Search for packages
| purl | pkg:deb/debian/linux@6.1.37-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-138j-qpva-83g6 | kernel: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device |
CVE-2023-54015
|
| VCID-1ae9-q8q5-2fex | kernel: blk-mq: release crypto keyslot before reporting I/O complete |
CVE-2023-53810
|
| VCID-1c7u-qh8q-uqc3 | kernel: media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup |
CVE-2023-53748
|
| VCID-1cwu-y5wx-jfgy | kernel: use-after-free in parse_lease_state() |
CVE-2023-1194
|
| VCID-1hcz-s9ye-7kbz | kernel: drm/msm: fix vram leak on bind errors |
CVE-2023-53562
|
| VCID-1mvr-e49w-pyfh | kernel: wifi: iwlwifi: mvm: don't trust firmware n_channels |
CVE-2023-53589
|
| VCID-1w3n-43ke-qycm | kernel: net/sched: cls_api: remove block_cb from driver_list before freeing |
CVE-2023-54193
|
| VCID-24gs-ss6s-2ka7 | kernel: Kernel: Denial of Service due to memory leak in RAID10 functionality |
CVE-2023-54123
|
| VCID-25a4-f83g-bbg5 | kernel: cassini: Fix a memory leak in the error handling path of cas_init_one() |
CVE-2023-53435
|
| VCID-2es1-5h3z-yqb4 |
CVE-2023-38426
|
|
| VCID-2n9k-dqfk-gkb9 | kernel: blocking operation in dvb_frontend_get_event and wait_event_interruptible |
CVE-2023-31084
|
| VCID-2ts1-5xpy-xqgj | kernel: dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path |
CVE-2023-53604
|
| VCID-3afh-2eps-zyad | kernel: Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work" |
CVE-2023-54197
|
| VCID-3cwp-edrx-xqch | kernel: rkvdec: race condition leading to use-after-free in rkvdec_remove() |
CVE-2023-35829
|
| VCID-3dtr-fvb8-wqdb | kernel: gpu: host1x: Fix memory leak of device names |
CVE-2023-53514
|
| VCID-3hmh-8t3k-97h8 | kernel: ksmbd race issue from smb2 close and logoff with multichannel |
CVE-2023-32256
|
| VCID-3j3q-7f5k-sfbr | kernel: net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize |
CVE-2023-53667
|
| VCID-3mnc-3fnd-33af | kernel: tracing/user_events: Ensure write index cannot be negative |
CVE-2023-54139
|
| VCID-3nkq-cb9e-tub6 | kernel: wifi: rtw88: use work to update rate to avoid RCU warning |
CVE-2023-54071
|
| VCID-3nnk-t6e8-sfa8 | kernel: media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish |
CVE-2023-53244
|
| VCID-3ufx-7ea9-vffv | kernel: maple_tree: fix potential out-of-bounds access in mas_wr_end_piv() |
CVE-2023-54135
|
| VCID-3y3t-hzg8-53hx | kernel: scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition |
CVE-2023-54310
|
| VCID-41g6-mpge-8kh4 | kernel: ring-buffer: Sync IRQ works before buffer destruction |
CVE-2023-53587
|
| VCID-44ju-k8mr-z3g8 | kernel: HID: wacom: Use ktime_t rather than int when dealing with timestamps |
CVE-2023-53797
|
| VCID-477g-7889-57dq | kernel: wifi: iwlwifi: fw: fix memory leak in debugfs |
CVE-2023-53422
|
| VCID-4881-ghcy-xqf1 | kernel: nilfs2: do not write dirty data after degenerating to read-only |
CVE-2023-53337
|
| VCID-4gs6-hcpb-hubt | kernel: drm/msm: fix NULL-deref on irq uninstall |
CVE-2023-54138
|
| VCID-4u48-gp9x-y3fq | kernel: f2fs: compress: fix to call f2fs_wait_on_page_writeback() in f2fs_write_raw_pages() |
CVE-2023-54068
|
| VCID-4ycy-g7gu-yyc8 | kernel: power: supply: bq25890: Fix external_power_changed race |
CVE-2023-53166
|
| VCID-512g-1f3a-bfdb | kernel: USB: sisusbvga: Add endpoint checks |
CVE-2023-54213
|
| VCID-5dna-xxsu-nbgr | kernel: power: supply: bq27xxx: Fix poll_interval handling and races on remove |
CVE-2023-54079
|
| VCID-5h2b-jped-j7ha | kernel: serial: 8250: Reinit port->pm on port specific driver unbind |
