Search for packages
| purl | pkg:alpm/archlinux/linux@6.2-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2na9-p1ae-2bdc | kernel: use-after-free in __nfs42_ssc_open() in fs/nfs/nfs4file.c leading to remote Denial of Service attack |
CVE-2022-4379
|
| VCID-369a-xh7h-9uca | kernel: usb: use-after-free write in put_dev |
CVE-2022-4382
|
| VCID-3ad4-u98h-mqf6 | kernel: hid: use-after-free in bigben_set_led() |
CVE-2023-25012
|
| VCID-4ave-x8wb-f7fw | kernel: insufficient TCP source port randomness leads to client identification |
CVE-2022-32296
|
| VCID-4gdy-gqe4-93f4 | Kernel: use-after-free in btf_dump_name_dups in tools/lib/bpf/btf_dump.c |
CVE-2022-3534
|
| VCID-4nqf-ct5y-6uev | kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c |
CVE-2022-42896
|
| VCID-5149-phe6-eqh5 | kernel: DoS in nfqnl_mangle in net/netfilter/nfnetlink_queue.c |
CVE-2022-36946
|
| VCID-5c6z-1ebs-wfev | kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak |
CVE-2022-1012
|
| VCID-6y4w-3ftc-qkgs | Kernel: A race between ufx_ops_open() and ufx_usb_disconnect() may result in UAF |
CVE-2022-41849
|
| VCID-7crw-vbpf-w7dx | kernel: leak of sensitive information due to uninitialized data in stex_queuecommand_lck() in drivers/scsi/stex.c |
CVE-2022-40768
|
| VCID-7dm1-5xf1-jkf7 | kernel: nilfs2: NULL pointer dereference in nilfs_bmap_lookup_at_level in fs/nilfs2/inode.c |
CVE-2022-3621
|
| VCID-7e2m-a86y-c3bd | kernel: media: em28xx: initialize refcount before kref_get |
CVE-2022-3239
|
| VCID-8834-7b7n-a7f1 | kernel: stack overflow in do_proc_dointvec and proc_skip_spaces |
CVE-2022-4378
|
| VCID-95yc-p1fc-7kea | kernel: nilfs2: use-after-free in nilfs_new_inode of fs/nilfs2/inode.c |
CVE-2022-3649
|
| VCID-96bc-a364-8fd5 | kernel: improper input validation in handling of SMB2_TREE_CONNECT command can result in out-of-bounds read which could result in DoS |
CVE-2022-47938
|
| VCID-98b2-bte2-wfd3 | kernel: A flaw in unix_sock_destructor/unix_release_sock in net/unix/af_unix.c leads to memory leak |
CVE-2022-3543
|
| VCID-9e8s-d6bj-kba4 | kernel: Race condition in roccat_report_event in drivers/hid/hid-roccat.c |
CVE-2022-41850
|
| VCID-9mam-pneh-5yhy | kernel: nfsd buffer overflow by RPC message over TCP with garbage data |
CVE-2022-43945
|
| VCID-agq2-bq7w-33d1 | Guests can trigger deadlock in Linux netback driver |
CVE-2022-42329
|
| VCID-ap5s-w9uk-zff3 | kernel: nfp: use-after-free in area_cache_get() |
CVE-2022-3545
|
| VCID-b87y-f2rd-2fg7 | kernel: NFS over RDMA random memory leakage |
CVE-2022-0812
|
| VCID-bp6k-v3c5-gudy | kernel: LoadPin bypass via dm-verity table reload |
CVE-2022-2503
|
| VCID-bt6z-fyxn-ckgt | kernel: use after in tst_timer in drivers/atm/idt77252.c |
CVE-2022-3635
|
| VCID-ckqp-r5m2-j3fx | kernel: data races around sk->sk_prot |
CVE-2022-3567
|
| VCID-cs99-jacq-qkey | kernel: use-after-free in l1oip timer handlers |
CVE-2022-3565
|
| VCID-d14e-jv1a-w7d3 | kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c |
CVE-2022-3619
|
| VCID-d79b-qtu3-hud8 | kernel: use-after-free bug in mctp_sk_unhash in net/mctp/af_mctp.c |
CVE-2022-3977
|
| VCID-dqhd-grev-t3ge | kernel: use-after-free related to leaf anon_vma double reuse |
CVE-2022-42703
|
| VCID-dqth-c54y-e7fb | kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt |
CVE-2022-3566
|
| VCID-ejj4-yt8j-c7fm | kernel: race condition in xfrm_probe_algs can lead to OOB read/write |
CVE-2022-3028
|
| VCID-ensk-7dvm-p7g7 | kernel: an out-of-bounds vulnerability in i2c-ismt driver |
CVE-2022-2873
|
| VCID-eyzv-gxvw-9kee | kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c may lead to crash |
CVE-2022-34495
|
| VCID-g2k9-eds7-6qe3 | kernel: memory corruption in usbmon driver |
CVE-2022-43750
|
| VCID-g8j3-3ky8-h7av | kernel: KVM: NULL pointer dereference in kvm_irq_delivery_to_apic_fast() |
CVE-2022-2153
|
