Search for packages
| purl | pkg:deb/debian/linux@6.1.64-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-139j-84md-tkct | kernel: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data |
CVE-2023-52873
|
| VCID-197k-nnxp-nqcx | kernel: cifs: use-after-free in cifs_demultiplex_thread() |
CVE-2023-52572
|
| VCID-1dbx-wq4g-ukgk | kernel: powerpc/47x: Fix 47x syscall return crash |
CVE-2023-52499
|
| VCID-1g8h-fk1v-guey | kernel: use-after-free in powermate_config_complete |
CVE-2023-52475
|
| VCID-1kef-gpva-aygh | kernel: nbd: fix uaf in nbd_open |
CVE-2023-52837
|
| VCID-1pdf-5dvg-8qgq | kernel: tty: vcc: Add check for kstrdup() in vcc_probe() |
CVE-2023-52789
|
| VCID-1su9-zcmy-auhz | kernel: virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt() |
CVE-2023-52842
|
| VCID-21g8-6kdd-cqb1 | kernel: netfilter: nf_tables: adapt set backend to use GC transaction API |
CVE-2023-52923
|
| VCID-22fy-phgv-ykhn | kernel: f2fs: compress: fix to avoid use-after-free on dic |
CVE-2023-52852
|
| VCID-23y8-xncn-u7cn | kernel: soc: qcom: llcc: Handle a second device without data corruption |
CVE-2023-52871
|
| VCID-253y-mvfx-rfbr | kernel: perf/x86/lbr: Filter vsyscall addresses |
CVE-2023-52476
|
| VCID-262g-8bky-5ugn | kernel: ksmbd: fix race condition between session lookup and expire |
CVE-2023-52480
|
| VCID-2cc2-5ahh-pqed | kernel: wifi: wilc1000: use vmm_table as array in wilc struct |
CVE-2023-52768
|
| VCID-2fbp-qus3-7bdx | kernel: drm/amdkfd: Fix a race condition of vram buffer unref in svm code |
CVE-2023-52825
|
| VCID-2wfa-8pcm-gfe9 | kernel: NULL pointer dereference vulnerability in io_uring_show_fdinfo |
CVE-2023-46862
|
| VCID-3cna-8nke-q3gh | kernel: hwmon: (axi-fan-control) Fix possible NULL pointer dereference |
CVE-2023-52863
|
| VCID-3df3-3dfp-q3c9 | kernel: drm/panel: fix a possible null pointer dereference |
CVE-2023-52821
|
| VCID-3m3s-1vh4-zfhy | kernel: dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock |
CVE-2023-52516
|
| VCID-3ms7-4899-ukc9 | kernel: net: fix possible store tearing in neigh_periodic_work() |
CVE-2023-52522
|
| VCID-3tm3-8ct8-x7fm | kernel: x86/srso: Add SRSO mitigation for Hygon processors |
CVE-2023-52482
|
| VCID-41ut-8u7g-fbhm | kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list |
CVE-2023-5717
|
| VCID-47ns-wagw-6bgw | kernel: phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers |
CVE-2023-52505
|
| VCID-4gzu-g4mx-ckgt | kernel: ipvlan: add ipvlan_route_v6_outbound() helper |
CVE-2023-52796
|
| VCID-4kkx-auhb-fkgf | kernel: cxl/region: Do not try to cleanup after cxl_region_setup_targets() fails |
CVE-2023-52792
|
| VCID-4rdf-y7kr-7fcr | kernel: drm/meson: memory leak on ->hpd_notify callback |
CVE-2023-52563
|
| VCID-4u31-ahkq-57ga | kernel: clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data |
CVE-2023-52858
|
| VCID-5duf-9bsu-v3dw | kernel: NULL pointer dereference in send_acknowledge in net/nfc/nci/spi.c |
CVE-2023-46343
|
| VCID-5hve-2amk-wkgw | kernel: arm64: dts: qcom: sdm845-db845c: unreserved cont splash memory region leads to kernel panic |
CVE-2023-52561
|