CVE-2023-53176
|
| VCID-5m63-9wck-6ud6 | kernel: saa7134: race condition leading to use-after-free in saa7134_finidev() |
CVE-2023-35823
|
| VCID-5tf2-unbh-1qat | kernel: ACPI: EC: Fix oops when removing custom query handlers |
CVE-2023-54244
|
| VCID-5xru-rsjq-hqh3 | kernel: tun: Fix memory leak for detached NAPI queue |
CVE-2023-53685
|
| VCID-69m3-8198-jbb5 | kernel: mm: fix zswap writeback race condition |
CVE-2023-53178
|
| VCID-6aaf-fc5z-5uah | kernel: scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow |
CVE-2023-54102
|
| VCID-6d3k-au9g-yue9 | kernel: x86/MCE/AMD: Use an u64 for bank_map |
CVE-2023-53474
|
| VCID-6mym-hek2-nyb4 | kernel: Kernel: Denial of Service via ubifs memory leak |
CVE-2023-53276
|
| VCID-6n6j-exu4-5qfq | kernel: md/raid10: fix memleak of md thread |
CVE-2023-54294
|
| VCID-6p1q-p1qq-sfcc | kernel: net: add vlan_get_protocol_and_depth() helper |
CVE-2023-53433
|
| VCID-6zqb-728p-kbf2 | kernel: spmi: Add a check for remove callback when removing a SPMI driver |
CVE-2023-54044
|
| VCID-7cwd-mns4-pqab | kernel: ext4: fix WARNING in mb_find_extent |
CVE-2023-53317
|
| VCID-7d25-jzag-jqg7 | kernel: kernel: Denial of Service via memory leak in LRU hash maps |
CVE-2023-54033
|
| VCID-7k9r-fsg1-d7f2 | kernel: s390/crypto: use vector instructions only if available for ChaCha20 |
CVE-2023-53702
|
| VCID-7rhz-8rba-t7bu | kernel: net: skb_partial_csum_set() fix against transport header magic value |
CVE-2023-53439
|
| VCID-7unb-n3v4-sya4 | kernel: drm/msm: fix workqueue leak on bind errors |
CVE-2023-53849
|
| VCID-7vst-mvv6-dudd | kernel: ALSA: hda: Fix Oops by 9.1 surround channel names |
CVE-2023-53400
|
| VCID-867j-x4ha-f3et | kernel: inotify: Avoid reporting event with invalid wd |
CVE-2023-54119
|
| VCID-88kb-3phc-akef | An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access. |
CVE-2023-38429
|
| VCID-8cbr-x8vs-z7au | kernel: SMB3: Add missing locks to protect deferred close file list |
CVE-2023-53990
|
| VCID-8vy1-ccwn-qud7 | kernel: Linux kernel: Denial of Service via use-after-free in vc_screen |
CVE-2023-53747
|
| VCID-93ce-35w8-h7ef | kernel: nbd: fix incomplete validation of ioctl arg |
CVE-2023-53513
|
| VCID-98am-gev3-rfa9 | kernel: scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() |
CVE-2023-53754
|
| VCID-9bkt-pcp2-dqc1 | kernel: ksmbd: tree connection race condition remote code execution vulnerability |
CVE-2023-32254
|
| VCID-9ctj-fce9-pffc | kernel: drm/fbdev-generic: prohibit potential out-of-bounds access |
CVE-2023-54116
|
| VCID-9ea1-81c1-37g7 | kernel: netfilter: conntrack: fix wrong ct->timeout value |
CVE-2023-53635
|
| VCID-9mqz-3u9x-ybfg | kernel: mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data |
CVE-2023-53232
|
| VCID-9qxg-sruk-cfgh | kernel: ksmbd: session NULL pointer dereference denial-of-service vulnerability |
CVE-2023-32252
|
| VCID-9ybb-bzq2-cueb | kernel: ceph: fix potential use-after-free bug when trimming caps |
CVE-2023-53867
|
| VCID-a2u7-uepg-jfa1 | kernel: gfs2: NULL pointer dereference in gfs2_evict_inode() |
CVE-2023-3212
|
| VCID-a65f-yw25-bybx | kernel: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex |
CVE-2023-53715
|
| VCID-a67m-rg36-aqgw | kernel: scsi: target: Fix multiple LUN_RESET handling |
CVE-2023-53586
|
| VCID-a6fk-s8n8-hbcq | kernel: ksmbd: session race condition remote code execution vulnerability |
CVE-2023-32257
|
| VCID-a7kk-4q27-tkcf | kernel: net: IPv6 RPL protocol reachable assertion leads to DoS |
CVE-2023-2156
|
