Search for packages
| purl | pkg:deb/debian/linux@5.10.191-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-138j-qpva-83g6 | kernel: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device |
CVE-2023-54015
|
| VCID-16br-bzvr-7qfv | kernel: PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free |
CVE-2023-53446
|
| VCID-1ae9-q8q5-2fex | kernel: blk-mq: release crypto keyslot before reporting I/O complete |
CVE-2023-53810
|
| VCID-1mvr-e49w-pyfh | kernel: wifi: iwlwifi: mvm: don't trust firmware n_channels |
CVE-2023-53589
|
| VCID-1mxz-hub2-bye7 | kernel: Kernel: Denial of Service due to a Netlink subsystem deadlock |
CVE-2023-53731
|
| VCID-1sbg-c7yt-4fhe | kernel: RDMA/bnxt_re: wraparound mbox producer index |
CVE-2023-53201
|
| VCID-1w3n-43ke-qycm | kernel: net/sched: cls_api: remove block_cb from driver_list before freeing |
CVE-2023-54193
|
| VCID-24gs-ss6s-2ka7 | kernel: Kernel: Denial of Service due to memory leak in RAID10 functionality |
CVE-2023-54123
|
| VCID-25a4-f83g-bbg5 | kernel: cassini: Fix a memory leak in the error handling path of cas_init_one() |
CVE-2023-53435
|
| VCID-25c2-u9tf-7ub9 | kernel: ring-buffer: Fix deadloop issue on reading trace_pipe |
CVE-2023-53668
|
| VCID-2n9k-dqfk-gkb9 | kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible |
CVE-2023-31084
|
| VCID-2ru8-h22u-fkd4 | kernel: clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() |
CVE-2023-53704
|
| VCID-2ts1-5xpy-xqgj | kernel: dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path |
CVE-2023-53604
|
| VCID-3545-g373-gfc8 | kernel: misc: pci_endpoint_test: Free IRQs before removing the device |
CVE-2023-54326
|
| VCID-36dt-1x7b-wqaa | Linux: buffer overrun in netback due to unusual packet |
CVE-2023-34319
|
| VCID-3afh-2eps-zyad | kernel: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" |
CVE-2023-54197
|
| VCID-3c3s-pan1-6qbm | kernel: tunnels: fix kasan splat when generating ipv4 pmtu error |
CVE-2023-53600
|
| VCID-3cwp-edrx-xqch | kernel: rkvdec: race condition leading to use-after-free in rkvdec_remove() |
CVE-2023-35829
|
| VCID-3j3q-7f5k-sfbr | kernel: net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize |
CVE-2023-53667
|
| VCID-3ttp-n51m-aqba | kernel: modpost: fix off by one in is_executable_section() |
CVE-2023-53397
|
| VCID-3vet-pxz4-wyh7 | kernel: tracing/histograms: Add histograms to hist_vars if they have referenced variables |
CVE-2023-53560
|
| VCID-3y3t-hzg8-53hx | kernel: scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition |
CVE-2023-54310
|
| VCID-41g6-mpge-8kh4 | kernel: ring-buffer: Sync IRQ works before buffer destruction |
CVE-2023-53587
|
| VCID-44bm-syn1-hyhy | kernel: IB/hfi1: Fix possible panic during hotplug remove |
CVE-2023-53488
|
| VCID-44ju-k8mr-z3g8 | kernel: HID: wacom: Use ktime_t rather than int when dealing with timestamps |
CVE-2023-53797
|
| VCID-477g-7889-57dq | kernel: wifi: iwlwifi: fw: fix memory leak in debugfs |
CVE-2023-53422
|
| VCID-4881-ghcy-xqf1 | kernel: nilfs2: do not write dirty data after degenerating to read-only |
CVE-2023-53337
|
| VCID-4g65-7md3-cff7 | kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk |
CVE-2023-53687
|
| VCID-4kpf-dcsj-rfg4 | kernel: btrfs: fix warning when putting transaction with qgroups enabled after abort |
CVE-2023-53865
|
| VCID-4qkm-y3jd-33db | kernel: devlink: report devlink_port_type_warn source device |
CVE-2023-53841
|
| VCID-4u48-gp9x-y3fq | kernel: f2fs: compress: fix to call f2fs_wait_on_page_writeback() in f2fs_write_raw_pages() |
CVE-2023-54068
|
| VCID-512g-1f3a-bfdb | kernel: USB: sisusbvga: Add endpoint checks |
CVE-2023-54213
|
| VCID-57t9-mmrw-y3ba | kernel: sched/fair: Don't balance task to its current running CPU |
CVE-2023-53215
|
