Search for packages
| purl | pkg:deb/debian/linux@5.10.234-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-13b9-m28b-hfb9 | kernel: bpf: Check validity of link->type in bpf_link_show_fdinfo() |
CVE-2024-53099
|
| VCID-13ha-2ceu-hyhs | kernel: net: phy: dp83869: fix memory corruption when enabling fiber |
CVE-2024-50188
|
| VCID-15du-xfr9-qbft | kernel: selinux: ignore unknown extended permissions |
CVE-2024-57931
|
| VCID-16g4-1euq-g7g8 | kernel: kcsan: Turn report_filterlist_lock into a raw_spinlock |
CVE-2024-56610
|
| VCID-19rb-87p4-hybx | kernel: nilfs2: fix potential oob read in nilfs_btree_check_delete() |
CVE-2024-47757
|
| VCID-1agu-skkf-fqf7 | kernel: mtd: rawnand: fix double free in atmel_pmecc_create_user() |
CVE-2024-56766
|
| VCID-1aq7-pxcr-tqgj | kernel: af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK |
CVE-2024-57901
|
| VCID-1fkb-y8ad-vqec | kernel: tcp: fix mptcp DSS corruption due to large pmtu xmit |
CVE-2024-50083
|
| VCID-1kfb-qzjj-6fc8 | kernel: net: arc: fix the device for dma_map_single/dma_unmap_single |
CVE-2024-50295
|
| VCID-1kfs-hhte-wka8 | kernel: leds: class: Protect brightness_show() with led_cdev->led_access mutex |
CVE-2024-56587
|
| VCID-1nn1-pqbm-rkep | kernel: scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() |
CVE-2024-56748
|
| VCID-1nqk-1gvy-rkf7 | kernel: inet: inet_defrag: prevent sk release while still in use |
CVE-2024-26921
|
| VCID-1qk3-mmau-z7bz | kernel: cifs: Fix buffer overflow when parsing NFS reparse points |
CVE-2024-49996
|
| VCID-1r9m-mwej-xyhb | kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump |
CVE-2024-27017
|
| VCID-1tap-mh5d-3ybj | kernel: ALSA: usx2y: Use snd_card_free_when_closed() at disconnection |
CVE-2024-56533
|
| VCID-1z5b-831k-c7aq | kernel: block: fix potential invalid pointer dereference in blk_add_partition |
CVE-2024-47705
|
| VCID-229w-jxk9-ykc1 | kernel: ad7780: fix division by zero in ad7780_write_raw() |
CVE-2024-56567
|
| VCID-23xy-za5d-zqf7 | kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset |
CVE-2024-50142
|
| VCID-2b83-3dx3-qydv | kernel: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() |
CVE-2024-40953
|
| VCID-2bvr-9es2-87dt | kernel: drm/amd/display: Fix index out of bounds in degamma hardware format translation |
CVE-2024-49894
|
| VCID-2d7w-2f5y-qfdz | kernel: exec: don't WARN for racy path_noexec check |
CVE-2024-50010
|
| VCID-2mam-3mfn-cfg8 | kernel: RDMA/hns: Fix deadlock on SRQ async events. |
CVE-2024-38591
|
| VCID-2nqc-u3ug-1fhg | kernel: ocfs2: uncache inode which has failed entering the group |
CVE-2024-53112
|
| VCID-2s5m-15wa-93d3 | kernel: USB: serial: io_edgeport: fix use after free in debug printk |
CVE-2024-50267
|
| VCID-2wa6-shcj-k3ff | kernel: netdevsim: prevent bad user input in nsim_dev_health_break_write() |
CVE-2024-56716
|
| VCID-2yy2-gjs9-8uc6 | kernel: mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() |
CVE-2024-57884
|
| VCID-37dd-benh-dbdr | kernel: tpm: Clean up TPM space after command failure |
CVE-2024-49851
|
| VCID-3aek-a993-fyfj | kernel: exfat: fix the infinite loop in exfat_readdir() |
CVE-2024-57940
|
| VCID-3cah-1nkn-5uga | kernel: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT |
CVE-2024-53057
|
| VCID-3dw8-cjmf-2fdp | kernel: PCI: keystone: Fix if-statement expression in ks_pcie_quirk() |
CVE-2024-47756
|
| VCID-3fny-8r4k-buag | kernel: x86/bugs: Use code segment selector for VERW operand |
CVE-2024-50072
|
| VCID-44cz-8ud6-xubv | kernel: crypto: caam - Fix the pointer passed to caam_qi_shutdown() |
CVE-2024-56754
|
| VCID-49be-qf7v-jbhr | kernel: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower |
CVE-2024-50237
|
| VCID-49de-qwxr-wygg | kernel: media: atomisp: Add check for rgby_data memory allocation failure |
CVE-2024-56705
|
| VCID-4hgp-r6cs-ayh2 | kernel: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() |
CVE-2024-56539
|
| VCID-4jk2-7scp-7qf4 | kernel: vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() |
CVE-2024-49863
|
| VCID-4k1h-9cye-kyfu | kernel: io_uring: fix possible deadlock in io_register_iowq_max_workers() |
CVE-2024-41080
|
| VCID-4qse-5w1w-sqec | kernel: bpf, sockmap: Several fixes to bpf_msg_pop_data |
CVE-2024-56720
|
| VCID-4xbz-d89x-hucp | kernel: net/xen-netback: prevent UAF in xenvif_flush_hash() |
CVE-2024-49936
|
| VCID-5127-fgwu-27a3 | kernel: ALSA: us122l: Use snd_card_free_when_closed() at disconnection |
CVE-2024-56532
|
| VCID-5fqv-jv6t-xbfb | kernel: ext4: aovid use-after-free in ext4_ext_insert_extent() |
CVE-2024-49883
|
| VCID-5u9j-rp2j-queg | kernel: net/mlx5: fs, lock FTE when checking if active |
CVE-2024-53121
|
| VCID-5wdk-mrty-jbc2 | kernel: jfs: fix array-index-out-of-bounds in jfs_readdir |
CVE-2024-56596
|
| VCID-5xru-w7m9-6ydz | kernel: iio: adc: at91: call input_free_device() on allocated iio_dev |
CVE-2024-57904
|
| VCID-5ynw-da7q-d7fq | kernel: wifi: mac80211: fix potential key use-after-free |
CVE-2023-52530
|
| VCID-63hp-7jta-2kaq | kernel: bpf: Fix bpf_sk_select_reuseport() memory leak |
CVE-2025-21683
|
| VCID-64aj-2prh-vbc3 | kernel: hrtimers: Handle CPU state correctly on hotplug |
CVE-2024-57951
|
| VCID-661m-4ype-83g4 | kernel: powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore |
CVE-2024-56701
|
