service in lontium-lt9611 GPU driver due to NULL pointer dereference |
CVE-2022-50878
|
| VCID-x9ps-372g-fyet | kernel: fs: dlm: fix race in lowcomms |
CVE-2022-50373
|
| VCID-xeu1-ggx7-ufdq | kernel: Kernel: Denial of Service via refcount leak in qcom_smsm_probe() |
CVE-2022-50703
|
| VCID-xmrx-85ye-sfhp | kernel: nvmem: core: Fix memleak in nvmem_register() |
CVE-2022-50734
|
| VCID-z4pp-efxx-77dn | kernel: drm/omap: dss: Fix refcount leak bugs |
CVE-2022-50574
|
| VCID-z59f-qh7b-uybz | kernel: staging: vt6655: fix potential memory leak |
CVE-2022-50758
|
| VCID-zgak-w6v9-1qaq | kernel: memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe() |
CVE-2022-50480
|
| VCID-zjt4-avr3-kkh7 | kernel: bpf: Fix reference state management for synchronous callbacks |
CVE-2022-50650
|
| VCID-zkc3-wk25-uue1 | kernel: RDMA/siw: Fix QP destroy to wait for all references dropped |
CVE-2022-50666
|
| VCID-znzg-71sh-ufe9 | kernel: Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure |
CVE-2022-50374
|