Search for packages
| purl | pkg:deb/debian/linux@6.1.119-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-168k-2w31-gfc8 | kernel: fs/ntfs3: Additional check in ntfs_file_release |
CVE-2024-50242
|
| VCID-1kaf-f6tb-ckdm | kernel: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' |
CVE-2024-36478
|
| VCID-1kfb-qzjj-6fc8 | kernel: net: arc: fix the device for dma_map_single/dma_unmap_single |
CVE-2024-50295
|
| VCID-2jj8-xsze-6fbq | kernel: fs/ntfs3: Fix possible deadlock in mi_read |
CVE-2024-50245
|
| VCID-2nqc-u3ug-1fhg | kernel: ocfs2: uncache inode which has failed entering the group |
CVE-2024-53112
|
| VCID-2s5m-15wa-93d3 | kernel: USB: serial: io_edgeport: fix use after free in debug printk |
CVE-2024-50267
|
| VCID-2zcx-p5k1-7ydn | kernel: ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp |
CVE-2024-50283
|
| VCID-3cah-1nkn-5uga | kernel: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT |
CVE-2024-53057
|
| VCID-3cwu-kg6p-yya7 | kernel: Bluetooth: L2CAP: Fix uaf in l2cap_connect |
CVE-2024-49950
|
| VCID-3fny-8r4k-buag | kernel: x86/bugs: Use code segment selector for VERW operand |
CVE-2024-50072
|
| VCID-3x91-m1uq-uufj | kernel: net: vertexcom: mse102x: Fix possible double free of TX skb |
CVE-2024-50276
|
| VCID-49be-qf7v-jbhr | kernel: wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower |
CVE-2024-50237
|
| VCID-4k1h-9cye-kyfu | kernel: io_uring: fix possible deadlock in io_register_iowq_max_workers() |
CVE-2024-41080
|
| VCID-5e6b-u52t-b7a5 | kernel: fs/ntfs3: Fix general protection fault in run_is_mapped_full |
CVE-2024-50243
|
| VCID-5hpv-svx2-4bcz | kernel: net: fec: remove .ndo_poll_controller to avoid deadlocks |
CVE-2024-38553
|
| VCID-5u9j-rp2j-queg | kernel: net/mlx5: fs, lock FTE when checking if active |
CVE-2024-53121
|
| VCID-5xud-fsmq-93cs | kernel: nvme: tcp: avoid race between queue_lock lock and destroy |
CVE-2024-53100
|
| VCID-6f63-djtc-pkcm | kernel: mm: krealloc: Fix MTE false alarm in __do_krealloc |
CVE-2024-53097
|
| VCID-719s-u3xc-gyas | kernel: media: dvbdev: prevent the risk of out of memory access |
CVE-2024-53063
|
| VCID-7dfn-9f3w-5qej | kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow() |
CVE-2024-53042
|
| VCID-7etb-wzrv-17ck | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format |
CVE-2024-53104
|
| VCID-82cr-hzyb-wbfw | kernel: wifi: iwlwifi: mvm: fix 6 GHz scan construction |
CVE-2024-53055
|
| VCID-83tv-q3qf-uyg7 | kernel: wifi: cfg80211: clear wdev->cqm_config pointer on free |
CVE-2024-50235
|
| VCID-8aav-ad55-g3hq | kernel: net/mlx5e: kTLS, Fix incorrect page refcounting |
CVE-2024-53138
|
| VCID-8qgv-5n2y-sfa7 | kernel: netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() |
CVE-2024-50256
|
| VCID-8w7y-pzaz-zug3 | kernel: i40e: fix race condition by adding filter's intermediate sync state |
CVE-2024-53088
|
| VCID-8x5z-wwqe-k3dk | kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans |
CVE-2024-50264
|
| VCID-9v22-8m1e-4ke7 | kernel: mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address |
CVE-2024-50252
|
| VCID-ab16-n34c-eqb7 | kernel: mm: revert "mm: shmem: fix data-race in shmem_getattr()" |
CVE-2024-53136
|
| VCID-aq43-mrqu-nqdb | kernel: NFSD: Limit the number of concurrent async COPY operations |
CVE-2024-49974
|
| VCID-b6hm-ab7p-h3eu | kernel: drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing |
CVE-2024-43904
|
| VCID-c8nj-6r7j-cbdz | kernel: nfs: Fix KMSAN warning in decode_getfattr_attrs() |
CVE-2024-53066
|
| VCID-cd13-6z54-5kev | kernel: virtio/vsock: Fix accept_queue memory leak |
CVE-2024-53119
|
| VCID-cf5d-yb5q-83at | kernel: net/mlx5e: CT: Fix null-ptr-deref in add rule err flow |
CVE-2024-53120
|
| VCID-cgqq-rjgb-2ybc | kernel: ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow |
CVE-2024-50218
|
| VCID-ck15-a466-7kec | kernel: mptcp: error out earlier on disconnect |
CVE-2024-53123
|
| VCID-cwbv-5fp8-a3bs | kernel: ima: fix buffer overrun in ima_eventdigest_init_common |
CVE-2024-53106
|
| VCID-d1bh-3anc-sqax | kernel: signal: restore the override_rlimit logic |