| VCID-afph-5dqk-67cr | kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() |
CVE-2023-35788
|
| VCID-amma-gxe8-e7as | kernel: ksmbd: not allow guest user on multichannel |
CVE-2023-32249
|
| VCID-amx2-unds-6qav | kernel: Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe |
CVE-2023-53533
|
| VCID-an95-d2f9-wkbc | kernel: md: fix soft lockup in status_resync |
CVE-2023-53620
|
| VCID-arw7-jrva-hbab | kernel: media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() |
CVE-2023-53458
|
| VCID-av9p-jct2-8kb5 | kernel: nilfs2: fix infinite loop in nilfs_mdt_get_block() |
CVE-2023-53845
|
| VCID-axj2-267a-5kdv | kernel: ipvlan: out-of-bounds write caused by unclear skb->cb |
CVE-2023-3090
|
| VCID-b1ya-rv9e-37d4 | kernel: wifi: ath11k: Ignore frags from uninitialized peer in dp |
CVE-2023-53822
|
| VCID-b8wn-e4jg-gyap | kernel: net/sched: sch_fq: fix integer overflow of "credit" |
CVE-2023-53624
|
| VCID-bbmk-aj7s-ffam | kernel: ubifs: Fix memleak when insert_old_idx() failed |
CVE-2023-54050
|
| VCID-bcrq-77ew-2bh4 | kernel: crypto: safexcel - Cleanup ring IRQ workqueues on load failure |
CVE-2023-54126
|
| VCID-bfqv-fhhd-t7fp | An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access. |
CVE-2023-34256
|
| VCID-bkxu-zjjm-w3gc | kernel: usb: typec: altmodes/displayport: fix pin_assignment_show |
CVE-2023-54186
|
| VCID-bn8r-uwxn-buan | kernel: octeontx2-af: Add validation for lmac type |
CVE-2023-54129
|
| VCID-bp1a-rmmj-bfer | kernel: net/smc: Reset connection when trying to use SMCRv2 fails |
CVE-2023-53382
|
| VCID-bt8w-fzcd-r3bf | kernel: media: bdisp: Add missing check for create_workqueue |
CVE-2023-53289
|
| VCID-c14n-jwjb-a7gc | kernel: Linux kernel: High impact due to data race in hidraw_open() during concurrent device opening |
CVE-2023-53759
|
| VCID-c45f-v3ye-57b5 | kernel: binder: fix UAF of alloc->vma in race with munmap() |
CVE-2023-54157
|
| VCID-c4d2-twee-nuft | kernel: bnxt: avoid overflow in bnxt_get_nvram_directory() |
CVE-2023-53661
|
| VCID-ckwt-aphw-dyd8 | kernel: ext4: set goal start correctly in ext4_mb_normalize_request |
CVE-2023-54021
|
| VCID-cnk8-g8dh-8bcu | kernel: Linux kernel: Information disclosure or denial of service via out-of-bounds read in Tegra Host Emulation |
CVE-2023-54222
|
| VCID-crn4-wv85-cbdc | kernel: MIPS: fw: Allow firmware to pass a empty env |
CVE-2023-54279
|
| VCID-cva5-ymye-hyg4 | kernel: renesas_usb3: race condition leading to use-after-free in renesas_usb3_remove() |
CVE-2023-35828
|
| VCID-cz93-fde8-pkcz | kernel: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind |
CVE-2023-54047
|
| VCID-cza4-8776-t7fj | kernel: fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de() |
CVE-2023-53988
|
| VCID-d3dw-6tf5-hudf | kernel: octeontx2-pf: mcs: Fix NULL pointer dereferences |
CVE-2023-53595
|
| VCID-dhtr-mgtt-nkew | kernel: drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() |
CVE-2023-53281
|
| VCID-dmr7-td91-f3dt | kernel: scsi: qedi: Fix use after free bug in qedi_remove() |
CVE-2023-54100
|
| VCID-dxsa-srum-pkcy | kernel: Linux kernel: netfilter use-after-free vulnerability leading to denial of service |
CVE-2023-54200
|
| VCID-e1e8-3jad-v7cx |
CVE-2023-38430
|
|
| VCID-e4cz-f7x5-mkfx | kernel: ubifs: Fix memory leak in do_rename |
CVE-2023-53396
|
| VCID-e5kp-7bqn-ukef | kernel: ksmbd: session race condition remote code execution vulnerability |
CVE-2023-32258
|
| VCID-ea53-utnw-w7dq | kernel: tcp: fix skb_copy_ubufs() vs BIG TCP |
CVE-2023-53669
|
| VCID-ed7y-vzk5-53bs | kernel: use-after-free due to race condition occurring in dvb_ca_en50221.c |