| VCID-5jwc-14fb-e3gs | kernel: hid: cp2112: Fix duplicate workqueue initialization |
CVE-2023-52853
|
| VCID-5rac-gfy9-bugc | kernel: net: rds: NULL pointer dereference in rds_rdma_cm_event_handler_cmn() |
CVE-2023-52573
|
| VCID-5xdz-ffvu-1uc5 | kernel: netfilter: nf_tables: don't skip expired elements during walk |
CVE-2023-52924
|
| VCID-5ynw-da7q-d7fq | kernel: wifi: mac80211: fix potential key use-after-free |
CVE-2023-52530
|
| VCID-5z11-6c3t-ckd3 | kernel: team: NULL pointer dereference when team device type is changed |
CVE-2023-52574
|
| VCID-62ev-d1nw-gugs | kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data |
CVE-2023-52875
|
| VCID-64k8-rbwm-bqch | kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker |
CVE-2023-52764
|
| VCID-6eqf-w7ha-kqgd | kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() |
CVE-2023-52560
|
| VCID-6qgj-4tf2-cfgu | kernel: drm/amdkfd: Fix shift out-of-bounds issue |
CVE-2023-52816
|
| VCID-6uhu-k3un-gqbn | kernel: nfc: nci: fix possible NULL pointer dereference in send_acknowledge() |
CVE-2023-52919
|
| VCID-74dk-5bz3-s3hc | kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() |
CVE-2023-52832
|
| VCID-75n6-1yvd-tugy | kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING |
CVE-2023-52845
|
| VCID-76tp-jbmj-x3g7 | kernel: drm/bridge: lt8912b: Fix crash on bridge detach |
CVE-2023-52856
|
| VCID-77qs-8umq-h3f3 | kernel: nfc: nci: assert requested protocol is valid |
CVE-2023-52507
|
| VCID-78gg-q9kj-ryfz | kernel: net: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs |
CVE-2023-52807
|
| VCID-7bp6-cn74-ayar | kernel: mm/slab_common: slab_caches list corruption after kmem_cache_destroy() |
CVE-2023-52562
|
| VCID-7gfp-kd1q-w3eq | kernel: net: bridge: data races indata-races in br_handle_frame_finish() |
CVE-2023-52578
|
| VCID-7nn8-2r94-ybcq | kernel: nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() |
CVE-2023-52508
|
| VCID-7uw4-3vse-jbhh | kernel: media: vidtv: mux: Add check and kfree for kstrdup |
CVE-2023-52841
|
| VCID-7ww9-pgk5-jkgc | kernel: tracing: Have trace_event_file have ref counters |
CVE-2023-52879
|
| VCID-89hc-cav3-6yf5 | kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect |
CVE-2023-52478
|
| VCID-8dvg-x19q-43ew | kernel: x86/mm, kexec, ima: potential use-after-free in memblock_isolate_range() |
CVE-2023-52576
|
| VCID-8hk7-d87b-tbap | kernel: vhost-vdpa: fix use after free in vhost_vdpa_probe() |
CVE-2023-52795
|
| VCID-8ht4-hsvm-9yad | kernel: nilfs2: potential use after free in nilfs_gccache_submit_read_data() |
CVE-2023-52566
|
| VCID-96e5-hh43-rqfs | kernel: ravb: Fix use-after-free issue in ravb_tx_timeout_work() |
CVE-2023-52509
|
| VCID-96jp-tz37-tqb8 | kernel: drm/radeon: possible buffer overflow |
CVE-2023-52867
|
| VCID-986a-ngub-8kbb | kernel: bpf: Detect IP == ksym.end as part of BPF program |
CVE-2023-52828
|
| VCID-992j-c9j4-d3g6 | kernel: wifi: ath11k: fix htt pktlog locking |
CVE-2023-52800
|
| VCID-9h9c-32k2-j3fj | kernel: net: nfc: llcp: Add lock when modifying device list |
CVE-2023-52524
|
| VCID-9mw3-8asp-aqgt | kernel: jfs: fix array-index-out-of-bounds in diAlloc |
