Search for packages
| purl | pkg:deb/debian/linux@6.1.55-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-11f5-wk8d-tkf8 | kernel: media: amphion: fix REVERSE_INULL issues reported by coverity |
CVE-2023-53653
|
| VCID-1g52-v49a-hyf5 | kernel: Revert "IB/isert: Fix incorrect release of isert connection" |
CVE-2023-54219
|
| VCID-1ja2-nvsn-2uhk | kernel: drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable() |
CVE-2023-53864
|
| VCID-1k7f-rdqz-73e2 | kernel: rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle() |
CVE-2023-54246
|
| VCID-1p3k-f3ck-83bg | kernel: Use-after-free in nft_verdict_dump due to a race between set GC and transaction |
CVE-2023-4244
|
| VCID-2de8-rys3-8fhr | kernel: netfilter: race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP |
CVE-2023-42756
|
| VCID-2tbb-89hb-rkh6 | kernel: skbuff: skb_segment, Call zero copy functions before using skbuff frags |
CVE-2023-53354
|
| VCID-2tua-umaf-6uc6 | kernel: lwt: Fix return values of BPF xmit ops |
CVE-2023-53338
|
| VCID-2wyd-kspf-zqe2 | kernel: mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write |
CVE-2023-53541
|
| VCID-2xwn-azeg-aqbt | kernel: wifi: mwifiex: fix memory leak in mwifiex_histogram_read() |
CVE-2023-53808
|
| VCID-34km-p3dp-v7gp | kernel: ipmi_si: fix a memleak in try_smi_init() |
CVE-2023-53611
|
| VCID-3cap-8b5r-27dn | kernel: Linux kernel: Denial of Service in dvb-usb-v2 gl861 due to null-pointer dereference |
CVE-2023-54066
|
| VCID-3d5w-ad41-hkbd | kernel: media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init() |
CVE-2023-54143
|
| VCID-3fy9-44f1-rqc6 | kernel: x86/MCE: Always save CS register on AMD Zen IF Poison errors |
CVE-2023-53438
|
| VCID-3t7p-963j-s7cs | kernel: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration |
CVE-2023-54296
|
| VCID-3vz8-8v9a-dfgn | kernel: Linux kernel KVM: Denial of Service in nested SVM due to TSC multiplier manipulation |
CVE-2023-53208
|
| VCID-3zeh-r9y8-sqf4 | kernel: ksmbd: Read Request Out-Of-Bounds Read Information Disclosure Vulnerability |
CVE-2023-39179
|
| VCID-3zj3-q89s-4qc5 | kernel: hsr: Fix uninit-value access in fill_frame_info() |
CVE-2023-53462
|
| VCID-42cq-tqw1-xyfy | kernel: HID: multitouch: Correct devm device reference for hidinput input_dev name |
CVE-2023-53454
|
| VCID-45vq-ugkk-1fa5 | kernel: Drivers: hv: vmbus: Don't dereference ACPI root object handle |
CVE-2023-53647
|
| VCID-47ud-gd2n-s3g1 | kernel: wifi: mac80211_hwsim: drop short frames |
CVE-2023-53321
|
| VCID-4a9u-6wqj-23c4 | kernel: net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc() |
CVE-2023-53495
|
| VCID-4ttv-ypmj-h7fr | kernel: Linux kernel: Denial of Service due to PCI resource leak |
CVE-2023-53743
|
| VCID-5hmr-mnq5-7yhr | kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter |
CVE-2023-54064
|
| VCID-5vxv-g158-fbbb | kernel: net: read sk->sk_family once in sk_mc_loop() |
CVE-2023-53831
|
| VCID-5wf1-v12t-gkcq | kernel: usb: out-of-bounds read in read_descriptors |
CVE-2023-37453
|
| VCID-5y7y-azn4-5qbw | kernel: of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name() |
CVE-2023-54178
|
| VCID-676c-3wrp-1ufr | kernel: RDMA/rxe: Fix incomplete state save in rxe_requester |
CVE-2023-53539
|
| VCID-6hcq-h3jf-9fah | kernel: soc: qcom: qmi_encdec: Restrict string length in decode |
CVE-2023-53729
|