CVE-2022-45919
|
| VCID-edzq-t5kb-cfb2 | kernel: f2fs: fix potential corruption when moving a directory |
CVE-2023-54187
|
| VCID-egrk-dnue-xua1 | kernel: soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe |
CVE-2023-53744
|
| VCID-ej2u-mzp7-6fck | kernel: fs/ntfs3: Fix null-ptr-deref on inode->i_op in ntfs_lookup() |
CVE-2023-53294
|
| VCID-en16-v6sc-mye2 | kernel: media: max9286: Free control handler |
CVE-2023-54078
|
| VCID-engs-a36k-jbek | kernel: ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline |
CVE-2023-53692
|
| VCID-enhw-t1e8-mqgs | kernel: drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras |
CVE-2023-53471
|
| VCID-epv8-hpsc-m7eu | kernel: nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() |
CVE-2023-53804
|
| VCID-es7r-me5f-kybz | kernel: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() |
CVE-2023-54168
|
| VCID-exwn-3w4u-4uc9 | kernel: use-after-free while changing the mount option in __ext4_remount leading |
CVE-2024-0775
|
| VCID-eztd-5whs-w7hy | kernel: wifi: ath11k: Fix SKB corruption in REO destination ring |
CVE-2023-53315
|
| VCID-f2wb-9axu-kke5 |
CVE-2023-38431
|
|
| VCID-f86y-uswn-u7ct | kernel: ethtool: Fix uninitialized number of lanes |
CVE-2023-53798
|
| VCID-funv-d48z-63bz | kernel: net/mlx5e: Fix deadlock in tc route query code |
CVE-2023-53591
|
| VCID-fzqk-e6m3-duh1 | kernel: drm/amd/display: Fix potential null dereference |
CVE-2023-53498
|
| VCID-g28s-3qsu-nqan | kernel: media: radio-shark: Add endpoint checks |
CVE-2023-53644
|
| VCID-g3ew-umew-myau | kernel: distros-[DirtyVMA] Privilege escalation via non-RCU-protected VMA traversal |
CVE-2023-3269
|
| VCID-g4s5-nket-w3fd | kernel: media: netup_unidvb: fix use-after-free at del_timer() |
CVE-2023-53219
|
| VCID-gatd-ftk1-6qbx | kernel: fbdev: udlfb: Fix endpoint check |
CVE-2023-54277
|
| VCID-gb94-buq7-x3gz | kernel: fs/ntfs3: Add check for kmemdup |
CVE-2023-54248
|
| VCID-gc1b-rntq-dya3 | kernel: net/mlx5: Handle pairing of E-switch via uplink un/load APIs |
CVE-2023-53347
|
| VCID-gdf7-z8wt-zqae | kernel: virt/coco/sev-guest: Double-buffer messages |
CVE-2023-53769
|
| VCID-gg7k-damt-c3h5 | kernel: Linux kernel: Resource leak in arc_uart driver can cause denial of service |
CVE-2023-53719
|
| VCID-gj1d-ntgs-qud4 | kernel: Out of bounds read in smb2_write |
CVE-2023-3865
|
| VCID-gjpd-7pcg-87bq | kernel: Linux kernel: ACPICA undefined behavior due to zero offset to null pointer |
CVE-2023-53182
|
| VCID-gjzs-dmbv-9yfa | kernel: soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow |
CVE-2023-54259
|
| VCID-gru1-3qdq-wkbc | kernel: debugobjects: Don't wake up kswapd from fill_pool() |
CVE-2023-54268
|
| VCID-gu28-3h39-kbf3 | kernel: wifi: mac80211: fortify the spinlock against deadlock by interrupt |
CVE-2023-54288
|
| VCID-gyar-8462-rqhe | kernel: x86: fix clear_user_rep_good() exception handling annotation |
CVE-2023-53642
|
| VCID-h6rc-a42b-4yhq | kernel: drm/i915: Fix NULL ptr deref by checking new_crtc_state |
CVE-2023-53833
|
| VCID-h7g4-jvdx-kkd1 | kernel: net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs() |
CVE-2023-54218
|
| VCID-h9yg-t4f4-xkde | kernel: null_blk: Always check queue mode setting from configfs |
CVE-2023-53576
|
| VCID-hfsm-75rn-u7ac | kernel: ntfs3: invalid kfree in fs/ntfs3/inode.c |
CVE-2022-48425
|
| VCID-hjsx-wwr2-4ycx | kernel: media: platform: mtk-mdp3: Add missing check and free for ida_alloc |
CVE-2023-54147
|
