Search for packages
| purl | pkg:deb/debian/linux@6.6.8-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-12g7-du7b-nfff | kernel: drm/amd/display: Fix null pointer dereference in error message |
CVE-2023-52862
|
| VCID-139j-84md-tkct | kernel: clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data |
CVE-2023-52873
|
| VCID-1kef-gpva-aygh | kernel: nbd: fix uaf in nbd_open |
CVE-2023-52837
|
| VCID-1pdf-5dvg-8qgq | kernel: tty: vcc: Add check for kstrdup() in vcc_probe() |
CVE-2023-52789
|
| VCID-1rxn-nspd-3kh9 | kernel: drm/mediatek: Fix coverity issue with unintentional integer overflow |
CVE-2023-52857
|
| VCID-1su9-zcmy-auhz | kernel: virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt() |
CVE-2023-52842
|
| VCID-22fy-phgv-ykhn | kernel: f2fs: compress: fix to avoid use-after-free on dic |
CVE-2023-52852
|
| VCID-23y8-xncn-u7cn | kernel: soc: qcom: llcc: Handle a second device without data corruption |
CVE-2023-52871
|
| VCID-2cc2-5ahh-pqed | kernel: wifi: wilc1000: use vmm_table as array in wilc struct |
CVE-2023-52768
|
| VCID-2fbp-qus3-7bdx | kernel: drm/amdkfd: Fix a race condition of vram buffer unref in svm code |
CVE-2023-52825
|
| VCID-2qj2-36cq-17ff | kernel: thermal: intel: powerclamp: fix mismatch in get function for max_idle |
CVE-2023-52794
|
| VCID-2rfc-1u9s-77bh | kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number |
CVE-2023-52881
|
| VCID-36qn-rfx6-kyb1 | kernel: net: wangxun: fix kernel panic due to null pointer |
CVE-2023-52783
|
| VCID-3cna-8nke-q3gh | kernel: hwmon: (axi-fan-control) Fix possible NULL pointer dereference |
CVE-2023-52863
|
| VCID-3df3-3dfp-q3c9 | kernel: drm/panel: fix a possible null pointer dereference |
CVE-2023-52821
|
| VCID-3q28-us4e-x7be | kernel: use-after-free in net/appletalk/ddp.c |
CVE-2023-51781
|
| VCID-3r2t-ukmh-pbcy | kernel: wifi: ath12k: fix htt mlo-offset event locking |
CVE-2023-52769
|
| VCID-4553-ppzm-6uga | kernel: swiotlb: fix out-of-bounds TLB allocations with CONFIG_SWIOTLB_DYNAMIC |
CVE-2023-52790
|
| VCID-4gzu-g4mx-ckgt | kernel: ipvlan: add ipvlan_route_v6_outbound() helper |
CVE-2023-52796
|
| VCID-4kkx-auhb-fkgf | kernel: cxl/region: Do not try to cleanup after cxl_region_setup_targets() fails |
CVE-2023-52792
|
| VCID-4u31-ahkq-57ga | kernel: clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data |
CVE-2023-52858
|
| VCID-4v8p-q28n-bfhq | kernel: HID: uclogic: Fix user-memory-access bug in uclogic_params_ugee_v2_init_event_hooks() |
CVE-2023-52866
|
| VCID-54wa-c3cr-4qdj | kernel: fs: Pass AT_GETATTR_NOSEC flag to getattr interface function |
CVE-2023-52779
|
| VCID-5a3k-t87e-t7cx | kernel: wifi: ath12k: fix dfs-radar and temperature event locking |
CVE-2023-52776
|
| VCID-5jwc-14fb-e3gs | kernel: hid: cp2112: Fix duplicate workqueue initialization |
CVE-2023-52853
|
| VCID-62ev-d1nw-gugs | kernel: clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data |
CVE-2023-52875
|
| VCID-64k8-rbwm-bqch | kernel: media: gspca: cpia1: shift-out-of-bounds in set_flicker |
CVE-2023-52764
|
| VCID-6q4f-k66w-ayb2 | kernel: x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro |
CVE-2023-52874
|
| VCID-6qgj-4tf2-cfgu | kernel: drm/amdkfd: Fix shift out-of-bounds issue |
CVE-2023-52816
|
| VCID-7232-r8q8-nkhb | kernel: GC's deletion of an SKB races with unix_stream_read_generic() leading to UAF |
CVE-2023-6531
|
| VCID-74dk-5bz3-s3hc | kernel: wifi: mac80211: don't return unset power in ieee80211_get_tx_power() |