| VCID-5dna-xxsu-nbgr | kernel: power: supply: bq27xxx: Fix poll_interval handling and races on remove |
CVE-2023-54079
|
| VCID-5h2b-jped-j7ha | kernel: serial: 8250: Reinit port->pm on port specific driver unbind |
CVE-2023-53176
|
| VCID-5m3a-6ssy-f3at | kernel: firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() |
CVE-2023-53255
|
| VCID-5m63-9wck-6ud6 | kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() |
CVE-2023-35823
|
| VCID-5tf2-unbh-1qat | kernel: ACPI: EC: Fix oops when removing custom query handlers |
CVE-2023-54244
|
| VCID-61au-ujuc-g7ek | kernel: amdgpu: validate offset_in_bo of drm_amdgpu_gem_va |
CVE-2023-53819
|
| VCID-68ny-yt7k-5fcy | kernel: A null-ptr-deref bug in f2fs_write_end_io in fs/f2fs/data.c |
CVE-2023-2898
|
| VCID-6aaf-fc5z-5uah | kernel: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow |
CVE-2023-54102
|
| VCID-6cxe-5q6b-mye8 | kernel: sfc: fix crash when reading stats while NIC is resetting |
CVE-2023-54156
|
| VCID-6d3k-au9g-yue9 | kernel: x86/MCE/AMD: Use an u64 for bank_map |
CVE-2023-53474
|
| VCID-6kuc-j7wz-33fk | kernel: scsi: core: Fix possible memory leak if device_add() fails |
CVE-2023-53174
|
| VCID-6mym-hek2-nyb4 | kernel: Kernel: Denial of Service via ubifs memory leak |
CVE-2023-53276
|
| VCID-6n6j-exu4-5qfq | kernel: md/raid10: fix memleak of md thread |
CVE-2023-54294
|
| VCID-6n89-yvxb-pqfg | kernel: can: bcm: Fix UAF in bcm_proc_show() |
CVE-2023-52922
|
| VCID-6p1q-p1qq-sfcc | kernel: net: add vlan_get_protocol_and_depth() helper |
CVE-2023-53433
|
| VCID-6rrf-4361-v3d1 | kernel: usb: dwc3: qcom: Fix potential memory leak |
CVE-2023-53196
|
| VCID-6zqb-728p-kbf2 | kernel: spmi: Add a check for remove callback when removing a SPMI driver |
CVE-2023-54044
|
| VCID-7479-xf67-f7bd | kernel: netlink: do not hard code device address lenth in fdb dumps |
CVE-2023-53863
|
| VCID-79nq-9bmr-4kfe | kernel: ionic: remove WARN_ON to prevent panic_on_warn |
CVE-2023-53994
|
| VCID-7a2r-7emu-zqdt | kernel: netfilter: nf_tables_newrule when adding a rule with NFTA_RULE_CHAIN_ID leads to use-after-free |
CVE-2023-4147
|
| VCID-7bbh-sp1w-v3a9 | Kernel: a USB-accessible slab-out-of-bounds read in brcmfmac |
CVE-2023-1380
|
| VCID-7cwd-mns4-pqab | kernel: ext4: fix WARNING in mb_find_extent |
CVE-2023-53317
|
| VCID-7q57-v22u-a3an | kernel: USB: gadget: Fix the memory leak in raw_gadget driver |
CVE-2023-53693
|
| VCID-7vst-mvv6-dudd | kernel: ALSA: hda: Fix Oops by 9.1 surround channel names |
CVE-2023-53400
|
| VCID-867j-x4ha-f3et | kernel: inotify: Avoid reporting event with invalid wd |
CVE-2023-54119
|
| VCID-889g-dpv6-d3a6 | kernel: clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe |
CVE-2023-53725
|
| VCID-8qeq-tj4k-sfcw | kernel: shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs |
CVE-2023-53391
|
| VCID-8tnf-q5r9-67au | kernel: icmp6: Fix null-ptr-deref of ip6_null_entry->rt6i_idev in icmp6_dev() |
CVE-2023-53343
|
| VCID-8vy1-ccwn-qud7 | kernel: Linux kernel: Denial of Service via use-after-free in vc_screen |
CVE-2023-53747
|
| VCID-94kr-upt7-ducu | kernel: io_uring: io_defer_entry object double free vulnerability |
CVE-2023-21400
|
| VCID-964d-x242-33cc | kernel: DPT I2O controller TOCTOU information disclosure vulnerability |
CVE-2023-2007
|
| VCID-98am-gev3-rfa9 | kernel: scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() |
CVE-2023-53754
|
| VCID-9cat-tz9k-9kcb | kernel: netfilter: use-after-free due to improper element removal in nft_pipapo_remove() |
CVE-2023-4004
|
| VCID-9qaw-87cm-jubs | kernel: seccomp: Move copy_seccomp() to no failure path |
CVE-2022-50661
|
| VCID-9ucy-kbah-yyae | kernel: scsi: qedf: Fix NULL dereference in error handling |
CVE-2023-54289
|
| VCID-a2u7-uepg-jfa1 | kernel: gfs2: NULL pointer dereference in gfs2_evict_inode() |
CVE-2023-3212
|