| VCID-67yy-vay5-jfh1 | kernel: netfilter: ipset: Hold module reference while requesting a module |
CVE-2024-56637
|
| VCID-687u-nzmt-n7a6 | kernel: ila: serialize calls to nf_register_net_hooks() |
CVE-2024-57900
|
| VCID-68wx-sjuq-gbc1 | kernel: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion |
CVE-2024-49868
|
| VCID-6bwt-an4d-23d8 | kernel: serial: protect uart_port_dtr_rts() in uart_shutdown() too |
CVE-2024-50058
|
| VCID-6eg2-p26n-gya5 | kernel: ALSA: 6fire: Release resources at card release |
CVE-2024-53239
|
| VCID-6f63-djtc-pkcm | kernel: mm: krealloc: Fix MTE false alarm in __do_krealloc |
CVE-2024-53097
|
| VCID-6q4x-x6z9-mugs | kernel: ocfs2: remove unreasonable unlock in ocfs2_read_blocks |
CVE-2024-49965
|
| VCID-6trw-82f1-13ar | kernel: jfs: check if leafidx greater than num leaves per dmap tree |
CVE-2024-49902
|
| VCID-6x7e-pew4-jkha | kernel: uprobes: fix kernel info leak via "[uprobes]" vma |
CVE-2024-49975
|
| VCID-6xdf-maze-17de | kernel: dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset |
CVE-2024-56767
|
| VCID-719s-u3xc-gyas | kernel: media: dvbdev: prevent the risk of out of memory access |
CVE-2024-53063
|
| VCID-7319-t2pc-ufe9 | kernel: ftrace: Fix regression with module command in stack_trace_filter |
CVE-2024-56569
|
| VCID-77wj-cztw-uqhf | kernel: scsi: megaraid_sas: Fix for a potential deadlock |
CVE-2024-57807
|
| VCID-78ud-gtge-37h8 | kernel: firmware_loader: Block path traversal |
CVE-2024-47742
|
| VCID-7a5q-hn39-8kft | kernel: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition |
CVE-2024-50059
|
| VCID-7bsu-23dg-qkaf | kernel: ocfs2: cancel dqi_sync_work before freeing oinfo |
CVE-2024-49966
|
| VCID-7dfn-9f3w-5qej | kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() |
CVE-2024-53042
|
| VCID-7etb-wzrv-17ck | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format |
CVE-2024-53104
|
| VCID-7gwx-sepa-nfh4 | kernel: af_packet: avoid erroring out after sock_init_data() in packet_create() |
CVE-2024-56606
|
| VCID-7h9m-8ra3-33ff | kernel: quota: flush quota_release_work upon quota writeback |
CVE-2024-56780
|
| VCID-7mrh-h913-hyc3 | kernel: ACPI: sysfs: validate return type of _STR method |
CVE-2024-49860
|
| VCID-7qqu-u862-47ay | kernel: um: ubd: Do not use drvdata in release |
CVE-2024-53184
|
| VCID-7s2j-fww7-qqd1 | kernel: net: sched: fix ordering of qlen adjustment |
CVE-2024-53164
|
| VCID-7snz-vnyt-b7fb | kernel: ext4: avoid OOB when system.data xattr changes underneath the filesystem |
CVE-2024-47701
|
| VCID-7thv-6jna-gkd1 | kernel: drm/amd/display: Check stream before comparing them |
CVE-2024-49896
|
| VCID-7v4d-mrh9-hfah | kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() |
CVE-2024-50304
|
| VCID-82hh-jcu4-7uf7 | kernel: ovl: Filter invalid inodes with missing lookup function |
CVE-2024-56570
|
| VCID-82mh-nwfw-hqh9 | kernel: media: venus: fix use after free bug in venus_remove due to race condition |
CVE-2024-49981
|
| VCID-87qv-cyxq-nqdj | kernel: drm/radeon: Fix encoder->possible_clones |
CVE-2024-50201
|
| VCID-886c-effz-qfcu | kernel: iio: pressure: zpa2326: fix information leak in triggered buffer |
CVE-2024-57912
|
| VCID-8aav-ad55-g3hq | kernel: net/mlx5e: kTLS, Fix incorrect page refcounting |
CVE-2024-53138
|
| VCID-8dv1-u3pc-d7c9 | kernel: vfio/pci: Properly hide first-in-list PCIe extended capability |
CVE-2024-53214
|
| VCID-8qva-q75v-y3b1 | kernel: fou: fix initialization of grc |
CVE-2024-46865
|
| VCID-8rfn-njaa-mkfh | kernel: firmware: arm_scpi: Check the DVFS OPP count returned by the firmware |
CVE-2024-53157
|
| VCID-8sb2-qck7-ryet | kernel: vfs: fix race between evice_inodes() and find_inode()&iput() |
CVE-2024-47679
|
| VCID-8x5z-wwqe-k3dk | kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans |
CVE-2024-50264
|
| VCID-8zpp-76tm-m3ce | kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices |
CVE-2024-53197
|
| VCID-9a71-kyv3-kudp | kernel: resource: fix region_intersects() vs add_memory_driver_managed() |
CVE-2024-49878
|
| VCID-9ewq-11eq-z7ch | kernel: mailbox: bcm2835: Fix timeout during suspend mode |
CVE-2024-49963
|
| VCID-9fue-e3c2-x7e8 | kernel: dccp: Fix memory leak in dccp_feat_change_recv |
CVE-2024-56643
|
| VCID-9gv8-4nrt-xken | kernel: NFSv4.0: Fix a use-after-free problem in the asynchronous open() |
CVE-2024-53173
|
| VCID-9jq4-guvw-nqad | kernel: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device |
CVE-2024-56724
|
| VCID-9map-hxxc-r7hb | kernel: wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param |
CVE-2024-47712
|
| VCID-9pm2-v7hx-5uaq | kernel: initramfs: avoid filename buffer overrun |
CVE-2024-53142
|
| VCID-9qph-2r34-dyeb | kernel: btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount |
CVE-2024-57896
|
| VCID-9s2u-2765-2ua4 | kernel: net: lapb: increase LAPB_HEADER_LEN |
CVE-2024-56659
|
| VCID-9t4w-7npg-8kbt | kernel: sock_map: Add a cond_resched() in sock_hash_free() |
CVE-2024-47710
|
| VCID-9wdj-482w-9kfq | kernel: ext4: dax: fix overflowing extents beyond inode size when partially writing |
CVE-2024-50015
|
| VCID-9wrj-4ar3-6qh7 | kernel: iio: adc: rockchip_saradc: fix information leak in triggered buffer |
CVE-2024-57907
|
| VCID-a1tm-fg3e-hkct | kernel: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream |
CVE-2024-49913
|
