Search for packages
| purl | pkg:deb/debian/linux@6.3.11-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1cwu-y5wx-jfgy | kernel: use-after-free in parse_lease_state() |
CVE-2023-1194
|
| VCID-2dcp-rju9-m7ce | kernel: blkio memory leakage due to blkcg and some blkgs are not freed after they are made offline. |
CVE-2024-0443
|
| VCID-3ufx-7ea9-vffv | kernel: maple_tree: fix potential out-of-bounds access in mas_wr_end_piv() |
CVE-2023-54135
|
| VCID-44ju-k8mr-z3g8 | kernel: HID: wacom: Use ktime_t rather than int when dealing with timestamps |
CVE-2023-53797
|
| VCID-a7kk-4q27-tkcf | kernel: net: IPv6 RPL protocol reachable assertion leads to DoS |
CVE-2023-2156
|
| VCID-c14n-jwjb-a7gc | kernel: Linux kernel: High impact due to data race in hidraw_open() during concurrent device opening |
CVE-2023-53759
|
| VCID-e1e8-3jad-v7cx |
CVE-2023-38430
|
|
| VCID-f2wb-9axu-kke5 |
CVE-2023-38431
|
|
| VCID-g3ew-umew-myau | kernel: distros-[DirtyVMA] Privilege escalation via non-RCU-protected VMA traversal |
CVE-2023-3269
|
| VCID-gj1d-ntgs-qud4 | kernel: Out of bounds read in smb2_write |
CVE-2023-3865
|
| VCID-kz9r-zumw-5ydf | kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails |
CVE-2023-3609
|
| VCID-mza3-5d1d-byfs | kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests |
CVE-2023-3390
|
| VCID-ntw9-3pcv-vfbt | kernel: ksmbd: out-of-bounds read in ksmbd_smb2_check_message |
CVE-2023-38432
|
| VCID-re1w-a633-sfa1 | kernel: netfilter: nf_tables: fix chain binding transaction logic in the abort path of NFT_MSG_NEWRULE |
CVE-2023-3610
|
| VCID-rzg3-3jz1-x7er | kernel: ksmbd Chained Request NULL Pointer Dereference |
CVE-2023-3866
|
| VCID-zvds-szma-n7f8 | kernel: ksmbd: integer underflow and out-of-bounds read in deassemble_neg_contexts |
CVE-2023-38427
|