| VCID-6kw2-j9ps-jyfw | kernel: btrfs: output extra debug info if we failed to find an inline backref |
CVE-2023-53672
|
| VCID-6t5m-uuun-fqhe | kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets |
CVE-2023-53226
|
| VCID-6tud-4jby-s7cm | kernel: Linux kernel: Memory leak in PM / devfreq can lead to denial of service |
CVE-2023-53518
|
| VCID-6unc-y7gu-pbdj | kernel: pwm: lpc32xx: Remove handling of PWM channels |
CVE-2023-53472
|
| VCID-736k-kgu4-gfhw | kernel: Revert "f2fs: fix to do sanity check on extent cache correctly" |
CVE-2023-53763
|
| VCID-7rf6-11zp-4ka5 | kernel: jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount |
CVE-2023-53616
|
| VCID-7vrk-tnet-87f3 | kernel: Linux kernel btrfs: Denial of Service via circular locking dependency |
CVE-2023-54224
|
| VCID-7yca-fmnr-w7c8 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds in init_smb2_rsp_hdr() If client send smb2 negotiate request and then send smb1 negotiate request, init_smb2_rsp_hdr is called for smb1 negotiate request since need_neg is set to false. This patch ignore smb1 packets after ->need_neg is set to false. |
CVE-2023-52441
|
| VCID-8bqx-antp-gkdj | A race condition was found in the Linux kernel's drm/exynos device driver in exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue. |
CVE-2024-22386
|
| VCID-8jkg-bhtn-y3gy | kernel: drm/msm/mdp5: Don't leak some plane state |
CVE-2023-53324
|
| VCID-961x-eqgd-v7f5 | kernel: crypto: api - Use work queue in crypto_destroy_instance |
CVE-2023-53799
|
| VCID-96m5-pecz-ykf6 | kernel: Bluetooth: Fix potential use-after-free when clear keys |
CVE-2023-53386
|
| VCID-9dhe-pw5w-f7dm | kernel: rpmsg: glink: Add check for kstrdup |
CVE-2023-54049
|
| VCID-9euy-h25d-tugq | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in compound request `smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session() will always return the first request smb2 header in a compound request. if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will return 0, i.e. The tree id check is skipped. This patch use ksmbd_req_buf_next() to get current command in compound. |
CVE-2023-52442
|
| VCID-9hs8-jd7s-q7hs | kernel: Linux kernel: Denial of Service in the cdns3 USB driver due to improper spin lock handling |
CVE-2023-53287
|
| VCID-9neh-zghm-eyb5 | kernel: USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() |
CVE-2023-52886
|
| VCID-ab58-5bne-mybx | kernel: net/sched: fq_pie: avoid stalls in fq_pie_timer() |
CVE-2023-53727
|
| VCID-aku2-yuph-vyar | kernel: NFSv4.2: Rework scratch handling for READ_PLUS (again) |
CVE-2023-53360
|
| VCID-b4j7-s2wg-qfcb | kernel: scsi: qla2xxx: Fix deletion race condition |
CVE-2023-53615
|
| VCID-b7em-hmb3-4yhp | kernel: IGB driver inadequate buffer size for frames larger than MTU |
CVE-2023-45871
|
| VCID-bj2w-8srd-yfa5 | kernel: ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} |
CVE-2023-53662
|
| VCID-bj9z-dtts-tfgp | kernel: pstore/ram: Check start of empty przs during init |
CVE-2023-53331
|
| VCID-bxa2-ftp5-57b6 | kernel: PCI: hv: Fix a crash in hv_pci_restore_msi_msg() during hibernation |
CVE-2023-53175
|
| VCID-c2mu-8323-1ydz | kernel: md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() |
CVE-2023-53210
|
| VCID-cf8a-czpd-y3er | kernel: fbdev/ep93xx-fb: Do not assign to struct fb_info.dev |
CVE-2023-53314
|
| VCID-cyu6-vbwd-1ud8 | kernel: net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add |