| VCID-a65f-yw25-bybx | kernel: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex |
CVE-2023-53715
|
| VCID-a67m-rg36-aqgw | kernel: scsi: target: Fix multiple LUN_RESET handling |
CVE-2023-53586
|
| VCID-aed8-exun-wyhu | kernel: Linux kernel: Memory leak in r8712 driver |
CVE-2023-54001
|
| VCID-afph-5dqk-67cr | kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() |
CVE-2023-35788
|
| VCID-amx2-unds-6qav | kernel: Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe |
CVE-2023-53533
|
| VCID-av9p-jct2-8kb5 | kernel: nilfs2: fix infinite loop in nilfs_mdt_get_block() |
CVE-2023-53845
|
| VCID-axj2-267a-5kdv | kernel: ipvlan: out-of-bounds write caused by unclear skb->cb |
CVE-2023-3090
|
| VCID-b6hf-evy1-77hf | kernel: dax: Fix dax_mapping_release() use after free |
CVE-2023-53613
|
| VCID-b8wn-e4jg-gyap | kernel: net/sched: sch_fq: fix integer overflow of "credit" |
CVE-2023-53624
|
| VCID-bbmk-aj7s-ffam | kernel: ubifs: Fix memleak when insert_old_idx() failed |
CVE-2023-54050
|
| VCID-bcrq-77ew-2bh4 | kernel: crypto: safexcel - Cleanup ring IRQ workqueues on load failure |
CVE-2023-54126
|
| VCID-bdv6-qrn1-aqhv | kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead |
CVE-2023-3611
|
| VCID-bfqv-fhhd-t7fp | An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access. |
CVE-2023-34256
|
| VCID-bkxu-zjjm-w3gc | kernel: usb: typec: altmodes/displayport: fix pin_assignment_show |
CVE-2023-54186
|
| VCID-bph8-pjeh-vqc9 | kernel: md/raid10: check slab-out-of-bounds in md_bitmap_get_counter |
CVE-2023-53357
|
| VCID-bss4-njk5-8uhv | kernel: net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx |
CVE-2023-53546
|
| VCID-bt8w-fzcd-r3bf | kernel: media: bdisp: Add missing check for create_workqueue |
CVE-2023-53289
|
| VCID-c1jc-n1w5-aycd | kernel: DECnet: crash due to a NULL pointer dereference in the dn_nsp_send function |
CVE-2023-3338
|
| VCID-c7ed-rzgn-aue3 | kernel: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost |
CVE-2023-53730
|
| VCID-cdk9-g2mt-tue1 | kernel: scsi: qla2xxx: Array index may go out of bound |
CVE-2023-54179
|
| VCID-cfqh-wnw4-efdq | kernel: powerpc/powernv/sriov: perform null check on iov before dereferencing iov |
CVE-2023-54315
|
| VCID-ckwt-aphw-dyd8 | kernel: ext4: set goal start correctly in ext4_mb_normalize_request |
CVE-2023-54021
|
| VCID-crn4-wv85-cbdc | kernel: MIPS: fw: Allow firmware to pass a empty env |
CVE-2023-54279
|
| VCID-cva5-ymye-hyg4 | kernel: renesas_usb3: race condition leading to use-after-free in renesas_usb3_remove() |
CVE-2023-35828
|
| VCID-d2f8-dt9k-37bv | kernel: Linux kernel (soundwire): Memory corruption due to incorrect device enumeration completion |
CVE-2023-54096
|
| VCID-dehk-m7t3-q7a3 | kernel: potential deadlock on &net->sctp.addr_wq_lock leading to DOS |
CVE-2024-0639
|
| VCID-djyp-77yw-cfh2 | kernel: scsi: qla2xxx: Wait for io return on terminate rport |
CVE-2023-53322
|
| VCID-dkpb-6kwe-j7b1 | kernel: wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() |
CVE-2023-53213
|
| VCID-dm3r-us9z-5uc3 | kernel: Linux kernel iavf driver: Denial of Service via use-after-free vulnerability |
CVE-2023-53556
|
| VCID-dmd6-w6km-2kan | kernel: net: prevent skb corruption on frag list segmentation |
CVE-2023-54094
|
| VCID-dmr7-td91-f3dt | kernel: scsi: qedi: Fix use after free bug in qedi_remove() |
CVE-2023-54100
|
| VCID-dp4w-ncq8-7kaa | kernel: DCCP: conntrack out-of-bounds read in nf_conntrack_dccp_packet() |
CVE-2023-39197
|
| VCID-dtzb-vs94-3ygt | kernel: arm64: set __exception_irq_entry with __irq_entry as a default |
CVE-2023-54322
|
| VCID-e5fc-vwbg-67et | kernel: btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() |
CVE-2022-50067
|
| VCID-e8sx-z6ar-fbhd | kernel: bpf: Disable preemption in bpf_event_output |
CVE-2023-54173
|