CVE-2023-52805
|
| VCID-9s2m-82wy-83gy | kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries |
CVE-2023-52803
|
| VCID-9tuv-9d9s-d3dt | kernel: Bluetooth: hci_codec: Fix leaking content of local_codecs |
CVE-2023-52518
|
| VCID-9wfr-uf4a-27dq | kernel: arm64: errata: Add Cortex-A520 speculative unprivileged load workaround |
CVE-2023-52481
|
| VCID-a34j-kk2d-vbh5 | kernel: power: supply: rk817: refcount leak in rk817_charger_probe() |
CVE-2023-52571
|
| VCID-a5sp-kz5x-xqeq | kernel: drm/amdgpu/vkms: fix a possible null pointer dereference |
CVE-2023-52815
|
| VCID-a5ys-ebz8-kyee | kernel: RDMA/srp: Do not call scsi_done() from srp_abort() |
CVE-2023-52515
|
| VCID-a8pw-gkrc-w7g7 | kernel: dccp: out-of-bounds access in dccp_v4_err() and dccp_v6_err() |
CVE-2023-52577
|
| VCID-af81-k973-dkaw | kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() |
CVE-2023-52809
|
| VCID-b1z5-24ah-6qex | kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency |
CVE-2023-52855
|
| VCID-b6xc-vac6-abek | kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf |
CVE-2023-52799
|
| VCID-b9er-rv98-ybhr | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga |
CVE-2023-52819
|
| VCID-bapc-njwy-yybc | kernel: scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command |
CVE-2023-52500
|
| VCID-bcsc-u5zp-ykhy | kernel: mptcp: deal with large GSO size |
CVE-2023-52778
|
| VCID-btxx-agn2-mye2 | kernel: net/core: kernel crash in ETH_P_1588 flow dissector |
CVE-2023-52580
|
| VCID-c7vc-pecu-3bbc | kernel: media: imon: fix access to invalid resource for the second interface |
CVE-2023-52754
|
| VCID-ca74-h556-47ez | kernel: bonding: stop the device in bond_setup_by_slave() |
CVE-2023-52784
|
| VCID-cc2h-jtqq-dubj | kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream |
CVE-2023-52806
|
| VCID-cka4-h1ke-pka7 | kernel: x86/sgx: SECS reclaim vs. page fault for EAUG race |
CVE-2023-52568
|
| VCID-cn4e-1qrr-akhk | kernel: i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler |
CVE-2023-52766
|
| VCID-cnpc-8d56-f7cn | kernel: erofs: fix memory leak of LZMA global compressed deduplication |
CVE-2023-52526
|
| VCID-cny8-wsdw-rugb | kernel: mfd: qcom-spmi-pmic: Fix revid implementation |
CVE-2023-52765
|
| VCID-cqce-m1f7-47bw | kernel: cpu/hotplug: Don't offline the last non-isolated CPU |
CVE-2023-52831
|
| VCID-d1xn-kp1z-7ff7 | kernel: net: mana: Fix TX CQE error handling |
CVE-2023-52532
|
| VCID-d3u4-qqwr-ckds | kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls |
CVE-2023-52788
|
| VCID-dcxg-qxqb-gfb2 | kernel: LoongArch: Set all reserved memblocks on Node#0 at initialization |
CVE-2023-52506
|
| VCID-de2d-89cc-j3af | kernel: drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process |
CVE-2023-52860
|
| VCID-drz7-jr2h-v7ay | kernel: ksmbd: fix uaf in smb20_oplock_break_ack |
CVE-2023-52479
|
| VCID-ewxs-qt8g-7khc | kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool |
CVE-2023-52811
|
| VCID-f52d-y7km-9fhq | kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size |
CVE-2023-52762
|
| VCID-fhk6-8pcn-qygx | kernel: llc: verify mac len before reading mac header |