CVE-2023-54318
|
| VCID-d5cn-pnwu-u7be | kernel: Bluetooth: Fix hci_suspend_sync crash |
CVE-2023-53520
|
| VCID-d5wz-a9bc-1uf9 | kernel: powerpc/iommu: Fix notifiers being shared by PCI and VIO buses |
CVE-2023-54095
|
| VCID-dp7p-qaqb-q7em | kernel: btrfs: set page extent mapped after read_folio in relocate_one_page |
CVE-2023-54253
|
| VCID-dr9r-y9kb-fqbx | kernel: NFS: Fix a potential data corruption |
CVE-2023-53711
|
| VCID-dws2-fd38-kfe7 | kernel: md: raid1: fix potential OOB in raid1_remove_disk() |
CVE-2023-53722
|
| VCID-e3j9-eufk-pfew | kernel: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() |
CVE-2023-53676
|
| VCID-e4de-cad9-gqar | kernel: kcm: Fix memory leak in error path of kcm_sendmsg() |
CVE-2023-54112
|
| VCID-e7cs-1c8s-3qdm | kernel: ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects |
CVE-2023-53708
|
| VCID-ebkx-mvcd-sfde | kernel: rsvp: out-of-bounds read in rsvp_classify() |
CVE-2023-42755
|
| VCID-eht3-szr5-auha | kernel: rcu: dump vmalloc memory info safely |
CVE-2023-54113
|
| VCID-ejpc-fs6c-7yg8 | kernel: net: ethernet: mtk_eth_soc: fix possible NULL pointer dereference in mtk_hwlro_get_fdir_all() |
CVE-2023-54240
|
| VCID-ejyg-b2cr-73gc | kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages |
CVE-2023-53996
|
| VCID-envj-2qbb-4kfm | kernel: bpf, sockmap: Fix skb refcnt race after locking changes |
CVE-2023-53836
|
| VCID-ep8p-dchx-s7f3 | kernel: fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() |
CVE-2023-54127
|
| VCID-ethw-ddmu-ckc7 | kernel: media: af9005: Fix null-ptr-deref in af9005_i2c_xfer |
CVE-2023-54314
|
| VCID-f739-jh4k-q7dk | kernel: bpf: Fix issue in verifying allow_ptr_leaks |
CVE-2023-54181
|
| VCID-f8jk-dpun-tfgc | kernel: perf trace: Really free the evsel->priv area |
CVE-2023-53649
|
| VCID-f9dz-4gw6-kqdu | kernel: netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c |
CVE-2023-53179
|
| VCID-ffyb-7dwm-cfbd | kernel: refscale: Fix uninitalized use of wait_queue_head_t |
CVE-2023-54316
|
| VCID-fm9q-u17m-dqbu | kernel: ice: Don't tx before switchdev is fully configured |
CVE-2023-53657
|
| VCID-fnq4-9uf8-tyfw | kernel: xsk: Fix xsk_diag use-after-free error during socket cleanup |
CVE-2023-53426
|
| VCID-g2a1-qgju-ducf | kernel: Linux kernel autofs: Denial of Service due to memory leak in autofs_catatonic_mode |
CVE-2023-54134
|
| VCID-gfcn-m7gp-2qh7 | kernel: local dos vulnerability in scatterwalk_copychunks |
CVE-2023-6176
|
| VCID-gt1e-rd7c-y7bt | kernel: serial: sprd: Fix DMA buffer leak issue |
CVE-2023-54136
|
| VCID-h16w-gxwn-7kg7 | kernel: powerpc/pseries: fix possible memory leak in ibmebus_bus_init() |
CVE-2023-54017
|
| VCID-h5js-e6kv-jbhm | kernel: of: overlay: Call of_changeset_init() early |
CVE-2023-53856
|
| VCID-h9pb-64h4-xuev | kernel: HID: uclogic: Correct devm device reference for hidinput input_dev name |
CVE-2023-54207
|
| VCID-hh8y-3ats-4fbk | kernel: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() |
CVE-2023-54183
|
| VCID-hjsx-4kcj-j3ev | kernel: af_unix: Fix data-races around user->unix_inflight |
CVE-2023-53204
|
| VCID-hreg-9fwg-w7dk | kernel: scsi: qla4xxx: Add length check when parsing nlattrs |
CVE-2023-53456
|
| VCID-j8v6-gx44-67ge | kernel: Linux kernel: Denial of Service due to memory leak in IP address deletion |
CVE-2023-53995
|
