Search for packages
| purl | pkg:deb/debian/linux@5.10.205-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-139j-84md-tkct | kernel: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data |
CVE-2023-52873
|
| VCID-1g8h-fk1v-guey | kernel: use-after-free in powermate_config_complete |
CVE-2023-52475
|
| VCID-1pdf-5dvg-8qgq | kernel: tty: vcc: Add check for kstrdup() in vcc_probe() |
CVE-2023-52789
|
| VCID-21g8-6kdd-cqb1 | kernel: netfilter: nf_tables: adapt set backend to use GC transaction API |
CVE-2023-52923
|
| VCID-23y8-xncn-u7cn | kernel: soc: qcom: llcc: Handle a second device without data corruption |
CVE-2023-52871
|
| VCID-2rfc-1u9s-77bh | kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number |
CVE-2023-52881
|
| VCID-3cna-8nke-q3gh | kernel: hwmon: (axi-fan-control) Fix possible NULL pointer dereference |
CVE-2023-52863
|
| VCID-3df3-3dfp-q3c9 | kernel: drm/panel: fix a possible null pointer dereference |
CVE-2023-52821
|
| VCID-3m3s-1vh4-zfhy | kernel: dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock |
CVE-2023-52516
|
| VCID-3ms7-4899-ukc9 | kernel: net: fix possible store tearing in neigh_periodic_work() |
CVE-2023-52522
|
| VCID-4gzu-g4mx-ckgt | kernel: ipvlan: add ipvlan_route_v6_outbound() helper |
CVE-2023-52796
|
| VCID-4u31-ahkq-57ga | kernel: clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data |
CVE-2023-52858
|
| VCID-5duf-9bsu-v3dw | kernel: NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c |
CVE-2023-46343
|
| VCID-5jwc-14fb-e3gs | kernel: hid: cp2112: Fix duplicate workqueue initialization |
CVE-2023-52853
|
| VCID-5rac-gfy9-bugc | kernel: net: rds: NULL pointer dereference in rds_rdma_cm_event_handler_cmn() |
CVE-2023-52573
|
| VCID-5xdz-ffvu-1uc5 | kernel: netfilter: nf_tables: don't skip expired elements during walk |
CVE-2023-52924
|
| VCID-5z11-6c3t-ckd3 | kernel: team: NULL pointer dereference when team device type is changed |
CVE-2023-52574
|
| VCID-62ev-d1nw-gugs | kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data |
CVE-2023-52875
|
| VCID-64k8-rbwm-bqch | kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker |
CVE-2023-52764
|
| VCID-6uhu-k3un-gqbn | kernel: nfc: nci: fix possible NULL pointer dereference in send_acknowledge() |
CVE-2023-52919
|
| VCID-74dk-5bz3-s3hc | kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() |
CVE-2023-52832
|
| VCID-75n6-1yvd-tugy | kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING |
CVE-2023-52845
|
| VCID-77qs-8umq-h3f3 | kernel: nfc: nci: assert requested protocol is valid |
CVE-2023-52507
|
| VCID-7gfp-kd1q-w3eq | kernel: net: bridge: data races indata-races in br_handle_frame_finish() |
CVE-2023-52578
|
| VCID-7uw4-3vse-jbhh | kernel: media: vidtv: mux: Add check and kfree for kstrdup |
CVE-2023-52841
|
| VCID-7ww9-pgk5-jkgc | kernel: tracing: Have trace_event_file have ref counters |
CVE-2023-52879
|
| VCID-89hc-cav3-6yf5 | kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect |
CVE-2023-52478
|
| VCID-8ht4-hsvm-9yad | kernel: nilfs2: potential use after free in nilfs_gccache_submit_read_data() |
CVE-2023-52566
|
| VCID-96e5-hh43-rqfs | kernel: ravb: Fix use-after-free issue in ravb_tx_timeout_work() |
CVE-2023-52509
|
| VCID-96jp-tz37-tqb8 | kernel: drm/radeon: possible buffer overflow |
CVE-2023-52867
|
| VCID-986a-ngub-8kbb | kernel: bpf: Detect IP == ksym.end as part of BPF program |
CVE-2023-52828
|
| VCID-992j-c9j4-d3g6 | kernel: wifi: ath11k: fix htt pktlog locking |
CVE-2023-52800