CVE-2023-52843
|
| VCID-g19p-5a2y-gube | kernel: f2fs: avoid format-overflow warning |
CVE-2023-52748
|
| VCID-g3vb-x6wd-nbdu | kernel: x86/alternatives: Disable KASAN in apply_alternatives() |
CVE-2023-52504
|
| VCID-gerx-6rwh-x7eu | kernel: af_unix: fix use-after-free in unix_stream_read_actor() |
CVE-2023-52772
|
| VCID-gx7t-6ysp-rkaf | kernel: Bluetooth: btusb: Add date->evt_skb is NULL check |
CVE-2023-52833
|
| VCID-h59v-ecf1-kkaf | kernel: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data |
CVE-2023-52876
|
| VCID-hs9x-5htv-m7ab | kernel: vfio/mdev: fault injection leading to NULL pointer dereference in mdev_unregister_parent() |
CVE-2023-52570
|
| VCID-hxjx-3the-x3ff | kernel: use-after-free in smb2_is_status_io_timeout() |
CVE-2023-1192
|
| VCID-j6c2-ce4b-5yfz | kernel: fs/jfs: Add validity check for db_maxag and db_agpref |
CVE-2023-52804
|
| VCID-jsf8-d1cu-pbaj | kernel: tee: amdtee: fix use-after-free vulnerability in amdtee_close_session |
CVE-2023-52503
|
| VCID-jv7p-7us4-mbb2 | kernel: wifi: ath11k: fix gtk offload status event locking |
CVE-2023-52777
|
| VCID-jz96-yhvb-rfhr | Possible deadlock in Linux kernel event handling |
CVE-2023-34324
|
| VCID-k247-ujwg-hudd | kernel: fs/jfs: Add check for negative db_l2nbperpage |
CVE-2023-52810
|
| VCID-ke94-ancd-87d2 | kernel: bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets |
CVE-2023-52523
|
| VCID-kj2q-55y7-nbcp | kernel: i2c: core: Run atomic i2c xfer when !preemptible |
CVE-2023-52791
|
| VCID-ksjz-df96-hyar | kernel: wifi: iwlwifi: mvm: Fix a memory corruption issue |
CVE-2023-52531
|
| VCID-m1k2-9pwk-93dp | kernel: clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data |
CVE-2023-52870
|
| VCID-mdhj-dyr8-gqfq | kernel: deadlock leading to denial of service in tipc_crypto_key_revoke |
CVE-2024-0641
|
| VCID-mhej-tyvj-3ugc | kernel: net: mvneta: fix calls to page_pool_get_stats |
CVE-2023-52780
|
| VCID-mnb2-x44z-cqhc | kernel: media: hantro: Check whether reset op is defined before use |
CVE-2023-52850
|
| VCID-mper-8skb-tkhm | kernel: perf: hisi: Fix use-after-free when register pmu fails |
CVE-2023-52859
|
| VCID-mpmx-b8cq-y7dy | kernel: IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF |
CVE-2023-52851
|
| VCID-mqkj-k2dy-z7an | kernel: drm/amdgpu: Fix potential null pointer derefernce |
CVE-2023-52814
|
| VCID-mtsm-xsy1-4yfq | kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() |
CVE-2023-52877
|
| VCID-n1gf-bjes-8qdc | kernel: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer |
CVE-2023-52750
|
| VCID-nsb8-d3sw-4kda | kernel: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet |
CVE-2023-52525
|
| VCID-nsrt-a1vt-pufq | kernel: hsr: Prevent use after free in prp_create_tagged_frame() |
CVE-2023-52846
|
| VCID-nwqx-v21v-wkbs | kernel: mctp: perform route lookups under a RCU read-side lock |
CVE-2023-52483
|
| VCID-ny28-cd4a-tbag | kernel: thermal: core: prevent potential string overflow |
CVE-2023-52868
|
| VCID-p4y7-fhde-rke3 | kernel: iommu/vt-d: memory allocation in iommu_suspend() leading to intermittent suspend/hibernation |