| VCID-jfv8-6bqt-gkb1 | kernel: Linux kernel: Information disclosure in VFIO Type1 module via uninitialized stack memory |
CVE-2023-54137
|
| VCID-jjh6-3jy7-sucy | kernel: md/raid5-cache: fix a deadlock in r5l_exit_log() |
CVE-2023-53848
|
| VCID-jpeq-e45v-37ed | kernel: platform/x86: dell-sysman: Fix reference leak |
CVE-2023-53631
|
| VCID-js3a-zyfj-mkeh | kernel: dccp: Fix out of bounds access in DCCP error handler |
CVE-2023-53782
|
| VCID-jvuh-78cm-dqhf | kernel: media: mdp3: Fix resource leaks in of_find_device_by_node |
CVE-2023-53385
|
| VCID-kmpa-yur5-tue4 | kernel: jbd2: check 'jh->b_transaction' before removing it from checkpoint |
CVE-2023-53526
|
| VCID-kvwr-dj4n-x3b4 | kernel: nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() |
CVE-2023-53697
|
| VCID-magr-yucv-a3g3 | kernel: s390/zcrypt: don't leak memory if dev_set_name() fails |
CVE-2023-53568
|
| VCID-mqez-cf51-97h9 | kernel: ARM: 9317/1: kexec: Make smp stop calls asynchronous |
CVE-2023-53712
|
| VCID-mwd5-aurx-fqh8 | kernel: netfilter: potential slab-out-of-bound access due to integer underflow |
CVE-2023-42753
|
| VCID-mxda-6yrb-ukgb | kernel: net/sched: sch_hfsc UAF |
CVE-2023-4623
|
| VCID-n1pe-fux8-pudp | kernel: ksmbd: Read Request Memory Leak Denial-of-Service Vulnerability |
CVE-2023-39180
|
| VCID-nc4u-q2z2-nue5 | kernel: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver |
CVE-2023-53563
|
| VCID-ndpa-ukkb-qyg5 | kernel: use-after-free in sch_qfq network scheduler |
CVE-2023-4921
|
| VCID-nnau-p81c-4khc | kernel: PCI/DOE: Fix destroy_work_on_stack() race |
CVE-2023-54235
|
| VCID-nt4s-u8z2-73d7 | kernel: RDMA/efa: Fix wrong resources deallocation order |
CVE-2023-54201
|
| VCID-p2zm-56uv-kqa9 | kernel: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind |
CVE-2023-53501
|
| VCID-p7n2-tzd3-buhk | kernel: netfilter: nftables: exthdr: fix 4-byte stack OOB write |
CVE-2023-52628
|
| VCID-punv-whvx-7ydr | kernel: ipv4: NULL pointer dereference in ipv4_send_dest_unreach() |
CVE-2023-42754
|
| VCID-q4hy-xme5-pyba | kernel: amba: bus: fix refcount leak |
CVE-2023-54230
|
| VCID-qf87-rfxv-eycs | kernel: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer |
CVE-2023-53395
|
| VCID-qhwb-pkny-y3h8 | kernel: media: tuners: qt1010: replace BUG_ON with a regular error |
CVE-2023-54282
|
| VCID-qpq9-r7ew-qbg3 | kernel: drm/i915: mark requests for GuC virtual engines to avoid use-after-free |
CVE-2023-53552
|
| VCID-qrx7-xazg-9qec | kernel: media: dw2102: Fix null-ptr-deref in dw2102_i2c_transfer() |
CVE-2023-53146
|
| VCID-rcgz-wtwf-sfdr | kernel: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() |
CVE-2023-53817
|
| VCID-rez4-mgqw-8yes | kernel: wifi: mwifiex: avoid possible NULL skb pointer dereference |
CVE-2023-53384
|
| VCID-rgm2-pra9-7faj | kernel: drivers: base: Free devm resources when unregistering a device |
CVE-2023-53596
|
| VCID-rswm-567w-qbbq | kernel: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() |
CVE-2023-54266
|
| VCID-rtyz-f5p8-aqc2 | kernel: arm64: csum: Fix OoB access in IP checksum code for negative lengths |
CVE-2023-53726
|
| VCID-sauh-8gtr-kqh8 | kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() |
CVE-2023-53828
|
| VCID-scs6-nq8b-67gk | kernel: net: deal with integer overflows in kmalloc_reserve() |
CVE-2023-53752
|
| VCID-sr2s-c682-jufc | kernel: Linux kernel: Denial of Service in anysee media driver via null pointer dereference |