| VCID-a36g-8fby-2kht | kernel: nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() |
CVE-2024-47699
|
| VCID-a4cg-mjqd-qqcs | kernel: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() |
CVE-2025-21689
|
| VCID-a918-dphu-abaq | kernel: ocfs2: fix uninitialized value in ocfs2_file_read_iter() |
CVE-2024-53155
|
| VCID-ab16-n34c-eqb7 | kernel: mm: revert "mm: shmem: fix data-race in shmem_getattr()" |
CVE-2024-53136
|
| VCID-abnb-231x-mugh | kernel: jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree |
CVE-2024-56595
|
| VCID-adwd-98zy-qqf7 | kernel: gpio: prevent potential speculation leaks in gpio_device_get_desc() |
CVE-2024-44931
|
| VCID-aepw-c8cg-y7bj | kernel: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() |
CVE-2024-47685
|
| VCID-ah5f-a8ty-rfak | kernel: RDMA/mad: Improve handling of timed out WRs of mad agent |
CVE-2024-50095
|
| VCID-ak7d-8cgy-ckh2 | kernel: jfs: fix out-of-bounds in dbNextAG() and diAlloc() |
CVE-2024-47723
|
| VCID-ann8-xtng-bucz | kernel: net: sched: fix use-after-free in taprio_change() |
CVE-2024-50127
|
| VCID-aq43-mrqu-nqdb | kernel: NFSD: Limit the number of concurrent async COPY operations |
CVE-2024-49974
|
| VCID-aqzf-3kmq-zbe6 | kernel: media: i2c: tc358743: Fix crash in the probe error path when using polling |
CVE-2024-56576
|
| VCID-avpg-jad9-7uhy | kernel: netfilter: conntrack: clamp maximum hashtable size to INT_MAX |
CVE-2025-21648
|
| VCID-ayd4-2n7n-kkcc | kernel: ceph: give up on paths longer than PATH_MAX |
CVE-2024-53685
|
| VCID-b2jn-5mkh-eyfy | kernel: media: ts2020: fix null-ptr-deref in ts2020_probe() |
CVE-2024-56574
|
| VCID-b4jp-8epx-sycm | kernel: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). |
CVE-2025-21865
|
| VCID-b5nq-jbbw-8kfe | kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) |
CVE-2024-39497
|
| VCID-bbdg-m16m-nubu | kernel: dm array: fix releasing a faulty array block twice in dm_array_cursor_end |
CVE-2024-57929
|
| VCID-bbnt-p8e4-63c7 | kernel: drm/v3d: Ensure job pointer is set to NULL after job completion |
CVE-2025-21697
|
| VCID-bc95-1a99-yyfg | kernel: tracing: Consider the NULL character when validating the event length |
CVE-2024-50131
|
| VCID-bds8-9r5f-77f1 | kernel: netfilter: ipset: add missing range check in bitmap_ip_uadt |
CVE-2024-53141
|
| VCID-behb-uty6-5fge | kernel: btrfs: fix use-after-free when COWing tree bock and tracing is enabled |
CVE-2024-56759
|
| VCID-besd-5py2-47g2 | kernel: padata: use integer wrap around to prevent deadlock on seq_nr overflow |
CVE-2024-47739
|
| VCID-bjwg-thks-73ab | kernel: wifi: ath11k: fix array out-of-bound access in SoC stats |
CVE-2024-49930
|
| VCID-bnb1-c293-gybq | kernel: nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur |
CVE-2024-56779
|
| VCID-brga-v3np-afb1 | kernel: net/ipv6: release expired exception dst cached in socket |
CVE-2024-56644
|
| VCID-bs5f-j2kr-93hq | kernel: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error |
CVE-2024-49959
|
| VCID-buv7-m3ks-fqfq | kernel: wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() |
CVE-2024-53156
|
| VCID-bux2-amqe-vqc9 | kernel: posix-clock: Fix missing timespec64 check in pc_clock_settime() |
CVE-2024-50195
|
| VCID-c4t9-wwnu-r7fv | kernel: virtio-blk: don't keep queue frozen during system suspend |
CVE-2024-57946
|
| VCID-c5x3-74ek-uyfa | kernel: i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume |
CVE-2024-49985
|
| VCID-c8nj-6r7j-cbdz | kernel: nfs: Fix KMSAN warning in decode_getfattr_attrs() |
CVE-2024-53066
|
| VCID-ccz1-rthk-7kf2 | kernel: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device |
CVE-2024-56691
|
| VCID-cd13-6z54-5kev | kernel: virtio/vsock: Fix accept_queue memory leak |
CVE-2024-53119
|
| VCID-cd2x-nzpw-1yee | kernel: blk_iocost: fix more out of bound shifts |
CVE-2024-49933
|
| VCID-cd8c-vv2j-r3hw | kernel: can: bcm: Clear bo->bcm_proc_read after remove_proc_entry(). |
CVE-2024-47709
|
| VCID-cfpc-ekdt-sydy | kernel: f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode. |
CVE-2024-56586
|
| VCID-cfr1-1u57-d7b5 | kernel: ext4: update orig_path in ext4_find_extent() |
CVE-2024-49881
|
| VCID-cft7-4ymq-gfaw | kernel: drm/dp_mst: Fix MST sideband message body length check |
CVE-2024-56616
|
| VCID-cgqq-rjgb-2ybc | kernel: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow |
CVE-2024-50218
|
| VCID-cp6q-3tf3-uygg | kernel: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl |
CVE-2024-56662
|
| VCID-cr57-qne6-eygu | kernel: net: inet6: do not leave a dangling sk pointer in inet6_create() |
CVE-2024-56600
|
| VCID-cup4-9b5r-eqd2 | kernel: SUNRPC: make sure cache entry active before cache_show |
CVE-2024-53174
|
| VCID-cyr4-fdka-abcd | kernel: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error |
CVE-2024-47697
|
| VCID-d1k1-2urz-h7bq | kernel: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() |
CVE-2024-49962
|
| VCID-d1x4-dmpq-qfct | kernel: ext4: fix slab-use-after-free in ext4_split_extent_at() |
CVE-2024-49884
|
| VCID-d313-d7rr-1ufq | kernel: media: v4l2-tpg: prevent the risk of a division by zero |
CVE-2024-50287
|
| VCID-d5e3-6wky-a7cp | kernel: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() |
CVE-2024-47707
|
| VCID-d693-z5hn-8uha | kernel: ext4: fix i_data_sem unlock order in ext4_ind_migrate() |
CVE-2024-50006
|
