| linux-headers |
core.v0.13.0
|
Linux
|
Unknown
|
CVE-2023-52737
- btrfs: lock the inode in shared mode before starting fiemap
|
5/21/2024 |
| linux-headers |
core.v0.12.4
|
Linux
|
Unknown
|
CVE-2023-52737
- btrfs: lock the inode in shared mode before starting fiemap
|
5/21/2024 |
| linux-headers |
core.v0.12.4
|
Linux
|
Unknown
|
CVE-2023-52736
- ALSA: hda: Do not unset preset when cleaning up codec
|
5/21/2024 |
| linux-headers |
core.v0.13.0
|
Linux
|
Unknown
|
CVE-2023-52736
- ALSA: hda: Do not unset preset when cleaning up codec
|
5/21/2024 |
| linux-headers |
core.v0.12.2
|
Linux
|
Unknown
|
CVE-2023-52736
- ALSA: hda: Do not unset preset when cleaning up codec
|
5/21/2024 |
| linux-headers |
core.v0.14.0
|
Linux
|
Unknown
|
CVE-2023-52736
- ALSA: hda: Do not unset preset when cleaning up codec
|
5/21/2024 |
| linux-headers |
core.v0.14.1
|
Linux
|
Unknown
|
CVE-2023-52736
- ALSA: hda: Do not unset preset when cleaning up codec
|
5/21/2024 |
| linux-headers |
core.v0.12.3
|
Linux
|
Unknown
|
CVE-2023-52736
- ALSA: hda: Do not unset preset when cleaning up codec
|
5/21/2024 |
| linux-headers |
core.v0.12.3
|
Linux
|
Critical
|
CVE-2023-52735
- bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
|
5/21/2024 |
| linux-headers |
core.v0.13.0
|
Linux
|
Critical
|
CVE-2023-52735
- bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
|
5/21/2024 |
| linux-headers |
core.v0.12.2
|
Linux
|
Critical
|
CVE-2023-52735
- bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
|
5/21/2024 |
| linux-headers |
core.v0.12.4
|
Linux
|
Critical
|
CVE-2023-52735
- bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
|
5/21/2024 |
| linux-headers |
core.v0.14.1
|
Linux
|
Critical
|
CVE-2023-52735
- bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
|
5/21/2024 |
| linux-headers |
core.v0.14.0
|
Linux
|
Critical
|
CVE-2023-52735
- bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
|
5/21/2024 |
| linux-headers |
core.v0.14.1
|
Linux
|
Unknown
|
CVE-2023-52732
- ceph: blocklist the kclient when receiving corrupted snap trace
|
5/21/2024 |
| linux-headers |
core.v0.12.4
|
Linux
|
Unknown
|
CVE-2023-52732
- ceph: blocklist the kclient when receiving corrupted snap trace
|
5/21/2024 |
| linux-headers |
core.v0.12.2
|
Linux
|
Unknown
|
CVE-2023-52732
- ceph: blocklist the kclient when receiving corrupted snap trace
|
5/21/2024 |
| linux-headers |
core.v0.13.0
|
Linux
|
Unknown
|
CVE-2023-52732
- ceph: blocklist the kclient when receiving corrupted snap trace
|
5/21/2024 |
| linux-headers |
core.v0.14.0
|
Linux
|
Unknown
|
CVE-2023-52732
- ceph: blocklist the kclient when receiving corrupted snap trace
|
5/21/2024 |
| linux-headers |
core.v0.12.3
|
Linux
|
Unknown
|
CVE-2023-52732
- ceph: blocklist the kclient when receiving corrupted snap trace
|
5/21/2024 |