CVE-2023-54093
|
| VCID-sv8q-8yqd-2yc9 | kernel: audit: fix possible soft lockup in __audit_inode_child() |
CVE-2023-54045
|
| VCID-t1t6-gbvh-wbee | kernel: f2fs: flush inode if atomic file is aborted |
CVE-2023-53829
|
| VCID-tfe7-r6pk-mke3 | kernel: wifi: mac80211: check for station first in client probe |
CVE-2023-53588
|
| VCID-tusj-sfvh-9kgu | kernel: af_unix: Fix data-race around unix_tot_inflight |
CVE-2023-54006
|
| VCID-u1bv-744e-mbam | kernel: firmware: meson_sm: fix to avoid potential NULL pointer dereference |
CVE-2023-54304
|
| VCID-uhps-g3z1-s7af | kernel: kobject: Add sanity check for kset->kobj.ktype in kset_register() |
CVE-2023-53480
|
| VCID-uyu4-snnd-9yem | kernel: null_blk: fix poll request timeout handling |
CVE-2023-53531
|
| VCID-v92m-p6f8-dfek | kernel: ext4: correct grp validation in ext4_mb_good_group |
CVE-2023-53861
|
| VCID-vjme-nqpq-j7f2 | kernel: wifi: cfg80211: ocb: don't leave if not joined |
CVE-2023-53992
|
| VCID-vjuw-dju4-97cj | kernel: netfilter: xtables sctp out-of-bounds read in match_flags() |
CVE-2023-39193
|
| VCID-vn5d-yd75-u7a7 | kernel: KVM: nSVM: Check instead of asserting on nested TSC scaling support |
CVE-2023-53663
|
| VCID-vqcd-ptr4-g3hp | kernel: wifi: mac80211: check S1G action frame size |
CVE-2023-53257
|
| VCID-vu1c-8szw-2yhm | kernel: wifi: cfg80211: reject auth/assoc to AP with our address |
CVE-2023-53540
|
| VCID-w45g-34es-13hj | kernel: dm: don't attempt to queue IO under RCU protection |
CVE-2023-53860
|
| VCID-wgpt-6tt8-v3ek | kernel: mt76: mt7921: don't assume adequate headroom for SDIO headers |
CVE-2023-53785
|
| VCID-wrjx-3hm3-xbbc | kernel: btrfs: release path before inode lookup during the ino lookup ioctl |
CVE-2023-54281
|
| VCID-wvyb-y46r-rub3 | kernel: irdma: Improper access control |
CVE-2023-25775
|
| VCID-wwva-cdfu-3qg5 | kernel: integer overflow in igmpv3_newpack leading to exploitable memory access |
CVE-2023-42752
|
| VCID-xa41-s7z7-h7a1 | kernel: kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg() |
CVE-2023-53825
|
| VCID-xy9d-1k1n-4qat | kernel: drm/mediatek: dp: Change logging to dev for mtk_dp_aux_transfer() |
CVE-2023-53325
|
| VCID-y4vc-ke98-1fd2 | kernel: s390/dcssblk: fix kernel crash with list_add corruption |
CVE-2023-54117
|
| VCID-y6ug-7b6f-z7a6 | kernel: tracing: Fix race issue between cpu buffer write and swap |
CVE-2023-53368
|
| VCID-y6us-s22r-7qff | kernel: LoongArch: mm: Add p?d_leaf() definitions |
CVE-2023-53361
|
| VCID-y9cq-ckut-1bdv | kernel: media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer |
CVE-2023-52915
|
| VCID-y9vh-w3k6-ebgu | kernel: netfilter: xtables out-of-bounds read in u32_match_it() |
CVE-2023-39192
|
| VCID-yq98-krmu-j3hb | kernel: bpf: reject unhashed sockets in bpf_sk_assign |
CVE-2023-53585
|
| VCID-zaht-ad6c-e3gb | kernel: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT |
CVE-2023-54267
|
| VCID-zdxq-xp8r-mybb | kernel: media: az6007: Fix null-ptr-deref in az6007_i2c_xfer() |
CVE-2023-53220
|
| VCID-zhhm-x29t-c3gg | kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() |
CVE-2023-39189
|
| VCID-zjqe-5xn4-pbdx | kernel: usb: typec: bus: verify partner exists in typec_altmode_attention |
CVE-2023-54299
|
| VCID-zr97-qr9w-byd3 | kernel: Linux kernel: Denial of Service due to memory leak in target_cmd_counter |
CVE-2023-54154
|