| VCID-d9hm-npfq-e7c1 | kernel: irqchip/gic-v4: Don't allow a VMOVP on a dying VPE |
CVE-2024-50192
|
| VCID-dbkn-c3ea-eqgy | kernel: scsi: bfa: Fix use-after-free in bfad_im_module_exit() |
CVE-2024-53227
|
| VCID-dhdb-gj1j-9ufk | kernel: btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() |
CVE-2024-46841
|
| VCID-djgy-muty-mygk | kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify |
CVE-2024-36899
|
| VCID-dn8w-3zue-h3e8 | kernel: igb: Fix potential invalid memory access in igb_init_module() |
CVE-2024-52332
|
| VCID-dpc2-pmux-mqhm | kernel: ceph: remove the incorrect Fw reference check when dirtying pages |
CVE-2024-50179
|
| VCID-dpz3-aj6c-97de | kernel: tipc: fix NULL deref in cleanup_bearer() |
CVE-2024-56661
|
| VCID-dq4x-ybg5-53fh | kernel: net: fix data-races around sk->sk_forward_alloc |
CVE-2024-53124
|
| VCID-ds8k-thmg-73at | kernel: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg |
CVE-2024-56633
|
| VCID-e5pz-yun5-nuex | kernel: ocfs2: free inode when ocfs2_get_init_inode() fails |
CVE-2024-56630
|
| VCID-e6c8-xx93-vbcx | kernel: mptcp: pm: Fix uaf in __timer_delete_sync |
CVE-2024-46858
|
| VCID-ece9-tmr9-47fa | kernel: wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw() |
CVE-2024-56593
|
| VCID-eehz-unnq-pbbd | kernel: media: wl128x: Fix atomicity violation in fmc_send_cmd() |
CVE-2024-56700
|
| VCID-efch-ennc-nqaw | kernel: Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet |
CVE-2024-55916
|
| VCID-eg4s-vt9f-x3at | kernel: fou: remove warn in gue_gro_receive on unsupported protocol |
CVE-2024-44940
|
| VCID-ehs3-hezj-7yfe | kernel: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() |
CVE-2024-53680
|
| VCID-ekaw-n5ug-4qgq | kernel: net: hsr: avoid potential out-of-bound access in fill_frame_info() |
CVE-2024-56648
|
| VCID-em85-tye9-8bcu | kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages |
CVE-2024-50208
|
| VCID-eseh-574w-q7gs | kernel: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() |
CVE-2025-21703
|
| VCID-esv2-psjw-8yfs | kernel: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit |
CVE-2024-49938
|
| VCID-evh2-ynnc-1fde | kernel: RDMA/bnxt_re: Add a check for memory allocation |
CVE-2024-50209
|
| VCID-ewd1-fsya-37ba | kernel: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices |
CVE-2024-56723
|
| VCID-f1qx-m6tb-u7d2 | kernel: btrfs: reinitialize delayed ref list after deleting it from the list |
CVE-2024-50273
|
| VCID-f322-swjz-4yhb | kernel: net: systemport: fix potential memory leak in bcm_sysport_xmit() |
CVE-2024-50171
|
| VCID-f6eb-asqa-5bg9 | kernel: um: vector: Do not use drvdata in release |
CVE-2024-53181
|
| VCID-f7nv-pzr1-r3e7 | kernel: net: dpaa: Pad packets to ETH_ZLEN |
CVE-2024-46854
|
| VCID-f8r8-spm9-fyhh | kernel: ocfs2: fix null-ptr-deref when journal load failed. |
CVE-2024-49957
|
| VCID-fbzf-k9uu-skct | kernel: netlink: terminate outstanding dump on socket close |
CVE-2024-53140
|
| VCID-fds5-x8be-47fj | kernel: net: do not delay dst_entries_add() in dst_release() |
CVE-2024-50036
|
| VCID-femt-rtxa-e7e3 | kernel: dm thin: make get_first_thin use rcu-safe list first function |
CVE-2025-21664
|
| VCID-ffag-yek5-sqb1 | kernel: RDMA/cxgb4: Added NULL check for lookup_atid |
CVE-2024-47749
|
| VCID-fjgq-ezdj-uyf4 | kernel: tracing: Prevent bad count for tracing_cpumask_write |
CVE-2024-56763
|
| VCID-fm5n-9nsj-s3at | kernel: USB: usbtmc: prevent kernel-usb-infoleak |
CVE-2024-47671
|
| VCID-fs84-tck8-jyes | kernel: scsi: target: core: Fix null-ptr-deref in target_alloc_device() |
CVE-2024-50153
|
| VCID-ftyf-gp3c-gyeg | kernel: soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get() |
CVE-2024-53158
|
| VCID-g6fv-3mkq-23dw | kernel: ALSA: caiaq: Use snd_card_free_when_closed() at disconnection |
CVE-2024-56531
|
| VCID-g8uj-2fkk-5ud6 | kernel: jfs: Fix uninit-value access of new_ea in ea_buffer |
CVE-2024-49900
|
| VCID-gb9d-fjxt-z7ht | kernel: fs/proc: fix softlockup in __read_vmcore (part 2) |
CVE-2025-21694
|
| VCID-ggdk-nz4f-5bdu | kernel: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg |
CVE-2024-49571
|
| VCID-gp1q-342y-rkcy | kernel: comedi: Flush partial mappings in error case |
CVE-2024-53148
|
| VCID-gphn-mhbb-4qda | kernel: net/sctp: Prevent autoclose integer overflow in sctp_association_init() |
CVE-2024-57938
|
| VCID-gqe8-fs68-9ygb | kernel: drm/v3d: Assign job pointer to NULL before signaling the fence |
CVE-2025-21688
|
| VCID-gtbs-gkax-a3ag | kernel: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write |
CVE-2024-53052
|
| VCID-gvhj-cd4t-a3f9 | kernel: ubi: fastmap: Fix duplicate slab cache names while attaching |
CVE-2024-53172
|
| VCID-gxz7-ye9d-3kaj | kernel: scsi: qla2xxx: Fix use after free on unload |
CVE-2024-56623
|
| VCID-h1e4-mhtd-wfbh | kernel: exfat: fix memory leak in exfat_load_bitmap() |
CVE-2024-50013
|
| VCID-h4x3-q7ew-8qhk | kernel: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race |
CVE-2024-50082
|
| VCID-hb7v-bs3k-pfb7 | kernel: i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() |
CVE-2024-56562
|
| VCID-hbnp-3rst-9qbs | kernel: xen: Fix the issue of resource not being properly released in xenbus_dev_probe() |
CVE-2024-53198
|
| VCID-hc84-6ccr-dqbg | kernel: media: s5p-jpeg: prevent buffer overflows |
CVE-2024-53061
|