| VCID-hnf3-a64g-3yba | kernel: Improper update of reference count in io_uring leads to use-after-free |
CVE-2022-3910
|
| VCID-hxzu-828c-3qfx | kernel: use after free bug in spl2sw_nvmem_get_mac_address |
CVE-2022-3541
|
| VCID-j8ze-t6w6-ekak | kernel: Information leak in l2cap_parse_conf_req in net/bluetooth/l2cap_core.c |
CVE-2022-42895
|
| VCID-jefe-c9nd-ufc1 | kernel: USB-accessible buffer overflow in brcmfmac |
CVE-2022-3628
|
| VCID-jw25-6cs7-dkev | Kernel: A flaw in damon_sysfs_add_target in mm/damon/sysfs.c in Netfilter leads to memory leak |
CVE-2022-3544
|
| VCID-kf7y-k2px-uug5 | kernel: net scheduler use-after-free information disclosure vulnerability |
CVE-2022-3586
|
| VCID-n2c4-w748-tyau | kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry |
CVE-2022-3623
|
| VCID-ng25-c2xk-9fem | kernel: NULL pointer dereference in traffic control subsystem |
CVE-2022-47929
|
| VCID-np7t-cj38-m3a7 | Guests can trigger NIC interface reset/abort/crash via netback |
CVE-2022-3643
|
| VCID-pphs-rtxe-wfca | kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c |
CVE-2022-3564
|
| VCID-pqzm-vutm-hkhn | Kernel: A type conflict of size_t versus int cause an integer overflow in pxa3xx_gcu_write |
CVE-2022-39842
|
| VCID-qare-c6yz-d3bt | kernel: a double free in drivers/rpmsg/virtio_rpmsg_bus.c |
CVE-2022-34494
|
| VCID-qbd9-czms-8qdn | kernel: vmwgfx: out-of-bounds write in vmw_kms_cursor_snoop |
CVE-2022-36280
|
| VCID-qgxx-2pek-nydy | kernel: use-after-free in efi_capsule_write in capsule-loader.c |
CVE-2022-40307
|
| VCID-qkam-j6uv-n7fj | kernel: NULL pointer dereference in rawv6_push_pending_frames |
CVE-2023-0394
|
| VCID-qu2u-k7ak-4qbb | kernel: nilfs2: memory leak in nilfs_attach_log_writer in fs/nilfs2/segment.c |
CVE-2022-3646
|
| VCID-r4pv-ac7b-aufb | ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF |
CVE-2023-0266
|
| VCID-s3tt-1m91-afar | kernel: smb2_write() fails to validate user supplied data which can result in out-of-bounds read |
CVE-2022-47940
|
| VCID-sv4s-h2k7-aygu | kernel: Report vmalloc UAF in dvb-core/dmxdev |
CVE-2022-41218
|
| VCID-sybh-ybu8-mfhv | kernel: handling of SMB2_NEGOTIATE command doesn't properly release memory which could result in DoS |
CVE-2022-47941
|
| VCID-t81u-wyws-r7c3 | kernel: Rate limit overflow messages in r8152 in intr_callback |
CVE-2022-3594
|
| VCID-v4c7-7k4y-ebf6 | kernel: NVME driver: null pointer dereference in drivers/nvme/target/auth.c |
CVE-2023-0122
|
| VCID-vmbf-nbfs-5bbb | kernel: slab-out-of-bounds read vulnerabilities in cbq_classify |
CVE-2023-23454
|
| VCID-vrmr-8pda-m3d8 | Kernel: A use after free in __mtk_ppe_check_skb in drivers/net/ethernet/mediatek/mtk_ppe.c |
CVE-2022-3636
|
| VCID-vu3z-hmu8-fkbn | kernel: libbpf: NULL pointer dereference in find_prog_by_sec_insn |
CVE-2022-3606
|
| VCID-vzpr-mm8p-yygx | kernel: netfilter: nf_conntrack_irc message handling issue |
CVE-2022-2663
|
| VCID-wmbn-me38-gbaf | kernel: fbdev: i740fb: divide-by-zero in drivers/video/fbdev/i740fb.c could lead to DoS |
CVE-2022-3061
|
| VCID-xdyu-fbfb-huh1 | kernel: smb2_tree_disconnect() fails to validate object existance prior to performing opertions on it |
CVE-2022-47939
|
| VCID-xpn4-e2aq-f3d7 | kernel: use-after-free in nilfs_mdt_destroy |
CVE-2022-2978
|
| VCID-xr58-t3v3-m3ep | kernel: race condition in snd_pcm_oss_sync leads to NULL pointer dereference |
CVE-2022-3303
|
| VCID-ycce-86bv-qfed | kernel: large length in the zero DataOffset case in smb2_write() processing could result in out-of-bounds read |
CVE-2022-47943
|
| VCID-zs49-wp5q-9be6 | kernel: use-after-free in io_sqpoll_wait_sq |
CVE-2022-47946
