Search for packages
| purl | pkg:deb/debian/linux@6.1.11-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-18h9-85zp-abcr | kernel: fpga: m10bmc-sec: Fix probe rollback |
CVE-2022-49745
|
| VCID-381r-hyt6-mubb | kernel: fscache: Use wait_on_bit() to wait for the freeing of relinquished volume |
CVE-2023-52982
|
| VCID-3reg-rcmu-x3ek | kernel: Bluetooth: Fix possible deadlock in rfcomm_sk_state_change |
CVE-2023-53016
|
| VCID-49hk-ypve-73fb | kernel: acpi: Fix suspend with Xen PV |
CVE-2023-52994
|
| VCID-4ft1-b415-t3dp | kernel: bpf: Skip task with pid=1 in send_signal_common() |
CVE-2023-52992
|
| VCID-5e8d-gyjh-97ab | kernel: i2c: designware: use casting of u64 in clock multiplication to avoid overflow |
CVE-2022-49749
|
| VCID-5jae-jmvy-z3gu | kernel: user after free in nr_listen in net/netrom/af_netrom.c |
CVE-2023-32269
|
| VCID-5m5w-7xct-pfav | kernel: net: stmmac: enable all safety features by default |
CVE-2023-53011
|
| VCID-5q1b-k4e7-rfb9 | kernel: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads |
CVE-2022-49740
|
| VCID-5uxv-qrgs-pqd3 | kernel: HID: betop: check shape of output reports |
CVE-2023-53015
|
| VCID-5z9w-ssx5-8kf3 | Kernel: use-after-free in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c |
CVE-2023-1652
|
| VCID-6dv1-d7mh-fkct | kernel: NULL pointer dereference due to missing kalloc() return value check in shtp_cl_get_dma_send_buf() |
CVE-2023-3358
|
| VCID-6q51-8pec-w3g7 | kernel: riscv/kprobe: Fix instruction simulation of JALR |
CVE-2023-52995
|
| VCID-6qu3-hzja-7yg1 | kernel: firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region |
CVE-2023-52989
|
| VCID-6tt9-mqye-hfh8 | kernel: riscv: kprobe: Fixup kernel panic when probing an illegal position |
CVE-2023-52978
|
| VCID-76q3-xw8m-xyds | kernel: mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() |
CVE-2023-52939
|
| VCID-7c86-6t8j-p3ea | kernel: block, bfq: fix uaf for bfqq in bic_set_bfqq() |
CVE-2023-52983
|
| VCID-86j6-rxsj-jucj | kernel: sctp: fail if no bound addresses can be used for a given scope |
CVE-2023-1074
|
| VCID-8gkh-etrc-r3g5 | kernel: dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init |
CVE-2022-49746
|
| VCID-8pzc-193c-ffbn | kernel: net: openvswitch: fix flow memory leak in ovs_flow_cmd_new |
CVE-2023-52977
|
| VCID-a3c1-b1ef-5beb | kernel: ovl: fix tmpfile leak |
CVE-2023-53004
|
| VCID-a73m-27sc-aubz | kernel: mm/swapfile: add cond_resched() in get_swap_pages() |
CVE-2023-52932
|
| VCID-aax6-pkn6-9kd8 | kernel: can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate |
CVE-2021-4454
|
| VCID-aeej-ry8s-7qf6 | kernel: net/sched: sch_taprio: fix possible use-after-free |
CVE-2023-53021
|
| VCID-ag6x-k7xd-tueu | kernel: x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL |
CVE-2023-52993
|
| VCID-atx6-ufqs-vqf9 | kernel: can: isotp: split tx timer into transmission and timeout |
CVE-2023-52941
|
| VCID-avbq-ww24-syb1 | kernel: bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation |
CVE-2023-53024
|
| VCID-bjwy-ab6s-e7hm | kernel: thermal: core: call put_device() only after device_register() fails |
CVE-2023-53012
|
| VCID-bq5f-5fgb-nffb | kernel: bpf: Skip invalid kfunc call in backtrack_insn |
CVE-2023-52928
|
| VCID-bu5s-venv-j3dw | kernel: bnxt: Do not read past the end of test names |
CVE-2023-53010
|
| VCID-cryk-ra8u-7ug1 | kernel: efi: fix potential NULL deref in efi_mem_reserve_persistent |
CVE-2023-52976
|
| VCID-desr-8n89-9qev | kernel: net: mdio: validate parameter addr in mdiobus_get_phy() |
CVE-2023-53019
|
| VCID-e5rc-1k15-2udu | kernel: usb: gadget: f_fs: Prevent race during ffs_ep0_queue_wait |