|
| VCID-9h9c-32k2-j3fj | kernel: net: nfc: llcp: Add lock when modifying device list |
CVE-2023-52524
|
| VCID-9mw3-8asp-aqgt | kernel: jfs: fix array-index-out-of-bounds in diAlloc |
CVE-2023-52805
|
| VCID-9s2m-82wy-83gy | kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries |
CVE-2023-52803
|
| VCID-a5ys-ebz8-kyee | kernel: RDMA/srp: Do not call scsi_done() from srp_abort() |
CVE-2023-52515
|
| VCID-a8pw-gkrc-w7g7 | kernel: dccp: out-of-bounds access in dccp_v4_err() and dccp_v6_err() |
CVE-2023-52577
|
| VCID-af81-k973-dkaw | kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() |
CVE-2023-52809
|
| VCID-b1z5-24ah-6qex | kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency |
CVE-2023-52855
|
| VCID-b6xc-vac6-abek | kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf |
CVE-2023-52799
|
| VCID-b9er-rv98-ybhr | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga |
CVE-2023-52819
|
| VCID-bapc-njwy-yybc | kernel: scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command |
CVE-2023-52500
|
| VCID-brz8-6j8x-aqep | kernel: tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf() |
CVE-2022-49940
|
| VCID-bzuf-64aa-3bbz | kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' |
CVE-2023-52781
|
| VCID-c7vc-pecu-3bbc | kernel: media: imon: fix access to invalid resource for the second interface |
CVE-2023-52754
|
| VCID-ca74-h556-47ez | kernel: bonding: stop the device in bond_setup_by_slave() |
CVE-2023-52784
|
| VCID-cc2h-jtqq-dubj | kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream |
CVE-2023-52806
|
| VCID-d7cf-hg44-bqet | kernel: usb: aqc111: check packet for fixup for true limit |
CVE-2023-52655
|
| VCID-fhk6-8pcn-qygx | kernel: llc: verify mac len before reading mac header |
CVE-2023-52843
|
| VCID-g19p-5a2y-gube | kernel: f2fs: avoid format-overflow warning |
CVE-2023-52748
|
| VCID-g3vb-x6wd-nbdu | kernel: x86/alternatives: Disable KASAN in apply_alternatives() |
CVE-2023-52504
|
| VCID-gx7t-6ysp-rkaf | kernel: Bluetooth: btusb: Add date->evt_skb is NULL check |
CVE-2023-52833
|
| VCID-h59v-ecf1-kkaf | kernel: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data |
CVE-2023-52876
|
| VCID-j6c2-ce4b-5yfz | kernel: fs/jfs: Add validity check for db_maxag and db_agpref |
CVE-2023-52804
|
| VCID-j7d3-nr6k-4qdy | kernel: io_uring/af_unix: disable sending io_uring over sockets |
CVE-2023-52654
|
| VCID-jsf8-d1cu-pbaj | kernel: tee: amdtee: fix use-after-free vulnerability in amdtee_close_session |
CVE-2023-52503
|
| VCID-k247-ujwg-hudd | kernel: fs/jfs: Add check for negative db_l2nbperpage |
CVE-2023-52810
|
| VCID-kj2q-55y7-nbcp | kernel: i2c: core: Run atomic i2c xfer when !preemptible |
CVE-2023-52791
|
| VCID-m1k2-9pwk-93dp | kernel: clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data |
CVE-2023-52870
|
| VCID-mdhj-dyr8-gqfq | kernel: deadlock leading to denial of service in tipc_crypto_key_revoke |
CVE-2024-0641
|
| VCID-mqkj-k2dy-z7an | kernel: drm/amdgpu: Fix potential null pointer derefernce |
CVE-2023-52814
|
| VCID-n1gf-bjes-8qdc | kernel: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer |
CVE-2023-52750
|
| VCID-nsb8-d3sw-4kda | kernel: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet |
CVE-2023-52525
|
| VCID-nsrt-a1vt-pufq | kernel: hsr: Prevent use after free in prp_create_tagged_frame() |
CVE-2023-52846
|
| VCID-ny28-cd4a-tbag | kernel: thermal: core: prevent potential string overflow |
CVE-2023-52868
|