CVE-2023-52832
|
| VCID-75n6-1yvd-tugy | kernel: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING |
CVE-2023-52845
|
| VCID-76tp-jbmj-x3g7 | kernel: drm/bridge: lt8912b: Fix crash on bridge detach |
CVE-2023-52856
|
| VCID-78gg-q9kj-ryfz | kernel: net: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs |
CVE-2023-52807
|
| VCID-7b8b-jzma-4qc2 | kernel: smb: client: fix potential OOBs in smb2_parse_contexts() |
CVE-2023-52434
|
| VCID-7uw4-3vse-jbhh | kernel: media: vidtv: mux: Add check and kfree for kstrdup |
CVE-2023-52841
|
| VCID-7ww9-pgk5-jkgc | kernel: tracing: Have trace_event_file have ref counters |
CVE-2023-52879
|
| VCID-8hk7-d87b-tbap | kernel: vhost-vdpa: fix use after free in vhost_vdpa_probe() |
CVE-2023-52795
|
| VCID-9165-q5n1-yycn | kernel: netfilter: allow exp not to be removed in nf_ct_find_expectation |
CVE-2023-52927
|
| VCID-94ee-mz63-dka6 | kernel: io_uring out of boundary memory access in __io_uaddr_map() |
CVE-2023-6560
|
| VCID-96jp-tz37-tqb8 | kernel: drm/radeon: possible buffer overflow |
CVE-2023-52867
|
| VCID-986a-ngub-8kbb | kernel: bpf: Detect IP == ksym.end as part of BPF program |
CVE-2023-52828
|
| VCID-992j-c9j4-d3g6 | kernel: wifi: ath11k: fix htt pktlog locking |
CVE-2023-52800
|
| VCID-9mw3-8asp-aqgt | kernel: jfs: fix array-index-out-of-bounds in diAlloc |
CVE-2023-52805
|
| VCID-9qgr-xw89-wubw | kernel: wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats() |
CVE-2023-52827
|
| VCID-9s2m-82wy-83gy | kernel: SUNRPC: Fix RPC client cleaned up the freed pipefs dentries |
CVE-2023-52803
|
| VCID-aah9-rk4q-f7fx | kernel: blk-mq: make sure active queue usage is held for bio_integrity_prep() |
CVE-2023-52787
|
| VCID-af81-k973-dkaw | kernel: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() |
CVE-2023-52809
|
| VCID-b1z5-24ah-6qex | kernel: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency |
CVE-2023-52855
|
| VCID-b5ve-8bn6-vbav | kernel: untrusted VMM can trigger int80 syscall handling |
CVE-2024-25744
|
| VCID-b6xc-vac6-abek | kernel: jfs: fix array-index-out-of-bounds in dbFindLeaf |
CVE-2023-52799
|
| VCID-b9er-rv98-ybhr | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga |
CVE-2023-52819
|
| VCID-bcsc-u5zp-ykhy | kernel: mptcp: deal with large GSO size |
CVE-2023-52778
|
| VCID-bdew-rk4n-wkcf | kernel: null pointer dereference vulnerability in nft_dynset_init() |
CVE-2023-6622
|
| VCID-bzuf-64aa-3bbz | kernel: usb: config: fix iteration issue in 'usb_get_bos_descriptor()' |
CVE-2023-52781
|
| VCID-c7vc-pecu-3bbc | kernel: media: imon: fix access to invalid resource for the second interface |
CVE-2023-52754
|
| VCID-ca74-h556-47ez | kernel: bonding: stop the device in bond_setup_by_slave() |
CVE-2023-52784
|
| VCID-cc2h-jtqq-dubj | kernel: ALSA: hda: Fix possible null-ptr-deref when assigning a stream |
CVE-2023-52806
|
| VCID-cny8-wsdw-rugb | kernel: mfd: qcom-spmi-pmic: Fix revid implementation |
CVE-2023-52765
|
| VCID-d3u4-qqwr-ckds | kernel: i915/perf: Fix NULL deref bugs with drm_dbg() calls |
CVE-2023-52788
|
| VCID-d7cf-hg44-bqet | kernel: usb: aqc111: check packet for fixup for true limit |
CVE-2023-52655
|
| VCID-de2d-89cc-j3af | kernel: drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process |
CVE-2023-52860
|
| VCID-deq9-vecn-53fz | kernel: tls: fix NULL deref on tls_sw_splice_eof() with empty record |
CVE-2023-52767
|
