Search for packages
| purl | pkg:deb/debian/linux@7.0.3-1 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-dq8r-defv-hbg6
Aliases: CVE-2023-6238 |
kernel: nvme: memory corruption via unprivileged user passthrough | There are no reported fixed by versions. |
|
VCID-n59e-jkf6-13bf
Aliases: CVE-2022-3238 |
kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously | There are no reported fixed by versions. |
|
VCID-p3vt-v7gj-gqbc
Aliases: CVE-2024-56709 |
kernel: io_uring: check if iowq is killed before queuing | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1apd-wwuv-cbem | kernel: smb: client: validate the whole DACL before rewriting it in cifsacl |
CVE-2026-31709
|
| VCID-23s6-fs1s-4kfb | kernel: ksmbd: validate response sizes in ipc_validate_msg() |
CVE-2026-31707
|
| VCID-359m-ajks-23ef | kernel: smb: server: fix active_num_conn leak on transport allocation failure |
CVE-2026-31711
|
| VCID-3apf-j1g4-vfbr |
CVE-2026-31688
|
|
| VCID-43df-n4rn-nua1 |
CVE-2026-31697
|
|
| VCID-49sp-s742-dbe6 | kernel: ksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger |
CVE-2026-31718
|
| VCID-4a7s-trcw-nube | kernel: fs/ntfs3: validate rec->used in journal-replay file record check |
CVE-2026-31716
|
| VCID-5t5f-4e1q-23bd |
CVE-2026-31699
|
|
| VCID-7m8f-1q1y-6uap |
CVE-2026-31702
|
|
| VCID-9x33-33np-c7bv | kernel: ksmbd: validate owner of durable handle on reconnect |
CVE-2026-31717
|
| VCID-9zzh-5tb2-m7aa |
CVE-2026-31715
|
|
| VCID-aaq7-t35x-t7gc |
CVE-2026-31700
|
|
| VCID-c5x4-1mbq-quch | kernel: ksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl() |
CVE-2026-31706
|
| VCID-dpjc-pacw-8bfq | kernel: ksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment |
CVE-2026-31705
|
| VCID-dq8r-defv-hbg6 | kernel: nvme: memory corruption via unprivileged user passthrough |
CVE-2023-6238
|
| VCID-f832-cd1v-x3dc | kernel: fuse: abort on fatal signal during sync init |
CVE-2026-31713
|
| VCID-hv1g-619g-4yhx |
CVE-2026-31698
|
|
| VCID-hxgq-6b1c-uff9 |
CVE-2026-31701
|
|
| VCID-n537-dmm4-7kas |
CVE-2026-31696
|
|
| VCID-n59e-jkf6-13bf | kernel: ntfs3 local privledge escalation if NTFS character set and remount and umount called simultaneously |
CVE-2022-3238
|
| VCID-naqw-tuak-xqgc | kernel: crypto: krb5enc - fix async decrypt skipping hash verification |
CVE-2026-31719
|
| VCID-p3vt-v7gj-gqbc | kernel: io_uring: check if iowq is killed before queuing |
CVE-2024-56709
|
| VCID-rfwn-gj6g-ubbs |
CVE-2026-31694
|
|
| VCID-tm5u-v65w-8uep |
CVE-2026-31708
|
|
| VCID-wnxx-8abs-5ucw | kernel: writeback: Fix use after free in inode_switch_wbs_work_fn() |
CVE-2026-31703
|
| VCID-x7bw-5cam-kubb | kernel: ksmbd: use check_add_overflow() to prevent u16 DACL size overflow |
CVE-2026-31704
|
| VCID-xfew-wxwz-yka3 | Linux kernel double free in Xen privcmd driver |
CVE-2026-31787
XSA-487 |
| VCID-y28b-ghum-ykek | kernel: f2fs: fix to avoid memory leak in f2fs_rename() |
CVE-2026-31714
|
| VCID-y5aq-zmbx-suft | kernel: ksmbd: require minimum ACE size in smb_check_perm_dacl() |
CVE-2026-31712
|
| VCID-zasa-vpjy-nyhm | Linux kernel out of bounds read via Xen-related sysfs file |
CVE-2026-31786
XSA-485 |