CVE-2022-49755
|
| VCID-ebvm-dbfp-2kb9 | kernel: EDAC/qcom: Do not pass llcc_driv_data as edac_device_ctl_info's pvt_info |
CVE-2023-53003
|
| VCID-ed6b-djug-c3d3 | kernel: netlink: prevent potential spectre v1 gadgets |
CVE-2023-53000
|
| VCID-eevk-57mt-7qc1 | kernel: arm64: dts: imx8mm-verdin: Do not power down eth-phy |
CVE-2023-52985
|
| VCID-eht6-eypr-2ybf | kernel: perf/x86/amd: fix potential integer overflow on shift of a int |
CVE-2022-49748
|
| VCID-exy4-ah1b-cfbw | kernel: bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener |
CVE-2023-52986
|
| VCID-eyjm-c1cp-euhs | kernel: Bluetooth: Fix a buffer overflow in mgmt_mesh_add() |
CVE-2022-49754
|
| VCID-eywj-ndqa-k3hd | kernel: gfs2: Always check inode size of inline inodes |
CVE-2022-49739
|
| VCID-f736-29kd-63g7 | kernel: ptdma: pt_core_execute_cmd() should use spinlock |
CVE-2023-53013
|
| VCID-ftqy-pgyd-dkd6 | kernel: possible memory corruption due to double free |
CVE-2023-21106
|
| VCID-fu3q-6yz5-audz | kernel: nvmem: core: fix cleanup after dev_set_name() |
CVE-2023-52929
|
| VCID-fxct-w41x-z3et | kernel: l2tp: close all race conditions in l2tp_tunnel_register() |
CVE-2023-53020
|
| VCID-g2d6-1d1u-7khg | kernel: Linux kernel: Denial of Service due to trace_printk() event registration timing |
CVE-2023-53007
|
| VCID-h746-mjmu-ebck | kernel: ovl: Use "buf" flexible array for memcpy() destination |
CVE-2022-49743
|
| VCID-h7uj-6bvd-f3fq | kernel: mm/khugepaged: fix ->anon_vma race |
CVE-2023-52935
|
| VCID-h9pb-uqws-xkfm | kernel: Squashfs: fix handling and sanity checking of xattr_ids count |
CVE-2023-52933
|
| VCID-hgsf-d3ee-2bd3 | kernel: f2fs: fix to do sanity check on i_extra_isize in is_alive() |
CVE-2022-49738
|
| VCID-hsu4-9p1d-tycx | kernel: ASoC: SOF: ipc4-mtrace: prevent underflow in sof_ipc4_priority_mask_dfs_write() |
CVE-2023-52987
|
| VCID-hvgw-km71-fbb3 | kernel: net: fec: Use page_pool_put_full_page when freeing rx buffers |
CVE-2023-52998
|
| VCID-hvt9-ysn6-pfeq | kernel: net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices |
CVE-2023-52984
|
| VCID-hxys-7j8y-aqft | kernel: cifs: fix potential memory leaks in session setup |
CVE-2023-53008
|
| VCID-jp18-qxpa-2bcx | kernel: block: ublk: extending queue_size to fix overflow |
CVE-2023-52980
|
| VCID-jure-kwde-eufu | kernel: fbcon: shift-out-of-bounds in fbcon_set_font() |
CVE-2023-3161
|
| VCID-k1eg-9xuk-tba5 | kernel: fbdev: smscufx: fix error handling code in ufx_usb_probe |
CVE-2022-49741
|
| VCID-kkrp-cpx6-ekaw | kernel: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() |
CVE-2023-52996
|
| VCID-kq9n-me5e-kked | kernel: cpufreq: CPPC: Add u64 casts to avoid overflowing |
CVE-2022-49750
|
| VCID-m2t8-znwc-efa2 | kernel: kernel/irq/irqdomain.c: fix memory leak with using debugfs_lookup() |
CVE-2023-52936
|
| VCID-mqhp-j996-13hv | kernel: net: fix NULL pointer in skb_segment_list |
CVE-2023-52991
|
| VCID-mwwp-mrsw-jqgw | kernel: FUSE filesystem low-privileged user privileges escalation |
CVE-2023-0386
|
| VCID-n4y6-u53b-qufb | kernel: cgroup/cpuset: Fix wrong check in update_parent_subparts_cpumask() |
CVE-2023-52942
|
| VCID-nn46-auhb-syfp | kernel: brcm_nvram_parse in drivers/nvmem/brcm_nvram.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference |
CVE-2023-3359
|
| VCID-nuaz-vadj-uyg8 | kernel: scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress |
CVE-2023-52974
|
| VCID-pfrk-zevm-auf4 | kernel: Bluetooth: hci_sync: fix memory leak in hci_update_adv_data() |
CVE-2023-53017
|
| VCID-ppf4-65p3-f7gq | kernel: scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress |
CVE-2023-52975