| VCID-der1-k2z8-g3b6 | kernel: io_uring: page use-after-free vulnerability via buffer ring mmap |
CVE-2024-0582
|
| VCID-drzg-bw2q-dqcr | kernel: btrfs: improper BUG() call after failure to insert delayed dir index item |
CVE-2023-52569
|
| VCID-fhk6-8pcn-qygx | kernel: llc: verify mac len before reading mac header |
CVE-2023-52843
|
| VCID-g19p-5a2y-gube | kernel: f2fs: avoid format-overflow warning |
CVE-2023-52748
|
| VCID-g439-5zjv-cfgk | kernel: scsi: ufs: core: Fix racing issue between ufshcd_mcq_abort() and ISR |
CVE-2023-52785
|
| VCID-gerx-6rwh-x7eu | kernel: af_unix: fix use-after-free in unix_stream_read_actor() |
CVE-2023-52772
|
| VCID-gkwu-5whz-gbgk | kernel: gfs2: Fix slab-use-after-free in gfs2_qd_dealloc |
CVE-2023-52760
|
| VCID-gx7t-6ysp-rkaf | kernel: Bluetooth: btusb: Add date->evt_skb is NULL check |
CVE-2023-52833
|
| VCID-h59v-ecf1-kkaf | kernel: clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data |
CVE-2023-52876
|
| VCID-h65a-jkh3-p3dw | kernel: media: aspeed: Fix memory overwrite if timing is 1600x900 |
CVE-2023-52916
|
| VCID-j6c2-ce4b-5yfz | kernel: fs/jfs: Add validity check for db_maxag and db_agpref |
CVE-2023-52804
|
| VCID-j7d3-nr6k-4qdy | kernel: io_uring/af_unix: disable sending io_uring over sockets |
CVE-2023-52654
|
| VCID-jv7p-7us4-mbb2 | kernel: wifi: ath11k: fix gtk offload status event locking |
CVE-2023-52777
|
| VCID-k247-ujwg-hudd | kernel: fs/jfs: Add check for negative db_l2nbperpage |
CVE-2023-52810
|
| VCID-kj2q-55y7-nbcp | kernel: i2c: core: Run atomic i2c xfer when !preemptible |
CVE-2023-52791
|
| VCID-m1k2-9pwk-93dp | kernel: clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data |
CVE-2023-52870
|
| VCID-m2zk-qg6b-6fah | security update |
CVE-2023-51782
|
| VCID-mhej-tyvj-3ugc | kernel: net: mvneta: fix calls to page_pool_get_stats |
CVE-2023-52780
|
| VCID-mnb2-x44z-cqhc | kernel: media: hantro: Check whether reset op is defined before use |
CVE-2023-52850
|
| VCID-mper-8skb-tkhm | kernel: perf: hisi: Fix use-after-free when register pmu fails |
CVE-2023-52859
|
| VCID-mpmx-b8cq-y7dy | kernel: IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF |
CVE-2023-52851
|
| VCID-mqkj-k2dy-z7an | kernel: drm/amdgpu: Fix potential null pointer derefernce |
CVE-2023-52814
|
| VCID-mtsm-xsy1-4yfq | kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() |
CVE-2023-52877
|
| VCID-myf8-auba-aqe1 | kernel: use-after-free in IPv4 IGMP |
CVE-2023-6932
|
| VCID-n1gf-bjes-8qdc | kernel: arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer |
CVE-2023-52750
|
| VCID-ngbt-6bks-mud2 | kernel: ext4: fix racy may inline data check in dio write |
CVE-2023-52786
|
| VCID-nsrt-a1vt-pufq | kernel: hsr: Prevent use after free in prp_create_tagged_frame() |
CVE-2023-52846
|
| VCID-ny28-cd4a-tbag | kernel: thermal: core: prevent potential string overflow |
CVE-2023-52868
|
| VCID-nys4-z6w6-9kep | kernel: spi: Fix null dereference on suspend |
CVE-2023-52749
|
| VCID-q5ae-fyj5-4yey | kernel: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() |
CVE-2023-52752
|
| VCID-qffg-mzdw-gqay | kernel: drm/amd/display: Avoid NULL dereference of timing generator |
CVE-2023-52753
|
| VCID-rbrm-7x37-3ugv | kernel: inactive elements in nft_pipapo_walk |
CVE-2023-6817
|
| VCID-rff4-nfty-17gy | kernel: wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps() |
CVE-2023-52829
|
| VCID-rghv-w4pk-87e4 | kernel: perf/core: Bail out early if the request AUX area is out of bound |