| VCID-hdu5-88qd-r7h7 | kernel: ALSA: usb-audio: Fix out of bounds reads when finding clock sources |
CVE-2024-53150
|
| VCID-hgpz-fqkr-x3ag | kernel: vt: prevent kernel-infoleak in con_font_get() |
CVE-2024-50076
|
| VCID-hjfx-vv5v-ykgu | kernel: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer |
CVE-2024-57911
|
| VCID-hm3d-5ktm-6bd1 | kernel: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory |
CVE-2024-50115
|
| VCID-hn73-fnds-xugf | kernel: nilfs2: prevent use of deleted inode |
CVE-2024-53690
|
| VCID-hnjx-xyr7-n3ak | kernel: dma-debug: fix a possible deadlock on radix_lock |
CVE-2024-47143
|
| VCID-hnrs-f1mv-akb4 | kernel: drm/amd/display: Check null pointers before using dc->clk_mgr |
CVE-2024-49907
|
| VCID-hq7x-1csm-p3bv | kernel: driver core: bus: Fix double free in driver API bus_register() |
CVE-2024-50055
|
| VCID-hrfs-afba-23d3 | kernel: afs: Fix the maximum cell name length |
CVE-2025-21646
|
| VCID-hs28-3xmc-z7gj | kernel: block, bfq: fix possible UAF for bfqq->bic with merge chain |
CVE-2024-47706
|
| VCID-ht91-mhhg-63e1 | kernel: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv |
CVE-2024-57892
|
| VCID-hybu-7279-dqg8 | Backend can crash Linux netfront |
CVE-2024-53240
|
| VCID-j12u-u3h9-7kay | kernel: dm cache: fix out-of-bounds access to the dirty bitset when resizing |
CVE-2024-50279
|
| VCID-j76y-m4es-4yej | kernel: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change |
CVE-2024-50044
|
| VCID-jb7c-wux6-jkfh | kernel: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free |
CVE-2024-49983
|
| VCID-jbcp-t4z6-huep | kernel: HID: core: zero-initialize the report buffer |
CVE-2024-50302
|
| VCID-jbk8-b5z4-kuhq | kernel: r8169: add tally counter fields added with RTL8125 |
CVE-2024-49973
|
| VCID-jhvu-tacv-vugb | kernel: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation |
CVE-2024-49895
|
| VCID-jj1e-5cxb-qffe | kernel: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" |
CVE-2024-53127
|
| VCID-jnsp-4jt9-aqas | kernel: dm cache: fix potential out-of-bounds access on the first resume |
CVE-2024-50278
|
| VCID-jnyg-gn1n-u3fy | kernel: jfs: array-index-out-of-bounds fix in dtReadFirst |
CVE-2024-56598
|
| VCID-jta8-3kg4-8yce | kernel: mac802154: check local interfaces before deleting sdata list |
CVE-2024-57948
|
| VCID-kaa6-ay3m-aydg | kernel: scsi: hisi_sas: Add cond_resched() for no forced preemption model |
CVE-2024-56589
|
| VCID-kh7e-94ey-c7bm | kernel: net: af_can: do not leave a dangling sk pointer in can_create() |
CVE-2024-56603
|
| VCID-khxv-7jjh-8ua6 | kernel: parport: Proper fix for array out-of-bounds access |
CVE-2024-50074
|
| VCID-kj93-nwk2-sbd9 | kernel: nilfs2: propagate directory read errors from nilfs_find_entry() |
CVE-2024-50202
|
| VCID-kk6m-vhxv-y3fw | kernel: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() |
CVE-2024-50046
|
| VCID-kmmf-ztaw-bkay | kernel: sctp: sysctl: rto_min/max: avoid using current->nsproxy |
CVE-2025-21639
|
| VCID-kpa1-ugme-37g7 | kernel: nfsd: make sure exp active before svc_export_show |
CVE-2024-56558
|
| VCID-kukb-wvwk-h7ab | kernel: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() |
CVE-2024-47713
|
| VCID-kvhw-dg66-8kh1 | kernel: bpf: fix recursive lock when verdict program return SK_PASS |
CVE-2024-56694
|
| VCID-kw45-zrzn-d7bd | kernel: ALSA: asihpi: Fix potential OOB array access |
CVE-2024-50007
|
| VCID-kwrf-5vwg-f3am | kernel: exfat: fix potential deadlock on __exfat_get_dentry_set |
CVE-2024-42315
|
| VCID-kx41-d7dc-vqdk | kernel: Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc |
CVE-2024-58009
|
| VCID-m2f8-snwn-ekfj | kernel: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). |
CVE-2024-56642
|
| VCID-m2rw-a6jq-cubv | kernel: RDMA/rtrs: Ensure 'ib_sge list' is accessible |
CVE-2024-36476
|
| VCID-mew4-u7k6-r3ds | kernel: drm/amd: Guard against bad data for ATIF ACPI method |
CVE-2024-50117
|
| VCID-mhh3-rkn6-wbaf | kernel: mm/swapfile: skip HugeTLB pages for unuse_vma |
CVE-2024-50199
|
| VCID-mjm9-b4xc-h3fj | kernel: 9p/xen: fix release of IRQ |
CVE-2024-56704
|
| VCID-mnrs-3agf-kbbr | kernel: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind |
CVE-2024-57913
|
| VCID-mpr2-avzs-zuhg | Xen hypercall page unsafe against speculative attacks |
CVE-2024-53241
|
| VCID-muwb-5r4x-aqch | kernel: PCI: Fix use-after-free of slot->bus on hot remove |
CVE-2024-53194
|
| VCID-mw1y-1bts-myc8 | kernel: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() |
CVE-2024-50265
|
| VCID-mxb7-a88f-wycr | kernel: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start |
CVE-2024-49944
|
| VCID-n1x1-k7cx-4kdx | kernel: RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency |
CVE-2024-47696
|
| VCID-nama-uedh-b3fg | kernel: sctp: sysctl: auth_enable: avoid using current->nsproxy |
CVE-2025-21638
|
| VCID-ndfh-x9yx-jbb1 | kernel: drm/amd/display: Check null pointer before dereferencing se |
CVE-2024-50049
|
| VCID-nfue-k99d-j7gm | kernel: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() |
CVE-2024-50268
|
| VCID-ng3h-5h85-tkhw | kernel: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() |
CVE-2024-50008
|
| VCID-ngqm-wrgw-rkez | kernel: wifi: ath10k: Fix memory leak in management tx |
CVE-2024-50236
|
| VCID-nrhg-f4a1-7qe3 | kernel: staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() |