|
| VCID-q2z7-cbbe-k3eh | kernel: phy: usb: sunplus: Fix potential null-ptr-deref in sp_usb_phy_probe() |
CVE-2022-49756
|
| VCID-qcbg-g6j5-zybp | kernel: device property: fix of node refcount leak in fwnode_graph_get_next_endpoint() |
CVE-2022-49752
|
| VCID-qexz-sz2q-zyey | kernel: erofs/zmap.c: Fix incorrect offset calculation |
CVE-2022-49747
|
| VCID-qpvw-4fhp-v7fn | kernel: Bluetooth: hci_conn: Fix memory leaks |
CVE-2023-53018
|
| VCID-rkwq-es68-cbev | kernel: drm/amdkfd: Add sync after creating vram bo |
CVE-2023-53009
|
| VCID-ru6g-ujdn-57bg | kernel: dmaengine: Fix double increment of client_count in dma_chan_get() |
CVE-2022-49753
|
| VCID-s4et-2pw4-2qc4 | kernel: EDAC/highbank: Fix memory leak in highbank_mc_probe() |
CVE-2022-49757
|
| VCID-s4uv-qjv6-n7b8 | kernel: net/tls: tls_is_tx_ready() checked list_entry |
CVE-2023-1075
|
| VCID-sj54-tay9-t3f3 | kernel: usb: typec: ucsi: Don't attempt to resume the ports before they exist |
CVE-2023-52938
|
| VCID-sv6b-1fxf-2ygx | kernel: vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF |
CVE-2023-52973
|
| VCID-swr7-u5sj-yffz | kernel: RDMA/core: Fix ib block iterator counter overflow |
CVE-2023-53026
|
| VCID-t7w9-ufkv-47fs | kernel: f2fs: initialize locks earlier in f2fs_fill_super() |
CVE-2022-49742
|
| VCID-te6m-9a4r-pqf6 | kernel: net: nfc: Fix use-after-free in local_cleanup() |
CVE-2023-53023
|
| VCID-uhue-acky-4ye7 | kernel: HID: check empty report_list in hid_validate_values() |
CVE-2023-1073
|
| VCID-uneq-436k-jyb3 | kernel: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() |
CVE-2023-52997
|
| VCID-urmf-rw6a-kudw | kernel: drm/i915: Avoid potential vm use-after-free |
CVE-2023-52931
|
| VCID-uvrw-52kq-43hr | kernel: HV: hv_balloon: fix memory leak with using debugfs_lookup() |
CVE-2023-52937
|
| VCID-uw97-1wpp-pffb | kernel: net: enetc: avoid deadlock in enetc_tx_onestep_tstamp() |
CVE-2023-53022
|
| VCID-uwqz-xtub-4qes | kernel: drm/i915: Fix a memory leak with reused mmap_offset |
CVE-2023-53002
|
| VCID-vegv-pn5p-7uav | kernel: drm/i915: Fix request ref counting during error capture & debugfs dump |
CVE-2023-52981
|
| VCID-wcwy-sw27-dyf4 | kernel: ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() |
CVE-2023-52988
|
| VCID-ww12-xnsy-gyfm | kernel: UAF during login when accessing the shost ipaddress |
CVE-2023-2162
|
| VCID-x974-3nu3-83g8 | kernel: reset: uniphier-glue: Fix possible null-ptr-deref |
CVE-2022-49758
|
| VCID-xfuc-6bpz-cuez | kernel: trace_events_hist: add check for return value of 'create_hist_field' |
CVE-2023-53005
|
| VCID-y146-vvyc-u7cc | kernel: net: fix UaF in netns ops registration error path |
CVE-2023-52999
|
| VCID-y52h-54a6-m3a8 | kernel: mm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups |
CVE-2023-52934
|
| VCID-yb31-7rha-kua2 | kernel: mm/uffd: fix pte marker when fork() without fork event |
CVE-2022-49744
|
| VCID-yqwu-7zb4-r7bv | kernel: Integer overflow in function rndis_query_oid of rndis_wlan.c |
CVE-2023-23559
|
| VCID-z952-y5fq-5yb1 | kernel: w1: fix WARNING after calling w1_process() |
CVE-2022-49751
|
| VCID-zph7-5zjb-quae | kernel: use after free in vcs_read in drivers/tty/vt/vc_screen.c due to race |
CVE-2023-3567
|
| VCID-zrky-rbtv-hkaf | kernel: mm: multi-gen LRU: fix crash during cgroup migration |
CVE-2023-52940
|
| VCID-zut5-x18q-r7ac | kernel: cifs: Fix oops due to uncleared server->smbd_conn in reconnect |
CVE-2023-53006
|
| VCID-zyay-v8hj-w7hg | kernel: dmaengine: tegra: Fix memory leak in terminate_all() |
CVE-2023-53014
|
| VCID-zyws-d9m6-zbgy | kernel: drm/i915: Fix potential bit_17 double-free |
CVE-2023-52930
|