| VCID-hkyd-a17h-cqdp | kernel: ksmbd: session setup memory exhaustion denial-of-service vulnerability |
CVE-2023-32247
|
| VCID-hm59-t1bg-d3h3 | kernel: Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp |
CVE-2023-53297
|
| VCID-hwea-6qbk-77h8 | kernel: drm/amd: Fix an out of bounds error in BIOS parser |
CVE-2023-54150
|
| VCID-hyz4-59kt-rfgc | kernel: fs/ntfs3: Fix memory leak if ntfs_read_mft failed |
CVE-2023-54077
|
| VCID-j2ub-8bz4-4kfj | kernel: kcsan: Avoid READ_ONCE() in read_instrumented_memory() |
CVE-2023-53742
|
| VCID-j7pj-y7rh-qka3 | kernel: ionic: catch failure from devlink_alloc |
CVE-2023-53470
|
| VCID-jeuf-4esy-jbg7 | kernel: ext4: fix deadlock when converting an inline directory in nojournal mode |
CVE-2023-54311
|
| VCID-jkj8-rva5-tfd1 | kernel: bus: mhi: host: Range check CHDBOFF and ERDBOFF |
CVE-2023-53598
|
| VCID-jyc7-e3p5-uyh5 | kernel: ASoC: lpass: Fix for KASAN use_after_free out of bounds |
CVE-2023-53640
|
| VCID-jz3b-mzuf-37d5 | kernel: cedrus: race condition leading to use-after-free in cedrus_remove() |
CVE-2023-35826
|
| VCID-k4wg-5xv6-2ufy | kernel: Linux kernel rt2x00 Wi-Fi driver: Denial of Service via memory leak during device removal |
CVE-2023-54131
|
| VCID-kcf4-wg4w-vub8 | kernel: spi: qup: Don't skip cleanup in remove's error path |
CVE-2023-53567
|
| VCID-ke38-q17b-13hz | kernel: memory leak in ttusb_dec_exit_dvb() in media/usb/ttusb-dec/ttusb_dec.c |
CVE-2022-45887
|
| VCID-kgjd-xesh-9fhz | kernel: btrfs: fix assertion of exclop condition when starting balance |
CVE-2023-54002
|
| VCID-khqx-5cyy-p3fv | kernel: md/raid10: fix null-ptr-deref in raid10_sync_request |
CVE-2023-53832
|
| VCID-khyt-2dss-uyb7 | kernel: md/raid10: fix leak of 'r10bio->remaining' for recovery |
CVE-2023-53299
|
| VCID-knk2-sxjr-aqba | kernel: f2fs: fix null pointer panic in tracepoint in __replace_atomic_write_block |
CVE-2023-54192
|
| VCID-ktdj-jevg-4ken | kernel: tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site |
CVE-2023-54073
|
| VCID-ktvv-15kj-3fg7 | kernel: netfilter: nft_set_rbtree: fix null deref on element insertion |
CVE-2023-53566
|
| VCID-kz9r-zumw-5ydf | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails |
CVE-2023-3609
|
| VCID-m3zf-1wsd-3fge | kernel: drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend |
CVE-2023-53723
|
| VCID-me4v-v73a-wqfc | kernel: lib: cpu_rmap: Avoid use after free on rmap->obj array entries |
CVE-2023-53484
|
| VCID-mqdj-df7g-hfe3 | kernel: fs/ntfs3: Fix OOB read in indx_insert_into_buffer |
CVE-2023-54063
|
| VCID-mxay-xfc3-j7en | kernel: vmci_host: fix a race condition in vmci_host_poll() causing GPF |
CVE-2023-54007
|
| VCID-mza3-5d1d-byfs | kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests |
CVE-2023-3390
|
| VCID-n2zh-7pv9-rfgj | kernel: f2fs: fix to check readonly condition correctly |
CVE-2023-54182
|
| VCID-n5sq-sfyw-wkbr | kernel: dm flakey: fix a crash with invalid table line |
CVE-2023-53786
|
| VCID-n86h-xjhp-s3c8 | kernel: wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace |
CVE-2023-54286
|
| VCID-n9b6-h9j7-3kgq | kernel: ext4: remove a BUG_ON in ext4_mb_release_group_pa() |
CVE-2023-53450
|
| VCID-nkm6-5vjq-wyec | kernel: net: fix stack overflow when LRO is disabled for virtual interfaces |
CVE-2023-54012
|
| VCID-np1g-g6wg-y7c6 | kernel: Deadlock in ksmbd_find_crypto_ctx() |
CVE-2023-32253
|
| VCID-nq6h-uf67-suak | kernel: btrfs: don't free qgroup space unless specified |
CVE-2023-54158
|
| VCID-ntja-c9ns-cqgw | kernel: ASoC: mediatek: mt8186: Fix use-after-free in driver remove path |
