Search for packages
| purl | pkg:deb/debian/linux@6.5.3-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-11f5-wk8d-tkf8 | kernel: media: amphion: fix REVERSE_INULL issues reported by coverity |
CVE-2023-53653
|
| VCID-1bne-9c9y-mkbm | kernel: RDMA/rxe: Fix unsafe drain work queue code |
CVE-2023-53528
|
| VCID-1g52-v49a-hyf5 | kernel: Revert "IB/isert: Fix incorrect release of isert connection" |
CVE-2023-54219
|
| VCID-2tbb-89hb-rkh6 | kernel: skbuff: skb_segment, Call zero copy functions before using skbuff frags |
CVE-2023-53354
|
| VCID-2tua-umaf-6uc6 | kernel: lwt: Fix return values of BPF xmit ops |
CVE-2023-53338
|
| VCID-2xwn-azeg-aqbt | kernel: wifi: mwifiex: fix memory leak in mwifiex_histogram_read() |
CVE-2023-53808
|
| VCID-34km-p3dp-v7gp | kernel: ipmi_si: fix a memleak in try_smi_init() |
CVE-2023-53611
|
| VCID-3d5w-ad41-hkbd | kernel: media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init() |
CVE-2023-54143
|
| VCID-3fy9-44f1-rqc6 | kernel: x86/MCE: Always save CS register on AMD Zen IF Poison errors |
CVE-2023-53438
|
| VCID-3zeh-r9y8-sqf4 | kernel: ksmbd: Read Request Out-Of-Bounds Read Information Disclosure Vulnerability |
CVE-2023-39179
|
| VCID-42cq-tqw1-xyfy | kernel: HID: multitouch: Correct devm device reference for hidinput input_dev name |
CVE-2023-53454
|
| VCID-45vq-ugkk-1fa5 | kernel: Drivers: hv: vmbus: Don't dereference ACPI root object handle |
CVE-2023-53647
|
| VCID-4r3t-abgz-skdb | kernel: HID: nvidia-shield: Reference hid_device devm allocation of input_dev name |
CVE-2023-53253
|
| VCID-4ttv-ypmj-h7fr | kernel: Linux kernel: Denial of Service due to PCI resource leak |
CVE-2023-53743
|
| VCID-5hmr-mnq5-7yhr | kernel: ipmi:ssif: Fix a memory leak when scanning for an adapter |
CVE-2023-54064
|
| VCID-5t86-ndjy-mkhj | kernel: virtio_vdpa: build affinity masks conditionally |
CVE-2023-54008
|
| VCID-5wf1-v12t-gkcq | kernel: usb: out-of-bounds read in read_descriptors |
CVE-2023-37453
|
| VCID-5y7y-azn4-5qbw | kernel: of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name() |
CVE-2023-54178
|
| VCID-5zuy-q1p8-hqex | kernel: coresight: Fix memory leak in acpi_buffer->pointer |
CVE-2023-53261
|
| VCID-61xe-y3vv-2ff6 | kernel: virtio_pmem: add the missing REQ_OP_WRITE for flush bio |
CVE-2023-54089
|
| VCID-676c-3wrp-1ufr | kernel: RDMA/rxe: Fix incomplete state save in rxe_requester |
CVE-2023-53539
|
| VCID-67wm-k7tb-1ydj | kernel: Bluetooth: hci_conn: fail SCO/ISO via hci_conn_failed if ACL gone early |
CVE-2023-53374
|
| VCID-6t5m-uuun-fqhe | kernel: wifi: mwifiex: Fix OOB and integer underflow when rx packets |
CVE-2023-53226
|
| VCID-6tud-4jby-s7cm | kernel: Linux kernel: Memory leak in PM / devfreq can lead to denial of service |
CVE-2023-53518
|
| VCID-736k-kgu4-gfhw | kernel: Revert "f2fs: fix to do sanity check on extent cache correctly" |
CVE-2023-53763
|
| VCID-7yca-fmnr-w7c8 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds in init_smb2_rsp_hdr() If client send smb2 negotiate request and then send smb1 negotiate request, init_smb2_rsp_hdr is called for smb1 negotiate request since need_neg is set to false. This patch ignore smb1 packets after ->need_neg is set to false. |
CVE-2023-52441
|
| VCID-8jkg-bhtn-y3gy | kernel: drm/msm/mdp5: Don't leak some plane state |
CVE-2023-53324
|
| VCID-961x-eqgd-v7f5 | kernel: crypto: api - Use work queue in crypto_destroy_instance |
CVE-2023-53799
|
| VCID-96m5-pecz-ykf6 | kernel: Bluetooth: Fix potential use-after-free when clear keys |
CVE-2023-53386
|
| VCID-9dhe-pw5w-f7dm | kernel: rpmsg: glink: Add check for kstrdup |
CVE-2023-54049
|