CVE-2023-52835
|
| VCID-rgjy-n8ag-9ud4 | kernel: cxl/mem: Fix shutdown order |
CVE-2023-52849
|
| VCID-rn8h-ew85-bfd2 | kernel: tty: n_gsm: fix race condition in status line change on dead connections |
CVE-2023-52872
|
| VCID-rqb6-eppt-wfd3 | kernel: padata: Fix refcnt handling in padata_free_shell() |
CVE-2023-52854
|
| VCID-s227-xsw7-7bay | kernel: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 |
CVE-2023-52818
|
| VCID-s3j4-cmd5-5yb4 | kernel: media: vidtv: psi: Add check for kstrdup |
CVE-2023-52844
|
| VCID-sa6p-njsz-rybs | kernel: s390/dasd: protect device queue against concurrent access |
CVE-2023-52774
|
| VCID-smhw-w2rj-x7fn | kernel: Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() |
CVE-2023-52840
|
| VCID-sygz-8vzx-kufr | kernel: fbdev: imsttfb: fix a resource leak in probe |
CVE-2023-52838
|
| VCID-szqf-djjp-w3h3 | kernel: drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference |
CVE-2023-52826
|
| VCID-tbq4-x3v2-27gw | kernel: drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer() |
CVE-2023-52773
|
| VCID-uakf-nme4-nufu | kernel: use-after-free in net/atm/ioctl.c |
CVE-2023-51780
|
| VCID-uwta-d7pe-8fe6 | kernel: smb: client: fix potential deadlock when releasing mids |
CVE-2023-52757
|
| VCID-uxvm-esag-1kgw | kernel: net/smc: avoid data corruption caused by decline |
CVE-2023-52775
|
| VCID-uy81-6u72-qkcc | kernel: pstore/platform: Add check for kstrdup |
CVE-2023-52869
|
| VCID-v17r-42dr-qybs | kernel: CIFS Filesystem Decryption Improper Input Validation Remote Code Execution Vulnerability in function receive_encrypted_standard of client |
CVE-2024-0565
|
| VCID-v6uh-rjgb-8ycg | kernel: locking/ww_mutex/test: Fix potential workqueue corruption |
CVE-2023-52836
|
| VCID-vzgs-pqs3-kkew | kernel: net/mlx5e: Track xmit submission to PTP WQ after populating metadata map |
CVE-2023-52782
|
| VCID-w1hf-g77f-aue1 | kernel: f2fs: fix to drop meta_inode's page cache in f2fs_put_super() |
CVE-2023-52848
|
| VCID-w99p-9ksx-kbef | kernel: platform/x86: wmi: Fix opening of char device |
CVE-2023-52864
|
| VCID-wats-qjm5-cub4 | kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET |
CVE-2023-52813
|
| VCID-wc2m-dsfh-qkaq | kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination |
CVE-2024-0646
|
| VCID-wc67-rnk8-dqgs | kernel: iommufd: Fix missing update of domains_itree after splitting iopt_area |
CVE-2023-52801
|
| VCID-wmdx-p5fr-yqe4 | kernel: Out of boundary write in perf_read_group() as result of overflow a perf_event's read_size |
CVE-2023-6931
|
| VCID-wy1z-syrf-affm | kernel: drm: bridge: it66121: Fix invalid connector dereference |
CVE-2023-52861
|
| VCID-xavd-11au-5kc6 | kernel: ksmbd: fix slab out of bounds write in smb_inherit_dacl() |
CVE-2023-52755
|
| VCID-y5g5-grqv-cbhv | kernel: NVMe: info leak due to out-of-bounds read in nvmet_ctrl_find_get |
CVE-2023-6121
|
| VCID-yqq8-ed4a-27bc | kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc |
CVE-2023-52880
|
| VCID-zayq-pb12-jkew | kernel: clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data |
CVE-2023-52865
|
| VCID-zccb-1kwm-efcn | kernel: wifi: ath11k: fix dfs radar event locking |
CVE-2023-52798
|
| VCID-zeyz-c89h-g7gc | kernel: media: bttv: fix use after free error due to btv->timeout timer |
CVE-2023-52847
|
| VCID-zpup-8k6s-6ua4 | kernel: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL |
CVE-2023-52817
|