CVE-2023-53854
|
| VCID-ntw9-3pcv-vfbt | kernel: ksmbd: out-of-bounds read in ksmbd_smb2_check_message |
CVE-2023-38432
|
| VCID-pehy-gz4a-x3d6 | kernel: erofs: stop parsing non-compact HEAD index if clusterofs is invalid |
CVE-2023-54132
|
| VCID-ph3h-q9uj-6udt | kernel: ext4: allow ext4_get_group_info() to fail |
CVE-2023-53503
|
| VCID-pjd2-pgsp-u3be | kernel: Linux kernel: Denial of Service in ARM FF-A due to duplicate device names during logical partition registration. |
CVE-2023-53256
|
| VCID-pmfa-2cjv-uucv | kernel: SUNRPC: double free xprt_ctxt while still in use |
CVE-2023-54269
|
| VCID-pmrs-y4qx-kqf5 | kernel: non-PAGE_SIZE-end multi-iovec user SDMA requests |
CVE-2023-52474
|
| VCID-pqja-9s5g-nkbe | kernel: wifi: ath9k: hif_usb: fix memory leak of remain_skbs |
CVE-2023-53641
|
| VCID-ptww-f9k3-7fhc | kernel: ksmbd: fix racy issue under cocurrent smb2 tree disconnect |
CVE-2023-53358
|
| VCID-pxgj-qj89-uqgs | kernel: ksmbd: tree connection NULL pointer dereference denial-of-service vulnerability |
CVE-2023-32248
|
| VCID-pyu4-rsap-2fhx | kernel: out-of-bounds access in relay_file_read |
CVE-2023-3268
|
| VCID-q5ke-8q3r-qycu | kernel: ext4: add bounds checking in get_max_inline_xattr_value_size() |
CVE-2023-53285
|
| VCID-qdc8-tftu-afcw | kernel: Linux kernel: Denial of Service in mlx5e due to incorrect encap attribute handling |
CVE-2023-54074
|
| VCID-qnpz-8gsp-5yc5 | kernel: ASoC: fsl_mqs: move of_node_put() to the correct location |
CVE-2023-53268
|
| VCID-qp3j-9gdq-r7af | kernel: Linux kernel (amdgpu): Denial of Service via incorrect interrupt handling |
CVE-2023-53237
|
| VCID-qp7s-fafn-a3fe | kernel: ixgbe: Fix panic during XDP_TX with > 64 CPUs |
CVE-2023-54090
|
| VCID-qt4y-mg5v-gyan | kernel: ksmbd: call rcu_barrier() in ksmbd_server_exit() |
CVE-2023-32246
|
| VCID-r5ss-5zkg-r7fd | kernel: rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access |
CVE-2023-53419
|
| VCID-r7zk-mxam-rkhj | kernel: net: wwan: iosm: fix NULL pointer dereference when removing device |
CVE-2023-53561
|
| VCID-re1w-a633-sfa1 | kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE |
CVE-2023-3610
|
| VCID-renx-7s4p-puaa | kernel: Use after free bug in r592_remove |
CVE-2023-3141
|
| VCID-rgfq-8pjg-wkf3 | kernel: Kernel: Denial of Service in amdgpu driver due to improper interrupt handling |
CVE-2023-53193
|
| VCID-rkp9-av2n-fqdm | kernel: Linux kernel: Denial of Service due to incorrect network packet processing in NSH module |
CVE-2023-54114
|
| VCID-rn4q-b4yc-9bar | kernel: ext4: fix invalid free tracking in ext4_xattr_move_to_block() |
CVE-2023-54062
|
| VCID-rrc4-wqqu-6qc4 | kernel: media: hi846: Fix memleak in hi846_init_controls() |
CVE-2023-53300
|
| VCID-ryc1-nbzr-uya1 | kernel: i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path |
CVE-2023-54175
|
| VCID-rzg3-3jz1-x7er | kernel: ksmbd Chained Request NULL Pointer Dereference |
CVE-2023-3866
|
| VCID-s7p9-chup-57hk | kernel: ksmbd: session race condition remote code execution vulnerability |
CVE-2023-32250
|
| VCID-s9xw-vbvc-vfa2 | kernel: block, bfq: Fix division by zero error on zero wsum |
CVE-2023-54242
|
| VCID-sasb-nznc-5qdp | kernel: ext4: fix i_disksize exceeding i_size problem in paritally written case |
CVE-2023-53270
|
| VCID-sasn-ry1b-v7a1 | kernel: net: fec: Better handle pm_runtime_get() failing in .remove() |
CVE-2023-53308
|
| VCID-sdqs-a8df-87d8 | kernel: kheaders: Use array declaration instead of char |
CVE-2023-54056
|
| VCID-sf8v-byyk-3fgd | kernel: Memory leak via ksmbd session setup request with unknown NTLMSSP message type |