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:25:04.359227+00:00 | Arch Linux Importer | Fixing | VCID-b87y-f2rd-2fg7 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.336520+00:00 | Arch Linux Importer | Fixing | VCID-5c6z-1ebs-wfev | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.312247+00:00 | Arch Linux Importer | Fixing | VCID-g8j3-3ky8-h7av | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.289591+00:00 | Arch Linux Importer | Fixing | VCID-bp6k-v3c5-gudy | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.266548+00:00 | Arch Linux Importer | Fixing | VCID-vzpr-mm8p-yygx | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.243485+00:00 | Arch Linux Importer | Fixing | VCID-ensk-7dvm-p7g7 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.219717+00:00 | Arch Linux Importer | Fixing | VCID-xpn4-e2aq-f3d7 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.196203+00:00 | Arch Linux Importer | Fixing | VCID-ejj4-yt8j-c7fm | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.171329+00:00 | Arch Linux Importer | Fixing | VCID-wmbn-me38-gbaf | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.148487+00:00 | Arch Linux Importer | Fixing | VCID-4ave-x8wb-f7fw | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.125667+00:00 | Arch Linux Importer | Fixing | VCID-7e2m-a86y-c3bd | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.103160+00:00 | Arch Linux Importer | Fixing | VCID-xr58-t3v3-m3ep | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.079737+00:00 | Arch Linux Importer | Fixing | VCID-qare-c6yz-d3bt | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.056075+00:00 | Arch Linux Importer | Fixing | VCID-eyzv-gxvw-9kee | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.033846+00:00 | Arch Linux Importer | Fixing | VCID-4gdy-gqe4-93f4 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:04.011238+00:00 | Arch Linux Importer | Fixing | VCID-hxzu-828c-3qfx | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.988933+00:00 | Arch Linux Importer | Fixing | VCID-98b2-bte2-wfd3 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.963455+00:00 | Arch Linux Importer | Fixing | VCID-jw25-6cs7-dkev | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.939813+00:00 | Arch Linux Importer | Fixing | VCID-ap5s-w9uk-zff3 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.917011+00:00 | Arch Linux Importer | Fixing | VCID-pphs-rtxe-wfca | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.895465+00:00 | Arch Linux Importer | Fixing | VCID-cs99-jacq-qkey | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.873000+00:00 | Arch Linux Importer | Fixing | VCID-dqth-c54y-e7fb | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.850306+00:00 | Arch Linux Importer | Fixing | VCID-ckqp-r5m2-j3fx | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.826641+00:00 | Arch Linux Importer | Fixing | VCID-kf7y-k2px-uug5 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.804409+00:00 | Arch Linux Importer | Fixing | VCID-t81u-wyws-r7c3 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.782450+00:00 | Arch Linux Importer | Fixing | VCID-vu3z-hmu8-fkbn | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.758413+00:00 | Arch Linux Importer | Fixing | VCID-d14e-jv1a-w7d3 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.736887+00:00 | Arch Linux Importer | Fixing | VCID-7dm1-5xf1-jkf7 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.714863+00:00 | Arch Linux Importer | Fixing | VCID-n2c4-w748-tyau | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.692019+00:00 | Arch Linux Importer | Fixing | VCID-jefe-c9nd-ufc1 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.669542+00:00 | Arch Linux Importer | Fixing | VCID-qbd9-czms-8qdn | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.646237+00:00 | Arch Linux Importer | Fixing | VCID-bt6z-fyxn-ckgt | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.624599+00:00 | Arch Linux Importer | Fixing | VCID-vrmr-8pda-m3d8 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.602568+00:00 | Arch Linux Importer | Fixing | VCID-np7t-cj38-m3a7 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.580786+00:00 | Arch Linux Importer | Fixing | VCID-qu2u-k7ak-4qbb | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.558261+00:00 | Arch Linux Importer | Fixing | VCID-95yc-p1fc-7kea | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.536645+00:00 | Arch Linux Importer | Fixing | VCID-5149-phe6-eqh5 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.514316+00:00 | Arch Linux Importer | Fixing | VCID-hnf3-a64g-3yba | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.492645+00:00 | Arch Linux Importer | Fixing | VCID-d79b-qtu3-hud8 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.470014+00:00 | Arch Linux Importer | Fixing | VCID-pqzm-vutm-hkhn | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.447907+00:00 | Arch Linux Importer | Fixing | VCID-qgxx-2pek-nydy | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.425411+00:00 | Arch Linux Importer | Fixing | VCID-7crw-vbpf-w7dx | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.403903+00:00 | Arch Linux Importer | Fixing | VCID-sv4s-h2k7-aygu | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.381197+00:00 | Arch Linux Importer | Fixing | VCID-6y4w-3ftc-qkgs | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.358045+00:00 | Arch Linux Importer | Fixing | VCID-9e8s-d6bj-kba4 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.336633+00:00 | Arch Linux Importer | Fixing | VCID-agq2-bq7w-33d1 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.313446+00:00 | Arch Linux Importer | Fixing | VCID-dqhd-grev-t3ge | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.290019+00:00 | Arch Linux Importer | Fixing | VCID-j8ze-t6w6-ekak | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.268975+00:00 | Arch Linux Importer | Fixing | VCID-4nqf-ct5y-6uev | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.248586+00:00 | Arch Linux Importer | Fixing | VCID-g2k9-eds7-6qe3 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.225020+00:00 | Arch Linux Importer | Fixing | VCID-8834-7b7n-a7f1 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.203286+00:00 | Arch Linux Importer | Fixing | VCID-2na9-p1ae-2bdc | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.181264+00:00 | Arch Linux Importer | Fixing | VCID-369a-xh7h-9uca | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.158958+00:00 | Arch Linux Importer | Fixing | VCID-9mam-pneh-5yhy | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.138348+00:00 | Arch Linux Importer | Fixing | VCID-ng25-c2xk-9fem | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.115421+00:00 | Arch Linux Importer | Fixing | VCID-96bc-a364-8fd5 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.092924+00:00 | Arch Linux Importer | Fixing | VCID-xdyu-fbfb-huh1 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.071458+00:00 | Arch Linux Importer | Fixing | VCID-s3tt-1m91-afar | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.051413+00:00 | Arch Linux Importer | Fixing | VCID-sybh-ybu8-mfhv | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.031378+00:00 | Arch Linux Importer | Fixing | VCID-ycce-86bv-qfed | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:03.010774+00:00 | Arch Linux Importer | Fixing | VCID-zs49-wp5q-9be6 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:02.990432+00:00 | Arch Linux Importer | Fixing | VCID-v4c7-7k4y-ebf6 | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:02.969285+00:00 | Arch Linux Importer | Fixing | VCID-r4pv-ac7b-aufb | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:02.941256+00:00 | Arch Linux Importer | Fixing | VCID-qkam-j6uv-n7fj | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:02.920782+00:00 | Arch Linux Importer | Fixing | VCID-vmbf-nbfs-5bbb | https://security.archlinux.org/AVG-2837 | 38.0.0 |
| 2026-04-01T18:25:02.899411+00:00 | Arch Linux Importer | Fixing | VCID-3ad4-u98h-mqf6 | https://security.archlinux.org/AVG-2837 | 38.0.0 |