CVE-2023-52559
|
| VCID-pbmx-6z7f-n7cs | kernel: ravb: race condition leading to use-after-free in ravb_remove() |
CVE-2023-35827
|
| VCID-pd2g-re91-7qfe | kernel: netfs: improper loop in netfs_rreq_unlock_folios() |
CVE-2023-52582
|
| VCID-q5ae-fyj5-4yey | kernel: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() |
CVE-2023-52752
|
| VCID-qffg-mzdw-gqay | kernel: drm/amd/display: Avoid NULL dereference of timing generator |
CVE-2023-52753
|
| VCID-qxsc-vnnw-ukdx | kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg |
CVE-2023-52528
|
| VCID-rekt-2vyj-z7g8 | kernel: dm: fix a race condition in retrieve_deps |
CVE-2023-54324
|
| VCID-rghv-w4pk-87e4 | kernel: perf/core: Bail out early if the request AUX area is out of bound |
CVE-2023-52835
|
| VCID-rgjy-n8ag-9ud4 | kernel: cxl/mem: Fix shutdown order |
CVE-2023-52849
|
| VCID-rmd5-4vrr-7uec | kernel: serial: 8250_port: IRQ data NULL pointer dereference |
CVE-2023-52567
|
| VCID-rn8h-ew85-bfd2 | kernel: tty: n_gsm: fix race condition in status line change on dead connections |
CVE-2023-52872
|
| VCID-rpcv-ujh9-qkfb | kernel: spi: sun6i: reduce DMA RX transfer width to single byte |
CVE-2023-52511
|
| VCID-rqb6-eppt-wfd3 | kernel: padata: Fix refcnt handling in padata_free_shell() |
CVE-2023-52854
|
| VCID-rrg9-jcqa-5ubh | kernel: iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range |
CVE-2023-52484
|
| VCID-s15g-xfaf-pqck | kernel: use after free in nvmet_tcp_free_crypto in NVMe |
CVE-2023-5178
|
| VCID-s1cw-2hc3-kkfn | kernel: HID: sony: Fix a potential memory leak in sony_probe() |
CVE-2023-52529
|
| VCID-s227-xsw7-7bay | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 |
CVE-2023-52818
|
| VCID-s3j4-cmd5-5yb4 | kernel: media: vidtv: psi: Add check for kstrdup |
CVE-2023-52844
|
| VCID-skb6-pp5p-bqc3 | kernel: i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data. |
CVE-2023-52763
|
| VCID-smhw-w2rj-x7fn | kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() |
CVE-2023-52840
|
| VCID-sn1p-duct-7fcf | kernel: RDMA/siw: Fix connection failure handling |
CVE-2023-52513
|
| VCID-sqn8-7syw-e7gb | kernel: use-after-free vulnerability in the smb client component |
CVE-2023-5345
|
| VCID-sygz-8vzx-kufr | kernel: fbdev: imsttfb: fix a resource leak in probe |
CVE-2023-52838
|
| VCID-szqf-djjp-w3h3 | kernel: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference |
CVE-2023-52826
|
| VCID-t8dz-y9c8-bbdf | kernel: media: uvcvideo: out-of-bounds read in uvc_query_v4l2_menu() |
CVE-2023-52565
|
| VCID-ta8k-s793-s7ah | kernel: netfilter: nf_tables: use-after-free due to addition and removal of rules from chain bindings within the same transaction |
CVE-2023-5197
|
| VCID-tbq4-x3v2-27gw | kernel: drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer() |
CVE-2023-52773
|
| VCID-tph2-sknf-c7fb | kernel: pinctrl: nuvoton: wpcm450: fix out of bounds write |
CVE-2023-52512
|
| VCID-trxy-dx96-9ua3 | kernel: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() |
CVE-2023-52527
|
| VCID-u3tz-6h3a-yydg | kernel: HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit |
CVE-2023-52519