| VCID-9euy-h25d-tugq | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and tree id in compound request `smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session() will always return the first request smb2 header in a compound request. if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will return 0, i.e. The tree id check is skipped. This patch use ksmbd_req_buf_next() to get current command in compound. |
CVE-2023-52442
|
| VCID-9neh-zghm-eyb5 | kernel: USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() |
CVE-2023-52886
|
| VCID-aawx-4bwq-5ubw | kernel: Linux kernel Bluetooth: Denial of Service due to use-after-free in connection handling |
CVE-2023-53762
|
| VCID-aku2-yuph-vyar | kernel: NFSv4.2: Rework scratch handling for READ_PLUS (again) |
CVE-2023-53360
|
| VCID-b7em-hmb3-4yhp | kernel: IGB driver inadequate buffer size for frames larger than MTU |
CVE-2023-45871
|
| VCID-bj9z-dtts-tfgp | kernel: pstore/ram: Check start of empty przs during init |
CVE-2023-53331
|
| VCID-bxa2-ftp5-57b6 | kernel: PCI: hv: Fix a crash in hv_pci_restore_msi_msg() during hibernation |
CVE-2023-53175
|
| VCID-c2mu-8323-1ydz | kernel: md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() |
CVE-2023-53210
|
| VCID-d5wz-a9bc-1uf9 | kernel: powerpc/iommu: Fix notifiers being shared by PCI and VIO buses |
CVE-2023-54095
|
| VCID-e67c-5bw1-abg9 | kernel: ksmbd: smb2_open out-of-bounds read information disclosure vulnerability |
CVE-2023-4458
|
| VCID-eht3-szr5-auha | kernel: rcu: dump vmalloc memory info safely |
CVE-2023-54113
|
| VCID-ejyg-b2cr-73gc | kernel: x86/sev: Make enc_dec_hypercall() accept a size instead of npages |
CVE-2023-53996
|
| VCID-f739-jh4k-q7dk | kernel: bpf: Fix issue in verifying allow_ptr_leaks |
CVE-2023-54181
|
| VCID-f9dz-4gw6-kqdu | kernel: netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c |
CVE-2023-53179
|
| VCID-ffyb-7dwm-cfbd | kernel: refscale: Fix uninitalized use of wait_queue_head_t |
CVE-2023-54316
|
| VCID-g9zd-f8rc-hqgz | kernel: powercap: arm_scmi: Remove recursion while parsing zones |
CVE-2023-53428
|
| VCID-gt1e-rd7c-y7bt | kernel: serial: sprd: Fix DMA buffer leak issue |
CVE-2023-54136
|
| VCID-h5js-e6kv-jbhm | kernel: of: overlay: Call of_changeset_init() early |
CVE-2023-53856
|
| VCID-h9pb-64h4-xuev | kernel: HID: uclogic: Correct devm device reference for hidinput input_dev name |
CVE-2023-54207
|
| VCID-hh8y-3ats-4fbk | kernel: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() |
CVE-2023-54183
|
| VCID-hreg-9fwg-w7dk | kernel: scsi: qla4xxx: Add length check when parsing nlattrs |
CVE-2023-53456
|
| VCID-jfv8-6bqt-gkb1 | kernel: Linux kernel: Information disclosure in VFIO Type1 module via uninitialized stack memory |
CVE-2023-54137
|
| VCID-jjh6-3jy7-sucy | kernel: md/raid5-cache: fix a deadlock in r5l_exit_log() |
CVE-2023-53848
|
| VCID-jpeq-e45v-37ed | kernel: platform/x86: dell-sysman: Fix reference leak |
CVE-2023-53631
|
| VCID-js3a-zyfj-mkeh | kernel: dccp: Fix out of bounds access in DCCP error handler |
CVE-2023-53782
|
| VCID-kvwr-dj4n-x3b4 | kernel: nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() |
CVE-2023-53697
|
| VCID-m1t5-mbks-6qby | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob() If authblob->SessionKey.Length is bigger than session key size(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes. cifs_arc4_crypt copy to session key array from SessionKey from client. |
CVE-2023-52440
|
| VCID-merm-72uz-vbgk | kernel: Race condition in lpfc_unregister_fcf_rescan() in scsi/lpfc/lpfc_hbadisc.c |
CVE-2024-24855
|
| VCID-mwd5-aurx-fqh8 | kernel: netfilter: potential slab-out-of-bound access due to integer underflow |
CVE-2023-42753
|
| VCID-mxda-6yrb-ukgb | kernel: net/sched: sch_hfsc UAF |
CVE-2023-4623
|
| VCID-n1pe-fux8-pudp | kernel: ksmbd: Read Request Memory Leak Denial-of-Service Vulnerability |