CVE-2023-32255
|
| VCID-sjbz-zp97-x7e4 | kernel: power: supply: axp288_fuel_gauge: Fix external_power_changed race |
CVE-2023-53310
|
| VCID-srrf-b9jk-5uge | kernel: use-after-free due to race condition occurring in dvb_net.c |
CVE-2022-45886
|
| VCID-sunz-pqkg-s3eb | kernel: netlink: annotate accesses to nlk->cb_running |
CVE-2023-53853
|
| VCID-swxd-qvb2-tfat | kernel: irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4 |
CVE-2023-53383
|
| VCID-t1fp-4yag-afgu | kernel: virtio_net: Fix error unwinding of XDP initialization |
CVE-2023-53499
|
| VCID-t7q4-3b72-u3a5 | kernel: OOB access in the Linux kernel's XFS subsystem |
CVE-2023-2124
|
| VCID-t8zq-zn6f-5qf1 | kernel: drm/mediatek: dp: Only trigger DRM HPD events if bridge is attached |
CVE-2023-53389
|
| VCID-t976-sdzs-jybn | kernel: ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup() |
CVE-2023-53483
|
| VCID-tguf-9ks8-2kcc | kernel: ext2: Check block size validity during mount |
CVE-2023-53569
|
| VCID-thw5-hvm8-j7f4 | kernel: Linux kernel: Denial of Service via malicious MTU negotiation in TIPC |
CVE-2023-53517
|
| VCID-tjj9-yz53-w3ef | kernel: f2fs: fix scheduling while atomic in decompression path |
CVE-2023-53262
|
| VCID-ttqr-kh4n-xbhz | kernel: clk: microchip: fix potential UAF in auxdev release callback |
CVE-2023-53636
|
| VCID-u2f9-867y-3yfb | kernel: Linux kernel: Denial of Service vulnerability in RDMA/rxe component |
CVE-2023-54028
|
| VCID-u2fq-4jy1-6yfa | kernel: drm/msm: fix NULL-deref on snapshot tear down |
CVE-2023-53837
|
| VCID-una4-8umw-kyhr | kernel: media: av7110: prevent underflow in write_ts_to_decoder() |
CVE-2023-54284
|
| VCID-upx2-tk53-pyb1 | kernel: RDMA/srpt: Add a check for valid 'mad_agent' pointer |
CVE-2023-54274
|
| VCID-uswu-w3g7-9ybk | kernel: dm1105: race condition leading to use-after-free in dm1105_remove.c() |
CVE-2023-35824
|
| VCID-uv78-72se-9uaw | kernel: scsi: target: iscsit: Free cmds before session free |
CVE-2023-54184
|
| VCID-v45t-qe34-1fcs | kernel: drm/amdgpu: Fix sdma v4 sw fini error |
CVE-2023-53547
|
| VCID-va3r-ah2e-9kcp | kernel: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path |
CVE-2023-54009
|
| VCID-vck8-gsxy-93du | kernel: f2fs: fix to drop all dirty pages during umount() if cp_error is set |
CVE-2023-54124
|
| VCID-vczs-dhkw-jbed | kernel: wifi: ath6kl: reduce WARN to dev_dbg() in callback |
CVE-2023-53639
|
| VCID-vdnm-hzq9-rfh8 | kernel: wifi: ath11k: fix deinitialization of firmware resources |
CVE-2023-53532
|
| VCID-vgza-hufc-57ft | kernel: serial: 8250_bcm7271: fix leak in `brcmuart_probe` |
CVE-2023-54301
|
| VCID-vu3t-dgar-t3dr | kernel: wifi: rtw89: fix potential race condition between napi_init and napi_enable |
CVE-2023-53452
|
| VCID-vwnb-edb9-myg5 | kernel: bpf: Add preempt_count_{sub,add} into btf id deny list |
CVE-2023-54086
|
| VCID-w7j4-yg6r-gfes | kernel: drm/i915: Make intel_get_crtc_new_encoder() less oopsy |
CVE-2023-53571
|
| VCID-w8cj-cmm9-kbbq | kernel: drm/amd/display: populate subvp cmd info only for the top pipe |
CVE-2023-53806
|
| VCID-w96c-cvzd-tqbf | kernel: ksmbd brute force delay bypass via asynchronous requests |
CVE-2023-32251
|
| VCID-wf5j-rr3s-a3dz | kernel: Linux kernel: Network subsystem memory leak |
CVE-2023-53716
|
| VCID-wrhr-cgd4-4ycs | kernel: USB: usbtmc: Fix direction for 0-length ioctl control messages |
CVE-2023-53761
|
| VCID-wu8n-dnxf-hqha | kernel: f2fs: Fix system crash due to lack of free space in LFS |
CVE-2023-54151
|