|
| VCID-u8vn-7m3u-dqd5 | kernel: spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain |
CVE-2023-52517
|
| VCID-uv5k-27ba-kkbe | kernel: nf_tables: pointer math issue in nft_byteorder_eval() |
CVE-2024-0607
|
| VCID-uwta-d7pe-8fe6 | kernel: smb: client: fix potential deadlock when releasing mids |
CVE-2023-52757
|
| VCID-uy81-6u72-qkcc | kernel: pstore/platform: Add check for kstrdup |
CVE-2023-52869
|
| VCID-v6uh-rjgb-8ycg | kernel: locking/ww_mutex/test: Fix potential workqueue corruption |
CVE-2023-52836
|
| VCID-va7n-52az-mqbp | kernel: scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs |
CVE-2023-52808
|
| VCID-vm1g-8hut-zqdv | kernel: tty: n_gsm: use-after-free in gsm_cleanup_mux() |
CVE-2023-52564
|
| VCID-vmqt-cfda-4bbe | kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors |
CVE-2023-52477
|
| VCID-vuvt-vn89-nqef | kernel: ceph: drop messages from MDS when unmounting |
CVE-2022-48628
|
| VCID-w6cw-gjn3-akcx | kernel: ieee802154: ca8210: Fix a potential UAF in ca8210_probe |
CVE-2023-52510
|
| VCID-w99p-9ksx-kbef | kernel: platform/x86: wmi: Fix opening of char device |
CVE-2023-52864
|
| VCID-wats-qjm5-cub4 | kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET |
CVE-2023-52813
|
| VCID-wja6-3qb9-c3bn | kernel: lib/generic-radix-tree.c: Don't overflow in peek() |
CVE-2021-47432
|
| VCID-wwuc-q42j-23gm | kernel: platform/x86: think-lmi: Fix reference leak |
CVE-2023-52520
|
| VCID-wy1z-syrf-affm | kernel: drm: bridge: it66121: Fix invalid connector dereference |
CVE-2023-52861
|
| VCID-xavd-11au-5kc6 | kernel: ksmbd: fix slab out of bounds write in smb_inherit_dacl() |
CVE-2023-52755
|
| VCID-xj5r-tb5v-sfh6 | kernel: ring-buffer: Do not attempt to read past "commit" |
CVE-2023-52501
|
| VCID-xkwe-ybb2-tyew | kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds |
CVE-2023-52878
|
| VCID-xu1f-7um1-xfef | kernel: netfilter: use-after-free when removing catchall element in GC sync path |
CVE-2023-6111
|
| VCID-xytd-jgkz-9kgd | kernel: Possible DOS from guest to host invringh_kiov_advance in vhost driver at drivers/vhost/vringh.c |
CVE-2023-5158
|
| VCID-y5g5-grqv-cbhv | kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get |
CVE-2023-6121
|
| VCID-yyz5-c2xy-1kbe | kernel: atl1c: Work around the DMA RX overflow issue |
CVE-2023-52834
|
| VCID-z5c6-dfvg-dyhm | kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs |
CVE-2023-5090
|
| VCID-zayq-pb12-jkew | kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data |
CVE-2023-52865
|
| VCID-zccb-1kwm-efcn | kernel: wifi: ath11k: fix dfs radar event locking |
CVE-2023-52798
|
| VCID-zcxw-xq7k-tkhx | kernel: SEV-ES local priv escalation |
CVE-2023-46813
|
| VCID-zeyz-c89h-g7gc | kernel: media: bttv: fix use after free error due to btv->timeout timer |
CVE-2023-52847
|
| VCID-zfgx-3auq-b3f5 | kernel: ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow |
CVE-2023-54069
|
| VCID-zpup-8k6s-6ua4 | kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL |
CVE-2023-52817
|
| VCID-zy4y-tk1p-6kc8 | kernel: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() |
CVE-2023-52502
|