| VCID-ed7y-vzk5-53bs | kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c |
CVE-2022-45919
|
| VCID-edr3-34sp-yfhf | kernel: btrfs: fix race when deleting quota root from the dirty cow roots list |
CVE-2023-54032
|
| VCID-edzq-t5kb-cfb2 | kernel: f2fs: fix potential corruption when moving a directory |
CVE-2023-54187
|
| VCID-egrk-dnue-xua1 | kernel: soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe |
CVE-2023-53744
|
| VCID-en16-v6sc-mye2 | kernel: media: max9286: Free control handler |
CVE-2023-54078
|
| VCID-engs-a36k-jbek | kernel: ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline |
CVE-2023-53692
|
| VCID-enhw-t1e8-mqgs | kernel: drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras |
CVE-2023-53471
|
| VCID-epv8-hpsc-m7eu | kernel: nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() |
CVE-2023-53804
|
| VCID-es7r-me5f-kybz | kernel: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() |
CVE-2023-54168
|
| VCID-ewv6-exh4-qyan | kernel: usb-storage: alauda: Fix uninit-value in alauda_check_media() |
CVE-2023-53847
|
| VCID-exhr-aa3g-vkcs | kernel: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() |
CVE-2023-54104
|
| VCID-exwn-3w4u-4uc9 | kernel: use-after-free while changing the mount option in __ext4_remount leading |
CVE-2024-0775
|
| VCID-eztd-5whs-w7hy | kernel: wifi: ath11k: Fix SKB corruption in REO destination ring |
CVE-2023-53315
|
| VCID-fb5f-stch-mfdf | kernel: sh: dma: Fix DMA channel offset calculation |
CVE-2023-54255
|
| VCID-fhep-d1cx-kqh9 | kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c |
CVE-2023-40283
|
| VCID-fvcr-e29k-ukb5 | kernel: tracing: Fix null pointer dereference in tracing_err_log_open() |
CVE-2023-53167
|
| VCID-g28s-3qsu-nqan | kernel: media: radio-shark: Add endpoint checks |
CVE-2023-53644
|
| VCID-g4s5-nket-w3fd | kernel: media: netup_unidvb: fix use-after-free at del_timer() |
CVE-2023-53219
|
| VCID-g5r1-82b3-j7b1 | kernel: staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() |
CVE-2023-53554
|
| VCID-g6yc-cmf7-kbhf | kernel: use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c |
CVE-2023-51043
|
| VCID-g9yd-msre-3qdk | kernel: spi: bcm-qspi: return error if neither hif_mspi nor mspi is available |
CVE-2023-53658
|
| VCID-gatd-ftk1-6qbx | kernel: fbdev: udlfb: Fix endpoint check |
CVE-2023-54277
|
| VCID-ge2g-2ct8-4bdk | kernel: ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer |
CVE-2023-53648
|
| VCID-gfzy-amh8-cbd3 | kernel: scsi: qla2xxx: Pointer may be dereferenced |
CVE-2023-53150
|
| VCID-gg7k-damt-c3h5 | kernel: Linux kernel: Resource leak in arc_uart driver can cause denial of service |
CVE-2023-53719
|
| VCID-gjpd-7pcg-87bq | kernel: Linux kernel: ACPICA undefined behavior due to zero offset to null pointer |
CVE-2023-53182
|
| VCID-gru1-3qdq-wkbc | kernel: debugobjects: Don't wake up kswapd from fill_pool() |
CVE-2023-54268
|
| VCID-gumy-u2pm-w7hu | kernel: Linux kernel: Denial of Service due to memory leak in drm_client_target_cloned function |
CVE-2023-54091
|
| VCID-h2f7-5j4n-ubhn | kernel: ipv6/addrconf: fix a potential refcount underflow for idev |
CVE-2023-53189
|
| VCID-h64k-rgd3-qfet | kernel: binder: fix memory leak in binder_init() |
CVE-2023-54005
|
| VCID-h6x6-v8yq-3yed | kernel: Use after free in prepare_to_relocate in fs/btrfs/relocation.c |
CVE-2023-3111
|
| VCID-h7g4-jvdx-kkd1 | kernel: net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs() |
CVE-2023-54218
|
| VCID-h82m-mnhk-67e2 | kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning |
CVE-2022-39189
|
| VCID-h9yg-t4f4-xkde | kernel: null_blk: Always check queue mode setting from configfs |
CVE-2023-53576
|
| VCID-hckv-bkqu-hbdw | kernel: phy: tegra: xusb: Clear the driver reference in usb-phy dev |
CVE-2023-54083
|