| VCID-p7n2-tzd3-buhk | kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write |
CVE-2023-52628
|
| VCID-pp43-v99a-k3cz | kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation |
CVE-2024-0193
|
| VCID-qffg-mzdw-gqay | kernel: drm/amd/display: Avoid NULL dereference of timing generator |
CVE-2023-52753
|
| VCID-qxsc-vnnw-ukdx | kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg |
CVE-2023-52528
|
| VCID-rghv-w4pk-87e4 | kernel: perf/core: Bail out early if the request AUX area is out of bound |
CVE-2023-52835
|
| VCID-rmd5-4vrr-7uec | kernel: serial: 8250_port: IRQ data NULL pointer dereference |
CVE-2023-52567
|
| VCID-rqb6-eppt-wfd3 | kernel: padata: Fix refcnt handling in padata_free_shell() |
CVE-2023-52854
|
| VCID-rwm3-dxtv-xfdx | kernel: rpmsg: Fix possible refcount leak in rpmsg_register_device_override() |
CVE-2022-50119
|
| VCID-s227-xsw7-7bay | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 |
CVE-2023-52818
|
| VCID-s3j4-cmd5-5yb4 | kernel: media: vidtv: psi: Add check for kstrdup |
CVE-2023-52844
|
| VCID-sa6p-njsz-rybs | kernel: s390/dasd: protect device queue against concurrent access |
CVE-2023-52774
|
| VCID-smhw-w2rj-x7fn | kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() |
CVE-2023-52840
|
| VCID-sn1p-duct-7fcf | kernel: RDMA/siw: Fix connection failure handling |
CVE-2023-52513
|
| VCID-sygz-8vzx-kufr | kernel: fbdev: imsttfb: fix a resource leak in probe |
CVE-2023-52838
|
| VCID-szqf-djjp-w3h3 | kernel: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference |
CVE-2023-52826
|
| VCID-t7kk-g947-hbg3 | kernel: netfilter: nf_tables: double hook unregistration in netns path |
CVE-2022-49558
|
| VCID-trxy-dx96-9ua3 | kernel: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() |
CVE-2023-52527
|
| VCID-ubd7-uvky-5ugr | kernel: netfilter: nf_tables: unregister flowtable hooks on netns exit |
CVE-2022-48935
|
| VCID-uxvm-esag-1kgw | kernel: net/smc: avoid data corruption caused by decline |
CVE-2023-52775
|
| VCID-uy81-6u72-qkcc | kernel: pstore/platform: Add check for kstrdup |
CVE-2023-52869
|
| VCID-v6uh-rjgb-8ycg | kernel: locking/ww_mutex/test: Fix potential workqueue corruption |
CVE-2023-52836
|
| VCID-vm1g-8hut-zqdv | kernel: tty: n_gsm: use-after-free in gsm_cleanup_mux() |
CVE-2023-52564
|
| VCID-vmqt-cfda-4bbe | kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors |
CVE-2023-52477
|
| VCID-w6cw-gjn3-akcx | kernel: ieee802154: ca8210: Fix a potential UAF in ca8210_probe |
CVE-2023-52510
|
| VCID-w99p-9ksx-kbef | kernel: platform/x86: wmi: Fix opening of char device |
CVE-2023-52864
|
| VCID-wats-qjm5-cub4 | kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET |
CVE-2023-52813
|
| VCID-xj5r-tb5v-sfh6 | kernel: ring-buffer: Do not attempt to read past "commit" |
CVE-2023-52501
|
| VCID-ywk8-w2k8-wbcj | kernel: can: isotp: check CAN address family in isotp_bind() |
CVE-2023-54105
|
| VCID-zayq-pb12-jkew | kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data |
CVE-2023-52865
|
| VCID-zccb-1kwm-efcn | kernel: wifi: ath11k: fix dfs radar event locking |
CVE-2023-52798
|
| VCID-zeyz-c89h-g7gc | kernel: media: bttv: fix use after free error due to btv->timeout timer |
CVE-2023-52847
|
| VCID-zfgx-3auq-b3f5 | kernel: ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow |
CVE-2023-54069
|
| VCID-zpup-8k6s-6ua4 | kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL |
CVE-2023-52817
|
| VCID-zy4y-tk1p-6kc8 | kernel: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() |
CVE-2023-52502
|