| VCID-wv8d-q36s-kyhh | kernel: Linux kernel: Denial of Service via null pointer dereference in ACPI |
CVE-2023-54010
|
| VCID-ww6h-udc8-47g6 | kernel: spi: imx: Don't skip cleanup in remove's error path |
CVE-2023-53225
|
| VCID-wzfs-19ss-5fav | kernel: A possible deadlock in dm_get_inactive_table in dm- ioctl.c leads to dos |
CVE-2023-2269
|
| VCID-x643-22p3-eqcu | kernel: net/mlx5: Collect command failures data only for known commands |
CVE-2023-53340
|
| VCID-x8jd-vket-qkec | kernel: ipv6: Fix out-of-bounds access in ipv6_find_tlv() |
CVE-2023-53705
|
| VCID-xbbm-hkmg-f3fm | kernel: ext4: improve error handling from ext4_dirhash() |
CVE-2023-53473
|
| VCID-xen2-vhq4-r7af | kernel: Linux kernel: Denial of Service in iwlwifi due to NULL pointer dereference |
CVE-2023-54053
|
| VCID-xg9e-jazf-1kfh | kernel: usb: mtu3: fix kernel panic at qmu transfer done irq handler |
CVE-2023-54159
|
| VCID-xhsu-dqfq-3fev | kernel: Linux kernel (CIFS): Use-after-free vulnerability allows data integrity compromise and denial of service |
CVE-2023-53751
|
| VCID-xuhu-rkfu-z7cg | kernel: Linux kernel: Denial of Service due to file descriptor leak in BPF sample code |
CVE-2023-53290
|
| VCID-xv57-83cf-jfd9 | kernel: media: mediatek: vcodec: fix decoder disable pm crash |
CVE-2023-53812
|
| VCID-y5ww-vmwk-k3dr | kernel: Linux kernel UDPLITE: Denial of Service via null pointer dereference |
CVE-2023-54004
|
| VCID-y6kd-c3u5-v3h6 | kernel: blk-crypto: make blk_crypto_evict_key() more robust |
CVE-2023-53536
|
| VCID-y7cq-znbn-uyeb | kernel: fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() |
CVE-2023-53683
|
| VCID-yjmz-mrh2-yube | kernel: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() |
CVE-2023-53758
|
| VCID-ym94-7k35-euch |
CVE-2023-38428
|
|
| VCID-ympn-kba7-uubp | kernel: net/mlx5e: Don't clone flow post action attributes second time |
CVE-2023-54262
|
| VCID-yxah-yhn3-t3cd | kernel: Linux kernel: Integer overflow in iwlwifi debugfs function |
CVE-2023-53524
|
| VCID-yy39-8y66-p3cc | kernel: Linux kernel: Memory leak in stm32-pwr regulator driver can lead to denial of service |
CVE-2023-54097
|
| VCID-zat9-xtbd-ukav | kernel: firmware: arm_ffa: Check if ffa_driver remove is present before executing |
CVE-2023-54058
|
| VCID-zdee-dnta-kubb | kernel: firmware: arm_sdei: Fix sleep from invalid context BUG |
CVE-2023-54160
|
| VCID-zeck-847h-gudx | kernel: recordmcount: Fix memory leaks in the uwrite function |
CVE-2023-53318
|
| VCID-zeve-rm21-cke1 | kernel: media: rcar_fdp1: Fix refcount leak in probe and remove function |
CVE-2023-54109
|
| VCID-zgmy-uanj-m3hv | kernel: f2fs: fix to avoid use-after-free for cached IPU bio |
CVE-2023-53537
|
| VCID-zk8k-g8sf-vbhk | kernel: ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem() |
CVE-2023-53399
|
| VCID-zmmm-mp7d-rbga | kernel: rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed |
CVE-2023-53655
|
| VCID-zn57-m9ah-3uhw | security update |
CVE-2023-21255
|
| VCID-zshu-tgpg-qbcm | kernel: remoteproc: imx_dsp_rproc: Add custom memory copy implementation for i.MX DSP Cores |
CVE-2023-53434
|
| VCID-zt19-xh97-sfeg | kernel: tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp |
CVE-2023-53489
|
| VCID-ztvj-tw3n-sqhh | kernel: af_unix: Fix data races around sk->sk_shutdown |
CVE-2023-54226
|
| VCID-zvds-szma-n7f8 | kernel: ksmbd: integer underflow and out-of-bounds read in deassemble_neg_contexts |
CVE-2023-38427
|
| VCID-zx2j-mx5w-8uc5 | kernel: ALSA: firewire-digi00x: prevent potential use after free |
CVE-2023-54084
|