| VCID-hctp-1qet-vqdp | kernel: keys: Fix linking a duplicate key to a keyring's assoc_array |
CVE-2023-54170
|
| VCID-hm59-t1bg-d3h3 | kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp |
CVE-2023-53297
|
| VCID-hr7a-fb7t-3yaj | kernel: nubus: Partially revert proc_create_single_data() conversion |
CVE-2023-53217
|
| VCID-hwea-6qbk-77h8 | kernel: drm/amd: Fix an out of bounds error in BIOS parser |
CVE-2023-54150
|
| VCID-hwfn-tg8r-ayf4 | kernel: samples/bpf: Fix buffer overflow in tcp_basertt |
CVE-2023-54312
|
| VCID-j4xv-b39v-kfdn | kernel: use-after-free in netfilter: nf_tables |
CVE-2023-3777
|
| VCID-j5tb-xs2c-xuay | kernel: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free |
CVE-2023-53619
|
| VCID-j6td-3edb-rugg | kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function |
CVE-2023-3776
|
| VCID-j7z5-3htn-vkd2 | kernel: hash collisions in the IPv6 connection lookup table |
CVE-2023-1206
|
| VCID-jcv1-jyqc-17au | kernel: wifi: fix registration of 6Ghz-only phy without the full channel range |
CVE-2023-54229
|
| VCID-jeuf-4esy-jbg7 | kernel: ext4: fix deadlock when converting an inline directory in nojournal mode |
CVE-2023-54311
|
| VCID-jk8u-bh1q-27er | kernel: clk: tegra: tegra124-emc: Fix potential memory leak |
CVE-2023-53505
|
| VCID-jk9v-vbte-yqeq | kernel: exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree |
CVE-2023-54194
|
| VCID-jpac-fzq5-kkaw | kernel: x86/kprobes: Update kcb status flag after singlestepping |
CVE-2022-50096
|
| VCID-jwap-xgp1-eyfr | kernel: btrfs: add handling for RAID1C23/DUP to btrfs_reduce_alloc_profile |
CVE-2023-53243
|
| VCID-kcf4-wg4w-vub8 | kernel: spi: qup: Don't skip cleanup in remove's error path |
CVE-2023-53567
|
| VCID-ke38-q17b-13hz | kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c |
CVE-2022-45887
|
| VCID-kejc-7s3x-huah | kernel: KVM: s390: pv: fix index value of replaced ASCE |
CVE-2023-54092
|
| VCID-khqx-5cyy-p3fv | kernel: md/raid10: fix null-ptr-deref in raid10_sync_request |
CVE-2023-53832
|
| VCID-khyt-2dss-uyb7 | kernel: md/raid10: fix leak of 'r10bio->remaining' for recovery |
CVE-2023-53299
|
| VCID-kqpg-pdfs-ekeq | kernel: scsi: snic: Fix possible memory leak if device_add() fails |
CVE-2023-53436
|
| VCID-ktvv-15kj-3fg7 | kernel: netfilter: nft_set_rbtree: fix null deref on element insertion |
CVE-2023-53566
|
| VCID-kujt-f192-bbhd | kernel: hwrng: virtio - Fix race on data_avail and actual data |
CVE-2023-53998
|
| VCID-kz9r-zumw-5ydf | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails |
CVE-2023-3609
|
| VCID-kzqe-em17-qba9 | kernel: wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled |
CVE-2023-54025
|
| VCID-m3vx-r3rc-cbgv | kernel: net: dcb: choose correct policy to parse DCB_ATTR_BCN |
CVE-2023-53369
|
| VCID-m3zf-1wsd-3fge | kernel: drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend |
CVE-2023-53723
|
| VCID-mbng-7v9u-53bu | kernel: md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request |
CVE-2023-53380
|
| VCID-mdjx-3kwa-r7bj | Kernel: bluetooth: Unauthorized management command execution |
CVE-2023-2002
|
| VCID-me4v-v73a-wqfc | kernel: lib: cpu_rmap: Avoid use after free on rmap->obj array entries |
CVE-2023-53484
|
| VCID-mfnd-m99x-k7f2 | kernel: posix-timers: Ensure timer ID search-loop limit is valid |
CVE-2023-53728
|
| VCID-mkmd-7f9e-dfcr | kernel: fs/sysv: Null check to prevent null-ptr-deref bug |
CVE-2023-54264
|
| VCID-mmj5-wfd1-bqdc | kernel: fs: Protect reconfiguration of sb read-write from racing writes |
CVE-2023-54099
|
| VCID-mn4r-bmzm-1kf7 | kernel: drm/msm/dp: Free resources after unregistering them |
CVE-2023-53316
|
| VCID-mxay-xfc3-j7en | kernel: vmci_host: fix a race condition in vmci_host_poll() causing GPF |
CVE-2023-54007
|
| VCID-myxg-t4ps-p7ew | kernel: scsi: storvsc: Fix handling of virtual Fibre Channel timeouts |
