Search for packages
| purl | pkg:deb/debian/linux@6.1.15-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-35f9-q6zc-pba7 | kernel: mmc: mmc_spi: fix error handling in mmc_spi_probe() |
CVE-2023-52708
|
| VCID-3whr-d45h-f7a8 | kernel: net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() |
CVE-2023-52702
|
| VCID-651q-c9rt-8fgs | kernel: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself |
CVE-2023-52735
|
| VCID-69a4-qgg3-hkg5 | kernel: vmwgfx: race condition leading to information disclosure vulnerability |
CVE-2023-33951
|
| VCID-6ehx-j3nb-2ffn | kernel: mpls: double free on sysctl allocation failure |
CVE-2023-26545
|
| VCID-88jw-8yvv-5be5 | kernel: btrfs: lock the inode in shared mode before starting fiemap |
CVE-2023-52737
|
| VCID-a1vr-1cg7-gqbg | kernel: tipc: fix kernel warning when sending SYN message |
CVE-2023-52700
|
| VCID-araj-26c3-1qaj | kernel: ALSA: hda: Do not unset preset when cleaning up codec |
CVE-2023-52736
|
| VCID-b8p7-ctx4-afdf | kernel: net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path |
CVE-2023-52703
|
| VCID-bauf-2tbt-y3ac | kernel: mmc: sdio: fix possible resource leaks in some error paths |
CVE-2023-52730
|
| VCID-ghzf-wqx1-dyhc | kernel: KVM: information leak in KVM_GET_DEBUGREGS ioctl on 32-bit systems |
CVE-2023-1513
|
| VCID-jstt-fu27-kyht | kernel: sched/psi: Fix use-after-free in ep_remove_wait_queue() |
CVE-2023-52707
|
| VCID-jt33-xayh-5ke1 | kernel: vmwgfx: double free within the handling of vmw_buffer_object objects |
CVE-2023-33952
|
| VCID-kx6v-p49u-qqgr | kernel: usb: gadget: u_serial: Add null pointer check in gserial_resume |
CVE-2023-53551
|
| VCID-m26e-r8mc-jbbq | kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks |
CVE-2022-2196
|
| VCID-njyf-sxaw-dkfr | kernel: gpio: sim: fix a memory leak |
CVE-2023-52706
|
| VCID-nz17-qras-yqbt | kernel: nilfs2: fix underflow in second superblock position calculations |
CVE-2023-52705
|
| VCID-pkju-8krv-tqeb | kernel: fbdev: Fix invalid page access after closing deferred I/O devices |
CVE-2023-52731
|
| VCID-pn2p-qgh4-hqge | kernel: vdpa: ifcvf: Do proper cleanup if IFCVF init fails |
CVE-2022-48706
|
| VCID-qu5p-6z4k-pbe4 | kernel: ext4: Fix function prototype mismatch for ext4_feat_ktype |
CVE-2023-53224
|
| VCID-rkc9-5rqz-2qap | kernel: Copy_from_user on 64-bit versions may leak kernel information |
CVE-2023-0459
|
| VCID-rrja-u847-quhb | kernel: freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL |
CVE-2023-52704
|
| VCID-syue-tmbn-ufdj | kernel: aio: fix mremap after fork null-deref |
CVE-2023-52646
|
| VCID-va4k-cpus-nqdm | kernel: tcindex: use-after-free vulnerability in traffic control index filter allows privilege escalation |
CVE-2023-1281
|
| VCID-xj5j-86x6-gqhr | kernel: net: use a bounce buffer for copying skb->mark |
CVE-2023-52701
|
| VCID-yany-k1my-fyge | kernel: ceph: blocklist the kclient when receiving corrupted snap trace |
CVE-2023-52732
|