CVE-2024-50233
|
| VCID-nuzn-h4hz-hyh4 | kernel: spi: nxp-fspi: fix the KASAN report out-of-bounds bug |
CVE-2024-46853
|
| VCID-nvxv-7adg-hqbp | kernel: slip: make slhc_remember() more robust against malicious packets |
CVE-2024-50033
|
| VCID-nzbd-wgcm-5fdw | kernel: af_packet: fix vlan_get_tci() vs MSG_PEEK |
CVE-2024-57902
|
| VCID-nzs3-d5dq-u3a9 | kernel: x86/entry_32: Clear CPU buffers after register restore in NMI return |
CVE-2024-50193
|
| VCID-p2ew-45gs-97hj | kernel: vhost_vdpa: assign irq bypass producer token correctly |
CVE-2024-47748
|
| VCID-p556-9gqy-vkhf | kernel: net/smc: check return value of sock_recvmsg when draining clc data |
CVE-2024-57791
|
| VCID-p5t8-k4m7-23cx | kernel: nilfs2: fix kernel bug due to missing clearing of buffer delay flag |
CVE-2024-50116
|
| VCID-p6x9-a9ps-vuf8 | kernel: mm: resolve faulty mmap_region() error path behaviour |
CVE-2024-53096
|
| VCID-p772-utu4-sbhu | kernel: be2net: fix potential memory leak in be_xmit() |
CVE-2024-50167
|
| VCID-paq6-d6fg-fbaa | kernel: ASoC: meson: axg-card: fix 'use-after-free' |
CVE-2024-46849
|
| VCID-pawr-xr9h-zbh9 | kernel: Bluetooth: fix use-after-free in device_for_each_child() |
CVE-2024-53237
|
| VCID-pfwu-he58-x3d6 | kernel: Bluetooth: bnep: fix wild-memory-access in proto_unregister |
CVE-2024-50148
|
| VCID-pgm5-vku1-q7em | kernel: fbdev: sisfb: Fix strbuf array overflow |
CVE-2024-50180
|
| VCID-pjak-5gwh-43hn | kernel: drm/amdgpu: set the right AMDGPU sg segment limitation |
CVE-2024-56594
|
| VCID-pqcm-qtw9-nybs | kernel: nvme-pci: fix freeing of the HMB descriptor table |
CVE-2024-56756
|
| VCID-ptjq-k3sd-mbg9 | kernel: net/mlx5: Fix error path in multi-packet WQE transmit |
CVE-2024-50001
|
| VCID-pvna-jeau-u7fm | kernel: ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit |
CVE-2024-53171
|
| VCID-pxkf-h3mj-sfch | kernel: arm64: probes: Fix uprobes for big-endian kernels |
CVE-2024-50194
|
| VCID-py5a-zb4r-9fe6 | kernel: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() |
CVE-2024-56605
|
| VCID-q3cj-np4m-fudq | kernel: ocfs2: add bounds checking to ocfs2_xattr_find_entry() |
CVE-2024-47670
|
| VCID-q57a-mh4r-gye8 | kernel: netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext |
CVE-2024-54031
|
| VCID-q5jt-zx7c-fqd4 | kernel: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA |
CVE-2024-50134
|
| VCID-q682-t17w-kyhz | kernel: iio: imu: kmx61: fix information leak in triggered buffer |
CVE-2024-57908
|
| VCID-q6g3-zqxy-myhx | kernel: drm/amd/pm: ensure the fw_info is not null before using it |
CVE-2024-49890
|
| VCID-q6jz-c462-skdz | kernel: drm/radeon: check bo_va->bo is non-NULL before using it |
CVE-2024-41060
|
| VCID-q8t8-hf6h-7qh3 | kernel: can: j1939: j1939_session_new(): fix skb reference counting |
CVE-2024-56645
|
| VCID-qb4u-38pz-q3gn | kernel: net: stmmac: Fix zero-division error when disabling tc cbs |
CVE-2024-49977
|
| VCID-qc1g-k892-rbac | kernel: net/sched: accept TCA_STAB only for root qdisc |
CVE-2024-50039
|
| VCID-qd2p-jfnt-eyey | kernel: ext4: fix double brelse() the buffer of the extents path |
CVE-2024-49882
|
| VCID-qd52-fc7u-skaf | kernel: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt |
CVE-2024-38544
|
| VCID-qdd1-rxsn-ruan | kernel: erofs: fix order >= MAX_ORDER warning due to crafted negative i_size |
CVE-2022-50313
|
| VCID-qe24-fwf6-6bes | kernel: nfsd: map the EBADMSG to nfserr_io to avoid warning |
CVE-2024-49875
|
| VCID-qfxj-zqq9-r7ag | kernel: Bluetooth: L2CAP: Fix not validating setsockopt user input |
CVE-2024-35965
|
| VCID-qn1v-p7x8-mkdq | kernel: netfilter: br_netfilter: fix panic with metadata_dst skb |
CVE-2024-50045
|
| VCID-qnhn-4nfe-rucq | kernel: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c |
CVE-2024-56728
|
| VCID-qqpd-3f4k-yyes | kernel: vsock/virtio: discard packets if the transport changes |
CVE-2025-21669
|
| VCID-qrsb-4ya6-h3c7 | kernel: net: hns3: fix kernel crash when uninstalling driver |
CVE-2024-50296
|
| VCID-qrxx-cx5t-9kgh | kernel: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() |
CVE-2024-53226
|
| VCID-qtb6-udqg-n3dr | kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO |
CVE-2024-49949
|
| VCID-qv1x-3j1e-8ugg | kernel: rtc: check if __rtc_read_time was successful in rtc_timer_do_work() |
CVE-2024-56739
|
| VCID-qz49-w66v-5yam | kernel: bpf: Fix out-of-bounds write in trie_get_next_key() |
CVE-2024-50262
|
| VCID-r2gb-pmbg-f3cr | kernel: drm/amd/display: Initialize get_bytes_per_element's default to 1 |
CVE-2024-49892
|
| VCID-r88u-7yc5-87au | kernel: netfilter: x_tables: fix LED ID check in led_tg_check() |
CVE-2024-56650
|
| VCID-rd2f-x1xw-mbat | kernel: bpf: fix OOB devmap writes when deleting elements |
CVE-2024-56615
|
| VCID-rd5t-rgsc-rudg | kernel: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net |
CVE-2024-50121
|
| VCID-rdds-4kdk-qkcm | kernel: nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() |
CVE-2024-56619
|
| VCID-rdyx-hae6-vbbn | kernel: gtp: Destroy device along with udp socket's netns dismantle. |
CVE-2025-21678
|
| VCID-rej2-k4rf-97h9 | kernel: ppp: fix ppp_async_encode() illegal access |
CVE-2024-50035
|
| VCID-rh4u-kh34-aucx | kernel: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN |
CVE-2024-53135
|