CVE-2023-53245
|
| VCID-n5sq-sfyw-wkbr | kernel: dm flakey: fix a crash with invalid table line |
CVE-2023-53786
|
| VCID-n86h-xjhp-s3c8 | kernel: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace |
CVE-2023-54286
|
| VCID-n972-wtzq-n3aq | kernel: net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb |
CVE-2023-53548
|
| VCID-n9b6-h9j7-3kgq | kernel: ext4: remove a BUG_ON in ext4_mb_release_group_pa() |
CVE-2023-53450
|
| VCID-nfmn-7pq2-hyhf | kernel: exFAT: stack overflow in exfat_get_uniname_from_ext_entry |
CVE-2023-4273
|
| VCID-nkep-ndxw-zfdr | kernel: phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() |
CVE-2023-53238
|
| VCID-nkm6-5vjq-wyec | kernel: net: fix stack overflow when LRO is disabled for virtual interfaces |
CVE-2023-54012
|
| VCID-nq6h-uf67-suak | kernel: btrfs: don't free qgroup space unless specified |
CVE-2023-54158
|
| VCID-nqtn-45jw-7qc5 | kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes |
CVE-2023-53185
|
| VCID-nxkh-as3r-cufe | kernel: net/mlx5e: Check for NOT_READY flag state after locking |
CVE-2023-53581
|
| VCID-p59k-2p7u-2keu | kernel: jfs: jfs_dmap: Validate db_l2nbperpage while mounting |
CVE-2023-53222
|
| VCID-p7w9-bfka-u7ck | kernel: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() |
CVE-2023-52885
|
| VCID-p9fw-gd7k-cud3 | kernel: nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput |
CVE-2023-53311
|
| VCID-pehy-gz4a-x3d6 | kernel: erofs: stop parsing non-compact HEAD index if clusterofs is invalid |
CVE-2023-54132
|
| VCID-ph3h-q9uj-6udt | kernel: ext4: allow ext4_get_group_info() to fail |
CVE-2023-53503
|
| VCID-pmrs-y4qx-kqf5 | kernel: non-PAGE_SIZE-end multi-iovec user SDMA requests |
CVE-2023-52474
|
| VCID-pqja-9s5g-nkbe | kernel: wifi: ath9k: hif_usb: fix memory leak of remain_skbs |
CVE-2023-53641
|
| VCID-psd5-1grp-a7ec | kernel: md/raid10: fix wrong setting of max_corr_read_errors |
CVE-2023-53313
|
| VCID-pyu4-rsap-2fhx | kernel: out-of-bounds access in relay_file_read |
CVE-2023-3268
|
| VCID-q5ke-8q3r-qycu | kernel: ext4: add bounds checking in get_max_inline_xattr_value_size() |
CVE-2023-53285
|
| VCID-qnpz-8gsp-5yc5 | kernel: ASoC: fsl_mqs: move of_node_put() to the correct location |
CVE-2023-53268
|
| VCID-qquf-qkzh-7ydq | kernel: tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error |
CVE-2023-53858
|
| VCID-qqz8-a63y-jydg | kernel: drm/client: Fix memory leak in drm_client_modeset_probe |
CVE-2023-53288
|
| VCID-qtm2-45az-qygz | kernel: Linux kernel: Out-of-bounds write in VXLAN due to incorrect nexthop hash size leading to denial of service |
CVE-2023-53192
|
| VCID-qtv9-fm5u-7bbg | kernel: scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() |
CVE-2023-54014
|
| VCID-qx7e-pw1p-q7gw | kernel: usb: gadget: u_serial: Add null pointer check in gserial_suspend |
CVE-2023-53356
|
| VCID-r5ss-5zkg-r7fd | kernel: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access |
CVE-2023-53419
|
| VCID-renx-7s4p-puaa | kernel: Use after free bug in r592_remove |
CVE-2023-3141
|
| VCID-rkp9-av2n-fqdm | kernel: Linux kernel: Denial of Service due to incorrect network packet processing in NSH module |
CVE-2023-54114
|
| VCID-rn4q-b4yc-9bar | kernel: ext4: fix invalid free tracking in ext4_xattr_move_to_block() |
CVE-2023-54062
|
| VCID-rytm-rguv-ffe5 | kernel: bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent |
CVE-2023-53681
|
| VCID-sasn-ry1b-v7a1 | kernel: net: fec: Better handle pm_runtime_get() failing in .remove() |
CVE-2023-53308
|
| VCID-sdqs-a8df-87d8 | kernel: kheaders: Use array declaration instead of char |
CVE-2023-54056
|
| VCID-sha9-td26-mqc9 | kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid |
CVE-2023-4194
|
