Search for packages
| purl | pkg:deb/debian/linux@6.1.82-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1bd1-y6hg-jkht | kernel: xhci: handle isoc Babble and Buffer Overrun events properly |
CVE-2024-26659
|
| VCID-1kfz-zcj1-jbh5 | kernel: net: stmmac: xgmac: fix handling of DPP safety error for DMA channels |
CVE-2024-26684
|
| VCID-1pt7-8yue-c3gk | kernel: tls: race between async notify and socket close |
CVE-2024-26583
|
| VCID-249q-v6wt-e7d3 | kernel: media: rkisp1: Fix IRQ disable race issue |
CVE-2023-52589
|
| VCID-2cdv-spwr-xfa4 | kernel: powerpc/kasan: Fix addr error caused by page alignment |
CVE-2024-26712
|
| VCID-2emw-8cdg-aug7 | kernel: fbcon: always restore the old font data in fbcon_do_set_font() |
CVE-2024-26798
|
| VCID-2yj3-xevt-9qgj | kernel: nilfs2: fix potential bug in end_buffer_async_write |
CVE-2024-26685
|
| VCID-2zvr-q3xg-4bgb | kernel: ext4: regenerate buddy after block freeing failed if under fc replay |
CVE-2024-26601
|
| VCID-35a3-rhpc-7fgv | kernel: block: Fix WARNING in _copy_from_iter |
CVE-2024-26844
|
| VCID-3gr6-1zwf-aufk | kernel: copy_params can attempt to allocate more than INT_MAX bytes and crash |
CVE-2024-23851
|
| VCID-3sd5-9x47-mbgm | kernel: IB/hfi1: Fix a memleak in init_credit_return |
CVE-2024-26839
|
| VCID-3vua-8spr-57a6 | kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload |
CVE-2024-26837
|
| VCID-3zuh-psk1-wqe1 | kernel: arp: Prevent overflow in arp_req_get(). |
CVE-2024-26733
|
| VCID-43jz-yfag-yfc1 | kernel: nfc: nci: free rx_data_reassembly skb on NCI device cleanup |
CVE-2024-26825
|
| VCID-44bz-6nx3-7fbn | kernel: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). |
CVE-2024-26741
|
| VCID-45zm-u36h-4fat | kernel: netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter |
CVE-2024-26805
|
| VCID-4eky-dmz4-3qfh | kernel: iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC |
CVE-2024-26702
|
| VCID-4f94-neut-7qbq | kernel: scsi: target: core: Add TMF to tmr_list handling |
CVE-2024-26845
|
| VCID-4fpb-h2cf-17d7 | kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 |
CVE-2024-26660
|
| VCID-4kmy-n2ts-hfa2 | kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier |
CVE-2024-26602
|
| VCID-543v-2c3q-4ua4 | kernel: efi: runtime: Fix potential overflow of soft-reserved region size |
CVE-2024-26843
|
| VCID-5aq3-17g7-puh9 | kernel: usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend |
CVE-2024-26715
|
| VCID-5ea4-kwfx-bbhh | kernel: gtp: fix use-after-free and null-ptr-deref in gtp_newlink() |
CVE-2024-26793
|
| VCID-5jdk-yfrh-7kay | kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() |
CVE-2023-52594
|
| VCID-5m1x-wksg-mbbz | kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow |
CVE-2024-27403
|
| VCID-5ruw-4rqp-uqc2 | kernel: net: mctp: take ownership of skb in mctp_local_output |
CVE-2024-27418
|
| VCID-5zqw-uv5b-nkcb | kernel: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super |
CVE-2024-26688
|
| VCID-66ar-kth1-nqgr | kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter |
CVE-2024-26744
|
| VCID-67u4-sdzt-w7ep | kernel: i40e: Do not allow untrusted VF to remove administratively set MAC |
CVE-2024-26830
|
| VCID-69uc-8735-qbf1 | kernel: igc: avoid returning frame twice in XDP_REDIRECT |
CVE-2024-26853
|
| VCID-6cjn-bwy4-bbdq | kernel: btrfs: don't drop extent_map for free space inode on write error |
CVE-2024-26726
|
| VCID-6p5c-5w6b-t3en | kernel: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security |
CVE-2024-26903
|
| VCID-6qvk-hx6p-aqa5 | kernel: LoongArch: Disable IRQ before init_fn() for nonboot CPUs |
CVE-2024-26765
|
| VCID-6we8-qvfc-57e3 | kernel: tls: use-after-free with partial reads and async decrypt |
CVE-2024-26582
|