CVE-2023-39180
|
| VCID-nc4u-q2z2-nue5 | kernel: cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver |
CVE-2023-53563
|
| VCID-nk2n-wzez-t7ef | kernel: fs/ntfs3: Enhance sanity check while generating attr_list |
CVE-2023-53328
|
| VCID-nnau-p81c-4khc | kernel: PCI/DOE: Fix destroy_work_on_stack() race |
CVE-2023-54235
|
| VCID-nt4s-u8z2-73d7 | kernel: RDMA/efa: Fix wrong resources deallocation order |
CVE-2023-54201
|
| VCID-p2zm-56uv-kqa9 | kernel: iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind |
CVE-2023-53501
|
| VCID-q4hy-xme5-pyba | kernel: amba: bus: fix refcount leak |
CVE-2023-54230
|
| VCID-rez4-mgqw-8yes | kernel: wifi: mwifiex: avoid possible NULL skb pointer dereference |
CVE-2023-53384
|
| VCID-rgm2-pra9-7faj | kernel: drivers: base: Free devm resources when unregistering a device |
CVE-2023-53596
|
| VCID-rswm-567w-qbbq | kernel: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() |
CVE-2023-54266
|
| VCID-rtyz-f5p8-aqc2 | kernel: arm64: csum: Fix OoB access in IP checksum code for negative lengths |
CVE-2023-53726
|
| VCID-sauh-8gtr-kqh8 | kernel: Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() |
CVE-2023-53828
|
| VCID-scs6-nq8b-67gk | kernel: net: deal with integer overflows in kmalloc_reserve() |
CVE-2023-53752
|
| VCID-sdwv-6ycc-9ubh | kernel: media: ipu-bridge: Fix null pointer deref on SSDB/PLD parsing warnings |
CVE-2023-53336
|
| VCID-srdw-aesj-1qaf | kernel: workqueue: fix data race with the pwq->stats[] increment |
CVE-2023-53329
|
| VCID-sv8q-8yqd-2yc9 | kernel: audit: fix possible soft lockup in __audit_inode_child() |
CVE-2023-54045
|
| VCID-t6ut-cx1y-c3ew | kernel: OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate() |
CVE-2023-53664
|
| VCID-u1bv-744e-mbam | kernel: firmware: meson_sm: fix to avoid potential NULL pointer dereference |
CVE-2023-54304
|
| VCID-uzpq-kddf-tfd7 | kernel: crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390 |
CVE-2023-53599
|
| VCID-v92m-p6f8-dfek | kernel: ext4: correct grp validation in ext4_mb_good_group |
CVE-2023-53861
|
| VCID-vjuw-dju4-97cj | kernel: netfilter: xtables sctp out-of-bounds read in match_flags() |
CVE-2023-39193
|
| VCID-vqmu-xn3y-e3gc | kernel: io_uring/net: don't overflow multishot recv |
CVE-2023-54030
|
| VCID-wvyb-y46r-rub3 | kernel: irdma: Improper access control |
CVE-2023-25775
|
| VCID-wwva-cdfu-3qg5 | kernel: integer overflow in igmpv3_newpack leading to exploitable memory access |
CVE-2023-42752
|
| VCID-y4vc-ke98-1fd2 | kernel: s390/dcssblk: fix kernel crash with list_add corruption |
CVE-2023-54117
|
| VCID-y6ug-7b6f-z7a6 | kernel: tracing: Fix race issue between cpu buffer write and swap |
CVE-2023-53368
|
| VCID-y6us-s22r-7qff | kernel: LoongArch: mm: Add p?d_leaf() definitions |
CVE-2023-53361
|
| VCID-y9vh-w3k6-ebgu | kernel: netfilter: xtables out-of-bounds read in u32_match_it() |
CVE-2023-39192
|
| VCID-ya16-qrwm-kkfs | kernel: Linux kernel: Denial of Service via NULL pointer dereference in blk-cgroup |
CVE-2023-54271
|
| VCID-yq98-krmu-j3hb | kernel: bpf: reject unhashed sockets in bpf_sk_assign |
CVE-2023-53585
|
| VCID-z2jn-gy3c-8yae | kernel: nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse |
CVE-2023-54140
|
| VCID-zaht-ad6c-e3gb | kernel: powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT |
CVE-2023-54267
|
| VCID-zamn-m976-8uf8 | kernel: ksmbd: Transform Header Out-Of-Bounds Read Information Disclosure Vulnerability |
CVE-2023-39176
|
| VCID-zgsp-6tr3-j7dk | kernel: Linux kernel Wi-Fi driver: Denial of Service due to missing transmit status |
CVE-2023-54052
|
| VCID-zjqe-5xn4-pbdx | kernel: usb: typec: bus: verify partner exists in typec_altmode_attention |
CVE-2023-54299
|