| VCID-srrf-b9jk-5uge | kernel: use-after-free due to race condition occurring in dvb_net.c |
CVE-2022-45886
|
| VCID-sunz-pqkg-s3eb | kernel: netlink: annotate accesses to nlk->cb_running |
CVE-2023-53853
|
| VCID-swwx-5jbc-n7da | kernel: wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx |
CVE-2023-54300
|
| VCID-t6vp-xgs3-cqda | kernel: igb: Fix igb_down hung on surprise removal |
CVE-2023-53148
|
| VCID-t7ma-7tpc-gbgp | kernel: usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() |
CVE-2023-53379
|
| VCID-t7q4-3b72-u3a5 | kernel: OOB access in the Linux kernel's XFS subsystem |
CVE-2023-2124
|
| VCID-tatw-j5rx-gkb9 | kernel: gtp: Fix use-after-free in __gtp_encap_destroy() |
CVE-2023-54142
|
| VCID-tbhm-pf8b-4uc9 | kernel: posix-timers: Prevent RT livelock in itimer_delete() |
CVE-2023-53815
|
| VCID-tguf-9ks8-2kcc | kernel: ext2: Check block size validity during mount |
CVE-2023-53569
|
| VCID-thw5-hvm8-j7f4 | kernel: Linux kernel: Denial of Service via malicious MTU negotiation in TIPC |
CVE-2023-53517
|
| VCID-tk64-28cs-n7hd | kernel: iavf: Fix out-of-bounds when setting channels on remove |
CVE-2023-53659
|
| VCID-try9-jrjw-pye8 | kernel: use-after-free in nfc_llcp_find_loca in net/nfc/llcp_core.c |
CVE-2023-3863
|
| VCID-tte1-xd13-nfd6 | kernel: netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one |
CVE-2023-53333
|
| VCID-ubr3-74hm-e7hy | kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route |
CVE-2023-4207
|
| VCID-uc3a-36wc-n3bt | kernel: smsusb: use-after-free caused by do_submit_urb() |
CVE-2023-4132
|
| VCID-upx2-tk53-pyb1 | kernel: RDMA/srpt: Add a check for valid 'mad_agent' pointer |
CVE-2023-54274
|
| VCID-uswu-w3g7-9ybk | kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() |
CVE-2023-35824
|
| VCID-uv78-72se-9uaw | kernel: scsi: target: iscsit: Free cmds before session free |
CVE-2023-54184
|
| VCID-va3r-ah2e-9kcp | kernel: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path |
CVE-2023-54009
|
| VCID-vb7t-3b26-3kdj | kernel: RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests |
CVE-2021-47391
|
| VCID-vck8-gsxy-93du | kernel: f2fs: fix to drop all dirty pages during umount() if cp_error is set |
CVE-2023-54124
|
| VCID-vczs-dhkw-jbed | kernel: wifi: ath6kl: reduce WARN to dev_dbg() in callback |
CVE-2023-53639
|
| VCID-ve6e-z3h8-y7ad | kernel: pinctrl: at91-pio4: check return value of devm_kasprintf() |
CVE-2023-54319
|
| VCID-vejg-5n4z-c7e8 | kernel: arm64: mm: fix VA-range sanity check |
CVE-2023-53989
|
| VCID-vevj-ugw9-yuey | kernel: dccp: fix data-race around dp->dccps_mss_cache |
CVE-2023-53839
|
| VCID-vhvf-zpp5-r7a4 | kernel: Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer |
CVE-2023-3389
|
| VCID-vpjc-naan-kuar | kernel: netfilter: nf_tables: do not ignore genmask when looking up chain by id |
CVE-2023-53492
|
| VCID-vtu4-ahaf-yyeq | kernel: Linux kernel: Denial of Service in netfilter due to improper garbage collection |
CVE-2023-53304
|
| VCID-vyq8-v1y5-6ueu | kernel: rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale |
CVE-2023-53291
|
| VCID-w7j4-yg6r-gfes | kernel: drm/i915: Make intel_get_crtc_new_encoder() less oopsy |
CVE-2023-53571
|
| VCID-wapp-6nmy-r3en | kernel: clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe |
CVE-2023-53249
|
| VCID-wf5j-rr3s-a3dz | kernel: Linux kernel: Network subsystem memory leak |
CVE-2023-53716
|
| VCID-wmmv-qwck-cbdq | kernel: net: ena: fix shift-out-of-bounds in exponential backoff |
CVE-2023-53272
|
| VCID-wrhr-cgd4-4ycs | kernel: USB: usbtmc: Fix direction for 0-length ioctl control messages |
CVE-2023-53761
|
| VCID-wt54-7n7s-zudn | kernel: tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation |
CVE-2023-54309
|
| VCID-wv8d-q36s-kyhh | kernel: Linux kernel: Denial of Service via null pointer dereference in ACPI |
CVE-2023-54010