| VCID-6wm4-esw1-tyf7 | kernel: wifi: nl80211: reject iftype change with mesh ID change |
CVE-2024-27410
|
| VCID-71va-jvwq-nub1 | In the Linux kernel, the following vulnerability has been resolved: erofs: fix inconsistent per-file compression format EROFS can select compression algorithms on a per-file basis, and each per-file compression algorithm needs to be marked in the on-disk superblock for initialization. However, syzkaller can generate inconsistent crafted images that use an unsupported algorithmtype for specific inodes, e.g. use MicroLZMA algorithmtype even it's not set in `sbi->available_compr_algs`. This can lead to an unexpected "BUG: kernel NULL pointer dereference" if the corresponding decompressor isn't built-in. Fix this by checking against `sbi->available_compr_algs` for each m_algorithmformat request. Incorrect !erofs_sb_has_compr_cfgs preset bitmap is now fixed together since it was harmless previously. |
CVE-2024-26590
|
| VCID-73tm-jbcc-cybu | kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel |
CVE-2024-26737
|
| VCID-7b8b-jzma-4qc2 | kernel: smb: client: fix potential OOBs in smb2_parse_contexts() |
CVE-2023-52434
|
| VCID-7bzd-w6v7-jkce | kernel: ceph: fix deadlock or deadcode of misusing dget() |
CVE-2023-52583
|
| VCID-7c2w-d53w-eqbg | kernel: mptcp: fix data re-injection from stale subflow |
CVE-2024-26826
|
| VCID-7etf-u5j1-9fgt | kernel: inet: read sk->sk_family once in inet_recv_error() |
CVE-2024-26679
|
| VCID-7gbj-q5tk-sfgm | kernel: tunnels: fix out of bounds access when building IPv6 PMTU error |
CVE-2024-26665
|
| VCID-7gj5-1gbe-kfey | kernel: PCI: switchtec: Fix stdev_release() crash after surprise hot remove |
CVE-2023-52617
|
| VCID-7hcx-3pjv-bbbw | kernel: UBSAN: array-index-out-of-bounds in dtSplitRoot |
CVE-2023-52603
|
| VCID-7pu1-b2dd-cyav | kernel: netrom: Fix data-races around sysctl_net_busy_read |
CVE-2024-27419
|
| VCID-7yey-ku8y-bfdx | kernel: um: time-travel: fix time corruption |
CVE-2023-52633
|
| VCID-8gn5-y3mp-9qh2 | kernel: powerpc/lib: Validate size for vector operations |
CVE-2023-52606
|
| VCID-8jp1-5yua-k7aw | kernel: interconnect: qcom: sc8180x: Mark CO0 BCM keepalive |
CVE-2024-26714
|
| VCID-8ry8-z6kv-jfgu | kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats |
CVE-2024-26686
|
| VCID-8rzz-8u2c-xkbf | kernel: jfs: fix uaf in jfs_evict_inode |
CVE-2023-52600
|
| VCID-95xe-xtqt-r3b8 | kernel: mlxsw: spectrum_acl_tcam: Fix stack corruption |
CVE-2024-26586
|
| VCID-9747-48qj-8fbk | kernel: ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() |
CVE-2024-27417
|
| VCID-9csm-qaa3-rfcy | kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() |
CVE-2024-26641
|
| VCID-9k6q-vgp6-ckhf | kernel: ipmr: fix kernel panic when forwarding mcast packets |
CVE-2024-26626
|
| VCID-9pkf-9ydd-rug7 | kernel: missing check for struct in dm-table.c can cause a crash |
CVE-2023-52429
|
| VCID-9sf1-ae8k-x7au | kernel: nilfs2: fix data corruption in dsync block recovery for small block sizes |
CVE-2024-26697
|
| VCID-a71e-rab1-zudq | kernel: fs/ntfs3: Fix a possible null-pointer dereference in ni_clear() |
CVE-2023-54272
|
| VCID-a77b-8hmz-w3gb | kernel: ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() |
CVE-2024-26722
|
| VCID-agqn-364s-3ugr | kernel: net: veth: clear GRO when clearing XDP even when down |
CVE-2024-26803
|
| VCID-arr2-wbjp-mudf | kernel: ppp_async: limit MRU to 64K |
CVE-2024-26675
|
| VCID-asgh-162t-dfh8 | kernel: i2c: i801: Fix block process call transactions |
CVE-2024-26593
|
| VCID-avdc-4xxg-vyej | kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit |
CVE-2024-26915
|
| VCID-avj8-gend-sbdv | kernel: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio |
CVE-2024-26764
|
| VCID-btkk-63w4-6ke1 | kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations |
CVE-2024-26673
|
| VCID-bu9s-yqrg-1yes | kernel: nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() |
CVE-2024-26696
|
| VCID-bvz9-x3gb-zbhq | kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] |
CVE-2023-52635
|
| VCID-bzd4-c6h2-xfer | kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt |
CVE-2024-26774
|
| VCID-c2cj-yepf-xub3 | kernel: nfsd: fix RELEASE_LOCKOWNER |
CVE-2024-26629
|
| VCID-cj5b-fb51-3fhm | kernel: net/rds: fix WARNING in rds_conn_connect_if_down |
CVE-2024-27024
|
| VCID-cjwn-zzv5-s3c1 | kernel: fbdev: sis: Error out if pixclock equals zero |
CVE-2024-26777
|
| VCID-crvg-cykq-7fce | kernel: netfilter: nf_tables: set dormant flag on hook register failure |
CVE-2024-26835
|
| VCID-deq9-vecn-53fz | kernel: tls: fix NULL deref on tls_sw_splice_eof() with empty record |
CVE-2023-52767
|
| VCID-dhhz-dx6n-3yef | kernel: cpumap: Zero-initialise xdp_rxq_info struct before running XDP program |
CVE-2024-27431
|
| VCID-dn3r-s1en-t3cx | kernel: hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed |
CVE-2024-26820
|
| VCID-dntc-n9fg-syd9 | kernel: usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs |
CVE-2024-27405
|
| VCID-dumj-hn6g-mfcd | kernel: mptcp: fix double-free on socket dismantle |
CVE-2024-26782
|
| VCID-dv15-b2j5-pkg2 | kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() |
CVE-2024-26772
|
| VCID-e5qn-m9c1-6bdg | kernel: scsi: smartpqi: Fix disable_managed_interrupts |
CVE-2024-26742
|
| VCID-e8k6-75u2-yyhp | kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error |
CVE-2024-26766
|
| VCID-ebx6-ep7x-4qeq | kernel: tracing/trigger: Fix to return error if failed to alloc snapshot |
CVE-2024-26920
|
| VCID-ehrw-w91b-w3bw | kernel: jfs: fix array-index-out-of-bounds in diNewExt |
CVE-2023-52599
|
| VCID-ek71-xvpc-yqfm | kernel: usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() |
CVE-2024-26749
|
| VCID-epat-4z2e-akfu | kernel: fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode' |
CVE-2023-54196
|
| VCID-ezrm-15ba-xybx | kernel: dm-crypt, dm-verity: disable tasklets |
CVE-2024-26718
|
| VCID-f2mv-ykhh-j7cf | kernel: block/rnbd-srv: Check for unlikely string overflow |
CVE-2023-52618
|
| VCID-f4hz-pyqx-rqd8 | kernel: tcp: add sanity checks to rx zerocopy |
CVE-2024-26640
|
| VCID-f5sw-8wup-nydf | kernel: cifs: fix underflow in parse_server_interfaces() |
CVE-2024-26828
|
| VCID-fdnr-75et-6fhj | kernel: AoE: improper reference count leads to use-after-free vulnerability |
CVE-2023-6270
|
| VCID-fnjy-w5n6-8ydh | kernel: fbdev: savage: Error out if pixclock equals zero |
CVE-2024-26778
|
| VCID-fr8x-d5cu-s7fp | kernel: null pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() |
CVE-2023-7042
|
| VCID-fs8g-t79w-qbhz | kernel: geneve: make sure to pull inner header in geneve_rx() |
CVE-2024-26857
|
| VCID-fstj-6b1s-f7d5 | kernel: netfilter: nf_conntrack_h323: Add protection for bmp length out of range |
CVE-2024-26851
|
| VCID-fwqk-pkyr-73bq | kernel: SUNRPC: Fix a suspicious RCU usage warning |
CVE-2023-52623
|
| VCID-fyj6-t5jr-u7d4 | kernel: stack overflow problem in Open vSwitch kernel module leading to DoS |
CVE-2024-1151
|
| VCID-fysg-mkt6-g7gm | kernel: pstore/ram: Fix crash when setting number of cpus to an odd number |
CVE-2023-52619
|
| VCID-gznz-vtdh-ryfb | kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset |
CVE-2024-26801
|
| VCID-hezj-4vaw-v3fz | kernel: netfilter: nft_flow_offload: release dst in case direct xmit path is used |
CVE-2024-26834
|
| VCID-hmwp-tuzr-vqam | kernel: xen/events: close evtchn after mapping cleanup |
CVE-2024-26687
|
| VCID-hv12-tq9p-4qgd | kernel: fs/ntfs3: Fix oob in ntfs_listxattr |
CVE-2023-52640
|
| VCID-hxdv-tgyq-pkg5 | kernel: net: atlantic: eliminate double free in error handling logic |
