Search for packages
| purl | pkg:deb/debian/linux@6.5.8-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1dbx-wq4g-ukgk | kernel: powerpc/47x: Fix 47x syscall return crash |
CVE-2023-52499
|
| VCID-1g8h-fk1v-guey | kernel: use-after-free in powermate_config_complete |
CVE-2023-52475
|
| VCID-253y-mvfx-rfbr | kernel: perf/x86/lbr: Filter vsyscall addresses |
CVE-2023-52476
|
| VCID-262g-8bky-5ugn | kernel: ksmbd: fix race condition between session lookup and expire |
CVE-2023-52480
|
| VCID-3ms7-4899-ukc9 | kernel: net: fix possible store tearing in neigh_periodic_work() |
CVE-2023-52522
|
| VCID-47ns-wagw-6bgw | kernel: phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers |
CVE-2023-52505
|
| VCID-5ynw-da7q-d7fq | kernel: wifi: mac80211: fix potential key use-after-free |
CVE-2023-52530
|
| VCID-6stw-cw42-83ek | kernel: vmwgfx: reference count issue leads to use-after-free in surface handling |
CVE-2023-5633
|
| VCID-77qs-8umq-h3f3 | kernel: nfc: nci: assert requested protocol is valid |
CVE-2023-52507
|
| VCID-89hc-cav3-6yf5 | kernel: HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect |
CVE-2023-52478
|
| VCID-96e5-hh43-rqfs | kernel: ravb: Fix use-after-free issue in ravb_tx_timeout_work() |
CVE-2023-52509
|
| VCID-9h9c-32k2-j3fj | kernel: net: nfc: llcp: Add lock when modifying device list |
CVE-2023-52524
|
| VCID-9tuv-9d9s-d3dt | kernel: Bluetooth: hci_codec: Fix leaking content of local_codecs |
CVE-2023-52518
|
| VCID-9wfr-uf4a-27dq | kernel: arm64: errata: Add Cortex-A520 speculative unprivileged load workaround |
CVE-2023-52481
|
| VCID-a5ys-ebz8-kyee | kernel: RDMA/srp: Do not call scsi_done() from srp_abort() |
CVE-2023-52515
|
| VCID-cnpc-8d56-f7cn | kernel: erofs: fix memory leak of LZMA global compressed deduplication |
CVE-2023-52526
|
| VCID-d1xn-kp1z-7ff7 | kernel: net: mana: Fix TX CQE error handling |
CVE-2023-52532
|
| VCID-drz7-jr2h-v7ay | kernel: ksmbd: fix uaf in smb20_oplock_break_ack |
CVE-2023-52479
|
| VCID-g3vb-x6wd-nbdu | kernel: x86/alternatives: Disable KASAN in apply_alternatives() |
CVE-2023-52504
|
| VCID-jsf8-d1cu-pbaj | kernel: tee: amdtee: fix use-after-free vulnerability in amdtee_close_session |
CVE-2023-52503
|
| VCID-jz96-yhvb-rfhr | Possible deadlock in Linux kernel event handling |
CVE-2023-34324
|
| VCID-jzfn-k82f-s3fw | kernel: race condition between HCIUARTSETPROTO and HCIUARTGETPROTO in hci_uart_tty_ioctl |
CVE-2023-31083
|
| VCID-ke94-ancd-87d2 | kernel: bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets |
CVE-2023-52523
|
| VCID-ksjz-df96-hyar | kernel: wifi: iwlwifi: mvm: Fix a memory corruption issue |
CVE-2023-52531
|
| VCID-mdhj-dyr8-gqfq | kernel: deadlock leading to denial of service in tipc_crypto_key_revoke |
CVE-2024-0641
|
| VCID-nsb8-d3sw-4kda | kernel: wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet |
CVE-2023-52525
|
| VCID-nwqx-v21v-wkbs | kernel: mctp: perform route lookups under a RCU read-side lock |
CVE-2023-52483
|
| VCID-p4y7-fhde-rke3 | kernel: iommu/vt-d: memory allocation in iommu_suspend() leading to intermittent suspend/hibernation |
CVE-2023-52559
|
| VCID-pbmx-6z7f-n7cs | kernel: ravb: race condition leading to use-after-free in ravb_remove() |
CVE-2023-35827
|
| VCID-qxsc-vnnw-ukdx | kernel: net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg |
CVE-2023-52528
|
| VCID-s15g-xfaf-pqck | kernel: use after free in nvmet_tcp_free_crypto in NVMe |
CVE-2023-5178
|
| VCID-s1cw-2hc3-kkfn | kernel: HID: sony: Fix a potential memory leak in sony_probe() |
CVE-2023-52529
|
| VCID-sn1p-duct-7fcf | kernel: RDMA/siw: Fix connection failure handling |
CVE-2023-52513
|
| VCID-tph2-sknf-c7fb | kernel: pinctrl: nuvoton: wpcm450: fix out of bounds write |
CVE-2023-52512
|
| VCID-trxy-dx96-9ua3 | kernel: ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data() |
CVE-2023-52527
|
| VCID-u3tz-6h3a-yydg | kernel: HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit |
CVE-2023-52519
|
| VCID-vmqt-cfda-4bbe | kernel: usb: hub: Guard against accesses to uninitialized BOS descriptors |
CVE-2023-52477
|
| VCID-w6cw-gjn3-akcx | kernel: ieee802154: ca8210: Fix a potential UAF in ca8210_probe |
CVE-2023-52510
|
| VCID-wwuc-q42j-23gm | kernel: platform/x86: think-lmi: Fix reference leak |
CVE-2023-52520
|
| VCID-xytd-jgkz-9kgd | kernel: Possible DOS from guest to host invringh_kiov_advance in vhost driver at drivers/vhost/vringh.c |
CVE-2023-5158
|
| VCID-z5c6-dfvg-dyhm | kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs |
CVE-2023-5090
|
| VCID-zy4y-tk1p-6kc8 | kernel: net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() |
CVE-2023-52502
|