Search for packages
| purl | pkg:deb/debian/linux@6.1.69-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2rfc-1u9s-77bh | kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number |
CVE-2023-52881
|
| VCID-3q28-us4e-x7be | kernel: use-after-free in net/appletalk/ddp.c |
CVE-2023-51781
|
| VCID-7232-r8q8-nkhb | kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF |
CVE-2023-6531
|
| VCID-b5ve-8bn6-vbav | kernel: untrusted VMM can trigger int80 syscall handling |
CVE-2024-25744
|
| VCID-bdew-rk4n-wkcf | kernel: null pointer dereference vulnerability in nft_dynset_init() |
CVE-2023-6622
|
| VCID-d7cf-hg44-bqet | kernel: usb: aqc111: check packet for fixup for true limit |
CVE-2023-52655
|
| VCID-j7d3-nr6k-4qdy | kernel: io_uring/af_unix: disable sending io_uring over sockets |
CVE-2023-52654
|
| VCID-m2zk-qg6b-6fah | security update |
CVE-2023-51782
|
| VCID-n1w6-27yz-dfer | kernel: bluetooth: bt_sock_ioctl race condition leads to use-after-free in bt_sock_recvmsg |
CVE-2023-51779
|
| VCID-pp43-v99a-k3cz | kernel: netfilter: use-after-free in nft_trans_gc_catchall_sync leads to privilege escalation |
CVE-2024-0193
|
| VCID-rbrm-7x37-3ugv | kernel: inactive elements in nft_pipapo_walk |
CVE-2023-6817
|
| VCID-uakf-nme4-nufu | kernel: use-after-free in net/atm/ioctl.c |
CVE-2023-51780
|
| VCID-v17r-42dr-qybs | kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client |
CVE-2024-0565
|
| VCID-wc2m-dsfh-qkaq | kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination |
CVE-2024-0646
|
| VCID-wmdx-p5fr-yqe4 | kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size |
CVE-2023-6931
|