|
| VCID-ww6h-udc8-47g6 | kernel: spi: imx: Don't skip cleanup in remove's error path |
CVE-2023-53225
|
| VCID-wzfs-19ss-5fav | kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos |
CVE-2023-2269
|
| VCID-wzkx-7sxx-77dr | kernel: bpf: Address KCSAN report on bpf_lru_list |
CVE-2023-54283
|
| VCID-x531-vx5g-eqe1 | kernel: drm/ttm: check null pointer before accessing when swapping |
CVE-2023-53352
|
| VCID-x5kn-javc-rqbf | kernel: Linux kernel: Denial of Service in io_uring due to hung task detection |
CVE-2023-53461
|
| VCID-x8jd-vket-qkec | kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv() |
CVE-2023-53705
|
| VCID-xa79-jw93-u7d5 | kernel: tracing: Fix memory leak of iter->temp when reading trace_pipe |
CVE-2023-54171
|
| VCID-xen2-vhq4-r7af | kernel: Linux kernel: Denial of Service in iwlwifi due to NULL pointer dereference |
CVE-2023-54053
|
| VCID-xg9e-jazf-1kfh | kernel: usb: mtu3: fix kernel panic at qmu transfer done irq handler |
CVE-2023-54159
|
| VCID-xuhu-rkfu-z7cg | kernel: Linux kernel: Denial of Service due to file descriptor leak in BPF sample code |
CVE-2023-53290
|
| VCID-y5ww-vmwk-k3dr | kernel: Linux kernel UDPLITE: Denial of Service via null pointer dereference |
CVE-2023-54004
|
| VCID-y6kd-c3u5-v3h6 | kernel: blk-crypto: make blk_crypto_evict_key() more robust |
CVE-2023-53536
|
| VCID-y7cq-znbn-uyeb | kernel: fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() |
CVE-2023-53683
|
| VCID-y7h4-s9p8-d3hd | kernel: scsi: qla2xxx: Fix potential NULL pointer dereference |
CVE-2023-53451
|
| VCID-yrxe-ak75-qfhh | kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route |
CVE-2023-4206
|
| VCID-ytjs-9bm9-jfbu | kernel: Linux kernel: md/raid10 soft lockup due to unlimited plugged bio |
CVE-2023-53151
|
| VCID-yxah-yhn3-t3cd | kernel: Linux kernel: Integer overflow in iwlwifi debugfs function |
CVE-2023-53524
|
| VCID-yy39-8y66-p3cc | kernel: Linux kernel: Memory leak in stm32-pwr regulator driver can lead to denial of service |
CVE-2023-54097
|
| VCID-z4t8-ndxb-zbea | kernel: Linux kernel: Denial of Service via NULL pointer dereference in pstore/ram |
CVE-2023-54189
|
| VCID-z6t2-t5hv-a7hg | kernel: scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue |
CVE-2023-53280
|
| VCID-z7rt-5hen-k7ar | kernel: bcache: fixup btree_cache_wait list damage |
CVE-2023-54293
|
| VCID-zbbv-tgna-hybm | kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route |
CVE-2023-4208
|
| VCID-zdee-dnta-kubb | kernel: firmware: arm_sdei: Fix sleep from invalid context BUG |
CVE-2023-54160
|
| VCID-zecf-aqzn-b7bj | kernel: tracing: Fix warning in trace_buffered_event_disable() |
CVE-2023-54211
|
| VCID-zeck-847h-gudx | kernel: recordmcount: Fix memory leaks in the uwrite function |
CVE-2023-53318
|
| VCID-zeve-rm21-cke1 | kernel: media: rcar_fdp1: Fix refcount leak in probe and remove function |
CVE-2023-54109
|
| VCID-zfcy-q38c-ykhx | kernel: ip6mr: Fix skb_under_panic in ip6mr_cache_report() |
CVE-2023-53365
|
| VCID-zgmy-uanj-m3hv | kernel: f2fs: fix to avoid use-after-free for cached IPU bio |
CVE-2023-53537
|
| VCID-zmmm-mp7d-rbga | kernel: rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed |
CVE-2023-53655
|
| VCID-zn57-m9ah-3uhw | security update |
CVE-2023-21255
|
| VCID-zt19-xh97-sfeg | kernel: tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp |
CVE-2023-53489
|
| VCID-ztvj-tw3n-sqhh | kernel: af_unix: Fix data races around sk->sk_shutdown |
CVE-2023-54226
|
| VCID-zx2j-mx5w-8uc5 | kernel: ALSA: firewire-digi00x: prevent potential use after free |
CVE-2023-54084
|
| VCID-zxpt-nqyj-ruat | kernel: net: CPU soft lockup in TC mirred egress-to-ingress action |
CVE-2022-4269
|
| VCID-zzue-2497-mkg4 | kernel: fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() |
CVE-2023-53650
|