CVE-2024-50271
|
| VCID-d313-d7rr-1ufq | kernel: media: v4l2-tpg: prevent the risk of a division by zero |
CVE-2024-50287
|
| VCID-d4by-q4fz-x3dj | kernel: fs/ntfs3: Check if more than chunk-size bytes are written |
CVE-2024-50247
|
| VCID-d5h7-h1nn-xban | kernel: netfilter: Fix use-after-free in get_info() |
CVE-2024-50257
|
| VCID-d7xm-y7sd-3bgw | kernel: fs/ntfs3: Additional check in ni_clear() |
CVE-2024-50244
|
| VCID-e89h-5xpk-gbfx | kernel: ksmbd: Fix the missing xa_store error check |
CVE-2024-50284
|
| VCID-ecxb-qhqp-qqgr | kernel: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer |
CVE-2024-49991
|
| VCID-f1qx-m6tb-u7d2 | kernel: btrfs: reinitialize delayed ref list after deleting it from the list |
CVE-2024-50273
|
| VCID-faua-wume-yyaa | kernel: ipvs: properly dereference pe in ip_vs_add_service |
CVE-2024-42322
|
| VCID-fbzf-k9uu-skct | kernel: netlink: terminate outstanding dump on socket close |
CVE-2024-53140
|
| VCID-fc19-5r4d-cffy | kernel: riscv/purgatory: align riscv_kernel_entry |
CVE-2024-43868
|
| VCID-fds5-x8be-47fj | kernel: net: do not delay dst_entries_add() in dst_release() |
CVE-2024-50036
|
| VCID-ffpk-5ysr-yye2 | kernel: use-after-free due to race condition in drivers/char/xillybus/xillyusb.c |
CVE-2022-45888
|
| VCID-fpdj-bqdz-8bev | kernel: mctp i2c: handle NULL header address |
CVE-2024-53043
|
| VCID-gtbs-gkax-a3ag | kernel: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write |
CVE-2024-53052
|
| VCID-gz7v-f4bw-zqds | kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq |
CVE-2024-38540
|
| VCID-h2bw-kppn-g7e5 | kernel: Bluetooth: ISO: Fix not validating setsockopt user input |
CVE-2024-35964
|
| VCID-hc84-6ccr-dqbg | kernel: media: s5p-jpeg: prevent buffer overflows |
CVE-2024-53061
|
| VCID-hgpz-fqkr-x3ag | kernel: vt: prevent kernel-infoleak in con_font_get() |
CVE-2024-50076
|
| VCID-j12u-u3h9-7kay | kernel: dm cache: fix out-of-bounds access to the dirty bitset when resizing |
CVE-2024-50279
|
| VCID-jbcp-t4z6-huep | kernel: HID: core: zero-initialize the report buffer |
CVE-2024-50302
|
| VCID-jj1e-5cxb-qffe | kernel: Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K" |
CVE-2024-53127
|
| VCID-jnsp-4jt9-aqas | kernel: dm cache: fix potential out-of-bounds access on the first resume |
CVE-2024-50278
|
| VCID-jqm5-psje-myf1 | kernel: ext4: fix timer use-after-free on failed mount |
CVE-2024-49960
|
| VCID-jw26-mwka-x3dr | kernel: cpufreq: Avoid a bad reference count on CPU node |
CVE-2024-50012
|
| VCID-kdnu-vdbr-j3dx | kernel: virtio_net: Add hash_key_length check |
CVE-2024-53082
|
| VCID-ktm4-n49x-wbg7 | kernel: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof |
CVE-2024-53113
|
| VCID-me2j-kn2g-u3fu | kernel: net: sched: use RCU read-side critical section in taprio_dump() |
CVE-2024-50126
|
| VCID-mw1y-1bts-myc8 | kernel: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() |
CVE-2024-50265
|
| VCID-nenr-99uc-97cc | kernel: vp_vdpa: fix id_table array not null terminated error |
CVE-2024-53110
|
| VCID-nfue-k99d-j7gm | kernel: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() |
CVE-2024-50268
|
| VCID-ngqm-wrgw-rkez | kernel: wifi: ath10k: Fix memory leak in management tx |
CVE-2024-50236
|
| VCID-nrhg-f4a1-7qe3 | kernel: staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() |
CVE-2024-50233
|
| VCID-nv4t-v11t-aucb | kernel: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data |
CVE-2024-53058
|
| VCID-nxqc-k9mq-pqd6 | kernel: uprobe: avoid out-of-bounds memory access of fetching args |
CVE-2024-50067
|
| VCID-p6x9-a9ps-vuf8 | kernel: mm: resolve faulty mmap_region() error path behaviour |
CVE-2024-53096
|
| VCID-qcnz-11yh-sfes | kernel: nvmet-auth: assign dh_key to NULL after kfree_sensitive |
CVE-2024-50215
|
| VCID-qrsb-4ya6-h3c7 | kernel: net: hns3: fix kernel crash when uninstalling driver |
CVE-2024-50296
|
| VCID-qw5g-hukq-kfb1 | kernel: filemap: Fix bounds checking in filemap_read() |
CVE-2024-50272
|
| VCID-qz49-w66v-5yam | kernel: bpf: Fix out-of-bounds write in trie_get_next_key() |
CVE-2024-50262
|
