[DSA-5050-1] linux
Severity
High
Affected Packages
1
CVEs
12
security update
no info
Package | Affected Version |
---|---|
pkg:deb/debian/linux?distro=bullseye | < 5.10.92-1 |
- ID
- DSA-5050-1
- Severity
- high
- Severity from
- CVE-2022-0185
- URL
- https://www.debian.org/security/dsa-5050-1
- Published
-
2022-01-20T00:00:00
(2 years ago) - Modified
-
2022-01-20T00:00:00
(2 years ago) - Other Advisories
-
- ALAS-2022-1563
- ALAS-2023-1688
- ALAS2-2022-1749
- ALSA-2022:0188
- ALSA-2024:3138
- ASB-A-210292376
- CISA-2024:0821
- DSA-5096-1
- ELSA-2022-0188
- ELSA-2022-0620
- ELSA-2022-9010
- ELSA-2022-9011
- ELSA-2022-9012
- ELSA-2022-9013
- ELSA-2022-9014
- ELSA-2022-9028
- ELSA-2022-9029
- ELSA-2022-9088
- ELSA-2022-9147
- ELSA-2022-9148
- ELSA-2022-9244
- ELSA-2022-9245
- ELSA-2022-9348
- ELSA-2022-9365
- ELSA-2022-9368
- ELSA-2022-9781
- ELSA-2024-3138
- FEDORA-2021-4f1a2cdf2e
- FEDORA-2021-a7a558062e
- FEDORA-2021-c387682aa1
- FEDORA-2021-e6cbca1e9e
- FEDORA-2022-6352c313b7
- FEDORA-2022-6d4082d590
- FEDORA-2022-952bb7b856
- FEDORA-2022-edbd74424e
- MS:CVE-2021-28714
- MS:CVE-2021-28715
- MS:CVE-2021-4155
- MS:CVE-2021-45095
- MS:CVE-2021-45469
- MS:CVE-2021-45480
- MS:CVE-2022-0185
- MS:CVE-2022-23222
- openSUSE-SU-2022:0056-1
- openSUSE-SU-2022:0131-1
- openSUSE-SU-2022:0169-1
- openSUSE-SU-2022:0198-1
- openSUSE-SU-2022:0363-1
- openSUSE-SU-2022:0366-1
- openSUSE-SU-2022:0370-1
- RHSA-2022:0176
- RHSA-2022:0188
- RHSA-2022:0232
- RHSA-2022:0592
- RHSA-2022:0620
- RHSA-2022:0622
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2022:176
- RLSA-2024:3138
- SSA:2022-031-01
- SSA:2022-129-01
- SUSE-SU-2022:0056-1
- SUSE-SU-2022:0068-1
- SUSE-SU-2022:0079-1
- SUSE-SU-2022:0080-1
- SUSE-SU-2022:0090-1
- SUSE-SU-2022:0131-1
- SUSE-SU-2022:0169-1
- SUSE-SU-2022:0181-1
- SUSE-SU-2022:0197-1
- SUSE-SU-2022:0198-1
- SUSE-SU-2022:0238-1
- SUSE-SU-2022:0239-1
- SUSE-SU-2022:0241-1
- SUSE-SU-2022:0254-1
- SUSE-SU-2022:0257-1
- SUSE-SU-2022:0262-1
- SUSE-SU-2022:0270-1
- SUSE-SU-2022:0288-1
- SUSE-SU-2022:0289-1
- SUSE-SU-2022:0291-1
- SUSE-SU-2022:0292-1
- SUSE-SU-2022:0293-1
- SUSE-SU-2022:0295-1
- SUSE-SU-2022:0362-1
- SUSE-SU-2022:0363-1
- SUSE-SU-2022:0365-1
- SUSE-SU-2022:0366-1
- SUSE-SU-2022:0367-1
- SUSE-SU-2022:0370-1
- SUSE-SU-2022:0371-1
- SUSE-SU-2022:0477-1
- SUSE-SU-2022:0543-1
- SUSE-SU-2022:0544-1
- SUSE-SU-2022:0555-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:2520-1
- SUSE-SU-2022:2615-1
- SUSE-SU-2022:3264-1
- SUSE-SU-2022:3450-1
- SUSE-SU-2022:3609-1
- SUSE-SU-2022:3809-1
- USN-5240-1
- USN-5278-1
- USN-5294-1
- USN-5294-2
- USN-5295-1
- USN-5295-2
- USN-5297-1
- USN-5298-1
- USN-5337-1
- USN-5338-1
- USN-5339-1
- USN-5343-1
- USN-5362-1
- USN-5368-1
- USN-5377-1
- USN-5505-1
- USN-5513-1
- USN-5884-1
- USN-5926-1
- USN-6001-1
- USN-6013-1
- USN-6014-1
- XSA-391
- XSA-392
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-4155 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155 | |
CVE | CVE-2021-28711 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711 | |
CVE | CVE-2021-28712 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712 | |
CVE | CVE-2021-28713 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713 | |
CVE | CVE-2021-28714 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714 | |
CVE | CVE-2021-28715 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715 | |
CVE | CVE-2021-39685 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685 | |
CVE | CVE-2021-45095 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095 | |
CVE | CVE-2021-45469 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469 | |
CVE | CVE-2021-45480 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480 | |
CVE | CVE-2022-0185 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185 | |
CVE | CVE-2022-23222 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/debian/linux?distro=bullseye | debian | linux | < 5.10.92-1 | bullseye |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |