Search for packages
| purl | pkg:deb/debian/linux@6.5.13-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-a5sp-kz5x-xqeq | kernel: drm/amdgpu/vkms: fix a possible null pointer dereference |
CVE-2023-52815
|
| VCID-bxfy-y3bb-duhd | kernel: ntfs3: kernel memory read by mounting a filesystem |
CVE-2023-45896
|
| VCID-cn4e-1qrr-akhk | kernel: i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler |
CVE-2023-52766
|
| VCID-cqce-m1f7-47bw | kernel: cpu/hotplug: Don't offline the last non-isolated CPU |
CVE-2023-52831
|
| VCID-ewxs-qt8g-7khc | kernel: scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool |
CVE-2023-52811
|
| VCID-f52d-y7km-9fhq | kernel: virtio-blk: fix implicit overflow on virtio_max_dma_size |
CVE-2023-52762
|
| VCID-fmjc-a468-fffw | kernel: f2fs: split initial and dynamic conditions for extent_cache |
CVE-2023-52770
|
| VCID-jmqw-ffjj-fqb7 | kernel: drivers: perf: Check find_first_bit() return value |
CVE-2023-52797
|
| VCID-k3bt-ws28-e3ex | kernel: smb: client: fix use-after-free in smb2_query_info_compound() |
CVE-2023-52751
|
| VCID-qyu2-kw7b-1kg1 | kernel: riscv: VMAP_STACK overflow detection thread-safe |
CVE-2023-52761
|
| VCID-skb6-pp5p-bqc3 | kernel: i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data. |
CVE-2023-52763
|
| VCID-uv5k-27ba-kkbe | kernel: nf_tables: pointer math issue in nft_byteorder_eval() |
CVE-2024-0607
|
| VCID-va7n-52az-mqbp | kernel: scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs |
CVE-2023-52808
|
| VCID-wja6-3qb9-c3bn | kernel: lib/generic-radix-tree.c: Don't overflow in peek() |
CVE-2021-47432
|
| VCID-wkng-tshf-vkc8 | kernel: drm/amd: check num of link levels when update pcie param |
CVE-2023-52812
|
| VCID-xkwe-ybb2-tyew | kernel: can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds |
CVE-2023-52878
|
| VCID-xu1f-7um1-xfef | kernel: netfilter: use-after-free when removing catchall element in GC sync path |
CVE-2023-6111
|
| VCID-xxe5-3ae2-vygt | kernel: cxl/port: Fix delete_endpoint() vs parent unregistration race |
CVE-2023-52771
|
| VCID-yyz5-c2xy-1kbe | kernel: atl1c: Work around the DMA RX overflow issue |
CVE-2023-52834
|