| VCID-qzy8-dgxc-2kgd | kernel: dm cache: fix flushing uninitialized delayed_work on cache_ctr error |
CVE-2024-50280
|
| VCID-r8df-7maq-aqdd | kernel: nvme-multipath: defer partition scanning |
CVE-2024-53093
|
| VCID-rh4u-kh34-aucx | kernel: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN |
CVE-2024-53135
|
| VCID-ry36-vrr3-fyf8 | kernel: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint |
CVE-2024-53131
|
| VCID-sduq-4eqy-subt | kernel: media: cx24116: prevent overflows on SNR calculus |
CVE-2024-50290
|
| VCID-ssaq-6w79-v3ay | kernel: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors |
CVE-2024-49986
|
| VCID-ssxj-7m6b-nfah | kernel: nilfs2: fix potential deadlock with newly created symlinks |
CVE-2024-50229
|
| VCID-sw8v-3ppm-7fa1 | kernel: fsdax: dax_unshare_iter needs to copy entire blocks |
CVE-2024-50250
|
| VCID-t8hb-hxgq-mbac | kernel: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies |
CVE-2024-36915
|
| VCID-tvc9-zhxc-pycb | kernel: fs: Fix uninitialized value issue in from_kuid and from_kgid |
CVE-2024-53101
|
| VCID-tw4g-9umx-a3bu | kernel: drm/amd/display: Skip on writeback when it's not applicable |
CVE-2024-36914
|
| VCID-u3yu-4asz-dfea | kernel: usb: musb: sunxi: Fix accessing an released usb phy |
CVE-2024-50269
|
| VCID-un3j-uk7y-1ka2 | kernel: drm/rockchip: vop: Fix a dereferenced before check warning |
CVE-2024-53129
|
| VCID-v55f-11y3-n7bf | kernel: wifi: iwlegacy: Clear stale interrupts before resuming device |
CVE-2024-50234
|
| VCID-v9h8-y6ak-pfgt | kernel: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() |
CVE-2024-53059
|
| VCID-vaud-8ds2-qyfu | kernel: ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove |
CVE-2024-50292
|
| VCID-vjfm-ess8-cubz | kernel: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs |
CVE-2024-50255
|
| VCID-vu8z-nr85-dfbh | kernel: ksmbd: fix potencial out-of-bounds when buffer offset is invalid |
CVE-2024-26952
|
| VCID-w1s6-1ac6-eken | kernel: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() |
CVE-2024-50251
|
| VCID-w23n-66se-8yg4 | kernel: macsec: Fix use-after-free while sending the offloading packet |
CVE-2024-50261
|
| VCID-w4k3-wqce-z3g3 | kernel: ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() |
CVE-2024-26954
|
| VCID-wkng-tshf-vkc8 | kernel: drm/amd: check num of link levels when update pcie param |
CVE-2023-52812
|
| VCID-wp1v-bqdp-t3ct | kernel: sctp: properly validate chunk size in sctp_sf_ootb() |
CVE-2024-50299
|
| VCID-xjtu-3rs8-1be1 | kernel: nilfs2: fix kernel bug due to missing clearing of checked flag |
CVE-2024-50230
|
| VCID-xm3j-uguv-hyd4 | kernel: nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint |
CVE-2024-53130
|
| VCID-y35s-194h-sbdw | kernel: iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() |
CVE-2024-50232
|
| VCID-y67b-gwz7-r7ep | kernel: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() |
CVE-2024-50259
|
| VCID-ye4m-yv6w-wff1 | kernel: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported |
CVE-2024-53060
|
| VCID-yp2f-3vbz-y7cf | kernel: platform/x86/amd/pmc: Detect when STB is not available |
CVE-2024-53072
|
| VCID-yp3t-dtgd-1qaq | kernel: ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create |
CVE-2024-50286
|
| VCID-yp6e-f5fp-7kbz | kernel: security/keys: fix slab-out-of-bounds in key_task_permission |
CVE-2024-50301
|
| VCID-zfrz-jeew-tyea | kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too |
CVE-2024-36244
|
| VCID-zhbd-4d3e-1udf | kernel: media: ar0521: don't overflow when checking PLL values |
CVE-2024-53081
|
| VCID-zkx5-gp3j-93gx | kernel: usb: dwc3: fix fault at system suspend if device was already runtime suspended |
CVE-2024-53070
|
| VCID-zmwx-7zse-dbge | kernel: mptcp: cope racing subflow creation in mptcp_rcv_space_adjust |
CVE-2024-53122
|
| VCID-zp24-pjju-tuez | kernel: parisc: fix a possible DMA corruption |
CVE-2024-44949
|
| VCID-zs6h-f21e-vked | kernel: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer |
CVE-2024-53103
|
| VCID-zyaf-9pdx-vfgk | kernel: ACPI: CPPC: Make rmw_lock a raw_spin_lock |
CVE-2024-50249
|