| VCID-rhs7-avgn-e7dr | kernel: drm: bridge: adv7511: unregister cec i2c device after cec adapter |
CVE-2022-50412
|
| VCID-rmrs-en7k-v7h2 | kernel: bpf: sync_linked_regs() must preserve subreg_def |
CVE-2024-53125
|
| VCID-rnum-qw5t-5uby | kernel: usb: typec: altmode should keep reference to parent |
CVE-2024-50150
|
| VCID-rp3z-zrwp-kfc8 | kernel: tcp: check skb is non-NULL in tcp_rto_delta_us() |
CVE-2024-47684
|
| VCID-rq2w-njse-nbhf | kernel: NFSD: Prevent NULL dereference in nfsd4_process_cb_update() |
CVE-2024-53217
|
| VCID-rr33-wc85-c7bf | kernel: pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking |
CVE-2024-57889
|
| VCID-rsz2-6qtp-s3a5 | kernel: crypto: bcm - add error check in the ahash_hmac_init function |
CVE-2024-56681
|
| VCID-rwjd-764p-fbg3 | kernel: jfs: fix shift-out-of-bounds in dbSplit |
CVE-2024-56597
|
| VCID-ry36-vrr3-fyf8 | kernel: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint |
CVE-2024-53131
|
| VCID-rynr-zz6f-jfay | kernel: usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer |
CVE-2024-56670
|
| VCID-s1k5-hnrc-yffd | kernel: media: usbtv: Remove useless locks in usbtv_video_free() |
CVE-2024-27072
|
| VCID-s1ny-ed8s-n7fw | kernel: usb: dwc3: gadget: Fix looping of queued SG entries |
CVE-2024-56698
|
| VCID-s3rn-q6hw-q7ck | kernel: media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal() |
CVE-2024-56572
|
| VCID-sddc-2m3p-mbgh | kernel: gpio: grgpio: Add NULL check in grgpio_probe |
CVE-2024-56634
|
| VCID-sduq-4eqy-subt | kernel: media: cx24116: prevent overflows on SNR calculus |
CVE-2024-50290
|
| VCID-sfc8-792k-n3ea | kernel: net: inet: do not leave a dangling sk pointer in inet_create() |
CVE-2024-56601
|
| VCID-sfwc-7h4k-ybcj | kernel: power: supply: gpio-charger: Fix set charge current limits |
CVE-2024-57792
|
| VCID-sn9p-gz99-afhz | kernel: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag |
CVE-2025-21699
|
| VCID-spzv-4u7n-y7b3 | kernel: RDMA/uverbs: Prevent integer overflow issue |
CVE-2024-57890
|
| VCID-srta-uqkm-dbg7 | kernel: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() |
CVE-2024-41016
|
| VCID-ssqx-mgpz-97cd | kernel: drm/amd/display: Add check for granularity in dml ceil/floor helpers |
CVE-2024-57922
|
| VCID-ssxj-7m6b-nfah | kernel: nilfs2: fix potential deadlock with newly created symlinks |
CVE-2024-50229
|
| VCID-stny-634a-4ff3 | kernel: nfsd: call cache_put if xdr_reserve_space returns NULL |
CVE-2024-47737
|
| VCID-t4wy-qqs7-pfgr | kernel: drm/amd/display: Check BIOS images before it is used |
CVE-2024-46809
|
| VCID-t5zg-bxuy-wbhk | kernel: NFSD: Prevent a potential integer overflow |
CVE-2024-53146
|
| VCID-t645-suyd-n3ah | kernel: iio: light: veml6030: fix IIO device retrieval from embedded device |
CVE-2024-50198
|
| VCID-t6g3-n2fm-abg8 | kernel: mm: avoid leaving partial pfn mappings around in error case |
CVE-2024-47674
|
| VCID-t8m1-asz6-syde | kernel: scsi: sg: Fix slab-use-after-free read in sg_release() |
CVE-2024-56631
|
| VCID-ta95-qfqs-cbbp | kernel: ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() |
CVE-2024-50103
|
| VCID-tad5-rxb1-6yd7 | kernel: um: Fix potential integer overflow during physmem setup |
CVE-2024-53145
|
| VCID-tvc9-zhxc-pycb | kernel: fs: Fix uninitialized value issue in from_kuid and from_kgid |
CVE-2024-53101
|
| VCID-tvuc-hsys-v7fj | kernel: smb: client: fix OOBs when building SMB2_IOCTL request |
CVE-2024-50151
|
| VCID-tz3p-a6fh-3bg8 | kernel: arm64: probes: Remove broken LDR (literal) uprobe support |
CVE-2024-50099
|
| VCID-tzxw-3y28-h7ak | kernel: iommu/arm-smmu: Defer probe of clients after smmu device bound |
CVE-2024-56568
|
| VCID-u3yu-4asz-dfea | kernel: usb: musb: sunxi: Fix accessing an released usb phy |
CVE-2024-50269
|
| VCID-u7v1-r91f-wbhb | kernel: ACPI: battery: Fix possible crash when unregistering a battery hook |
CVE-2024-49955
|
| VCID-ub11-q416-xban | kernel: geneve: do not assume mac header is set in geneve_xmit_skb() |
CVE-2024-56636
|
| VCID-ucsm-guzh-z7d2 | kernel: aoe: fix the potential use-after-free problem in more places |
CVE-2024-49982
|
| VCID-uvcv-xcdj-ufgy | kernel: virtio_pmem: Check device status before requesting flush |
CVE-2024-50184
|
| VCID-uwjv-xm1s-pbdq | kernel: arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL |
CVE-2024-57874
|
| VCID-uypn-w7kp-13gb | kernel: blk-cgroup: Fix UAF in blkcg_unpin_online() |
CVE-2024-56672
|
| VCID-v4dn-p4q2-nyhb | kernel: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY |
CVE-2024-56690
|
| VCID-v55f-11y3-n7bf | kernel: wifi: iwlegacy: Clear stale interrupts before resuming device |
CVE-2024-50234
|
| VCID-v9h8-y6ak-pfgt | kernel: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() |
CVE-2024-53059
|
| VCID-vaud-8ds2-qyfu | kernel: ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove |
CVE-2024-50292
|
| VCID-vg8t-ypvc-mfer | kernel: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() |
CVE-2024-50205
|
| VCID-vhg1-bt9h-mfbb | kernel: i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock |
CVE-2024-43098
|
| VCID-vjks-s27v-x7er | kernel: netrom: check buffer length before accessing it |
CVE-2024-57802
|
| VCID-vpps-6y8b-a7d6 | kernel: HID: wacom: fix when get product name maybe null pointer |
CVE-2024-56629
|
| VCID-vtud-2g7y-p7gt | kernel: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy |
CVE-2025-21640
|
| VCID-vxwe-vwc8-jbeb | kernel: igb: Do not bring the device up after non-fatal error |
CVE-2024-50040
|
| VCID-vzkb-k69z-zbeb | kernel: jfs: Fix uaf in dbFreeBits |
CVE-2024-49903
|
| VCID-w1s6-1ac6-eken | kernel: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() |
CVE-2024-50251
|
| VCID-w2uc-uqc2-7khf | kernel: media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg |
CVE-2024-56769
|
| VCID-w6e2-1eqn-s3f7 | kernel: iio: light: vcnl4035: fix information leak in triggered buffer |
CVE-2024-57910
|
| VCID-wf2e-p8u9-gbcn | kernel: f2fs: Require FMODE_WRITE for atomic write ioctls |
CVE-2024-47740
|
| VCID-wga7-ag9q-h3gw | kernel: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled |
CVE-2024-47735
|
| VCID-wp1v-bqdp-t3ct | kernel: sctp: properly validate chunk size in sctp_sf_ootb() |
CVE-2024-50299
|
| VCID-wqey-aqa9-yud8 | kernel: um: net: Do not use drvdata in release |
CVE-2024-53183
|
| VCID-wqs9-utnj-2fgh | kernel: ocfs2: reserve space for inline xattr before attaching reflink tree |
CVE-2024-49958
|
| VCID-wunv-tnmq-y7a6 | kernel: hfsplus: don't query the device logical block size multiple times |
CVE-2024-56548
|
| VCID-wvcr-8vpc-tyb7 | kernel: nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error |
CVE-2024-50096
|
| VCID-wzy5-1p8z-5kfr | kernel: mptcp: handle consistently DSS corruption |
CVE-2024-50185
|
| VCID-x2e5-f67v-q7hw | kernel: EDAC/bluefield: Fix potential integer overflow |
CVE-2024-53161
|
| VCID-x2wa-qayz-d7h9 | kernel: vfio/platform: check the bounds of read/write syscalls |
CVE-2025-21687
|
| VCID-x5ec-vwcj-mbcy | kernel: drm/amd/display: Fix index out of bounds in DCN30 color transformation |
CVE-2024-49969
|
| VCID-x9st-jeqc-7ucj | kernel: net: sched: fix ets qdisc OOB Indexing |
CVE-2025-21692
|
| VCID-xaye-wwt2-fkb2 | kernel: Bluetooth: RFCOMM: Fix not validating setsockopt user input |
CVE-2024-35966
|
| VCID-xdw8-ms7r-bfc4 | kernel: net: add more sanity checks to qdisc_pkt_len_init() |
CVE-2024-49948
|
| VCID-xem5-ehrv-4qgk | kernel: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption |
CVE-2024-49858
|
| VCID-xfhf-gaaq-aff3 | kernel: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() |
CVE-2024-56747
|
| VCID-xjtu-3rs8-1be1 | kernel: nilfs2: fix kernel bug due to missing clearing of checked flag |
CVE-2024-50230
|
| VCID-xm3j-uguv-hyd4 | kernel: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint |
CVE-2024-53130
|
| VCID-xp6n-zuk6-pbbw | kernel: ftrace: Fix possible use-after-free issue in ftrace_location() |
CVE-2024-38588
|
| VCID-xwc5-xbwd-z3g7 | kernel: selinux,smack: don't bypass permissions check in inode_setsecctx hook |
CVE-2024-46695
|
| VCID-xyh2-tgkm-d3d9 | kernel: wifi: rtw88: always wait for both firmware loading attempts |
CVE-2024-47718
|
| VCID-y7xz-taak-67f2 | kernel: btrfs: ref-verify: fix use-after-free after invalid ref action |
CVE-2024-56581
|
| VCID-ya59-ayvw-huaj | kernel: drm: omapdrm: Add missing check for alloc_ordered_workqueue |
CVE-2024-49879
|
| VCID-ye4m-yv6w-wff1 | kernel: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported |
CVE-2024-53060
|
| VCID-ykfs-a9uu-mkaw | kernel: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() |
CVE-2024-57887
|
| VCID-yp6e-f5fp-7kbz | kernel: security/keys: fix slab-out-of-bounds in key_task_permission |
CVE-2024-50301
|
| VCID-ysd2-zyt4-xybu | kernel: net/sched: netem: account for backlog updates from child qdisc |
CVE-2024-56770
|
| VCID-ysg3-gaus-nfca | kernel: btrfs: wait for fixup workers before stopping cleaner kthread during umount |
CVE-2024-49867
|
| VCID-yun1-p953-8udc | kernel: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() |
CVE-2024-50210
|
| VCID-yuyy-u84g-1ufb | kernel: net: bridge: xmit: make sure we have at least eth header len bytes |
CVE-2024-38538
|
| VCID-yz41-uqnc-xyhs | kernel: net: Fix an unsafe loop on the list |
CVE-2024-50024
|
| VCID-z1d3-8ypx-83bj | kernel: netfilter: nf_tables: prevent nf_skb_duplicated corruption |
CVE-2024-49952
|
| VCID-z2z9-umm2-vkdt | kernel: ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate |
CVE-2024-49877
|
| VCID-z449-wes7-mbfp | kernel: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] |
CVE-2025-21666
|
| VCID-z8rc-7t3w-yyd4 | kernel: jffs2: Prevent rtime decompress memory corruption |
CVE-2024-57850
|
| VCID-zc8p-pakr-q3b3 | kernel: nfsd: return -EINVAL when namelen is 0 |
CVE-2024-47692
|
| VCID-zh8h-914q-6ye3 | kernel: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error |
CVE-2024-47698
|
| VCID-zj73-kpsf-5ufy | kernel: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport |
CVE-2024-56688
|
| VCID-zmch-s95m-gua2 | kernel: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute |
CVE-2025-21653
|
| VCID-znv4-4dud-4qgd | kernel: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() |
CVE-2024-56602
|
| VCID-zs6h-f21e-vked | kernel: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer |
CVE-2024-53103
|
| VCID-zxx1-uwkj-23b8 | kernel: bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again |
CVE-2024-48881
|
| VCID-zyeq-zp8w-zfba | kernel: iio: adc: ti-ads8688: fix information leak in triggered buffer |
CVE-2024-57906
|
| VCID-zz38-awwp-k3bw | kernel: ext4: avoid use-after-free in ext4_ext_show_leaf() |
CVE-2024-49889
|