CVE-2023-52664
|
| VCID-hzyc-4137-fqbs | kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() |
CVE-2024-26707
|
| VCID-j2ya-2dnx-3qd9 | kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers |
CVE-2023-52621
|
| VCID-jt1f-hbnn-abaf | kernel: btrfs: do not ASSERT() if the newly created subvolume already got read |
CVE-2024-26727
|
| VCID-jw26-mazb-afag | kernel: netfilter: nf_tables: disallow timeout for anonymous sets |
CVE-2023-52620
|
| VCID-jxrt-7n71-jfaj | kernel: hwmon: (coretemp) Fix out-of-bounds memory access |
CVE-2024-26664
|
| VCID-jzdj-2xqf-dbhp | kernel: parisc: Fix random data corruption from exception handler |
CVE-2024-26706
|
| VCID-k17s-qaah-93fd | kernel: mptcp: fix possible deadlock in subflow diag |
CVE-2024-26781
|
| VCID-k1gy-454n-4fba | kernel: fs/ntfs3: Fix NULL dereference in ni_write_inode |
CVE-2023-53732
|
| VCID-k55p-d23t-1udz | kernel: fs/ntfs3: Enhance the attribute size check |
CVE-2023-53486
|
| VCID-k6t6-t6ta-u3au | kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP |
CVE-2024-26600
|
| VCID-k8jt-3gvz-77ge | kernel: Information disclosure in vhost/vhost.c:vhost_new_msg() |
CVE-2024-0340
|
| VCID-kh3q-mq8r-qfgx | kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window |
CVE-2024-26761
|
| VCID-kh6y-yfu5-tybh | kernel: Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST |
CVE-2024-27416
|
| VCID-kjvy-urtq-83f5 | kernel: fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() |
CVE-2023-52641
|
| VCID-ksrn-dcnz-vqh7 | kernel: efi/capsule-loader: fix incorrect allocation size |
CVE-2024-27413
|
| VCID-kuce-ewwr-pbf1 | kernel: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() |
CVE-2023-52593
|
| VCID-kvrc-3jm4-vfcw | kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() |
CVE-2024-26773
|
| VCID-m1yc-gwxv-m7fn | kernel: jfs: fix array-index-out-of-bounds in dbAdjTree |
CVE-2023-52601
|
| VCID-m527-1m79-ufdj | kernel: afs: Increase buffer size in afs_update_volume_status() |
CVE-2024-26736
|
| VCID-m7vq-rzm8-vyfu | kernel: usb: cdns3: fix memory double free when handle zero packet |
CVE-2024-26748
|
| VCID-mav2-4h8r-43dw | kernel: dmaengine: fsl-qdma: init irq after reg initialization |
CVE-2024-26788
|
| VCID-mbpp-vv7v-ekht | kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock |
CVE-2023-52638
|
| VCID-md1z-9uta-jqa4 | kernel: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected |
CVE-2024-26776
|
| VCID-mjmu-rtay-zqgx | kernel: KVM: s390: vsie: fix race during shadow creation |
CVE-2023-52639
|
| VCID-mtfu-f81e-b7f3 | kernel: af_unix: Drop oob_skb ref before purging queue in GC. |
CVE-2024-26750
|
| VCID-mymw-65ux-j7h7 | kernel: net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink() |
CVE-2024-26855
|
| VCID-n172-tvh7-53b6 | kernel: drm/amd/display: Fix memory leak in dm_sw_fini() |
CVE-2024-26833
|
| VCID-n1ba-7ddv-tqfz | kernel: net: prevent mss overflow in skb_segment() |
CVE-2023-52435
|
| VCID-n4c6-4174-5fhz | kernel: KVM: s390: fix setting of fpc register |
CVE-2023-52597
|
| VCID-ns3b-y29f-skc4 | kernel: llc: call sock_orphan() at release time |
CVE-2024-26625
|
| VCID-nvrd-u2p1-cker | kernel: crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked |
CVE-2024-26695
|
| VCID-nx4j-stwh-mkdj | kernel: mm/swap: fix race when skipping swapcache |
CVE-2024-26759
|
| VCID-p2fk-8snj-x7dy | x86: Register File Data Sampling |
CVE-2023-28746
XSA-452 |
| VCID-p3my-xcuy-qfh8 | kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add |
CVE-2023-52607
|
| VCID-pddw-t3ya-eyhy | kernel: mm: zswap: fix missing folio cleanup in writeback race path |
CVE-2024-26832
|
| VCID-pk3g-b8uw-xuas | kernel: dm-crypt: don't modify the data when using authenticated encryption |
CVE-2024-26763
|
| VCID-pn8m-n4jt-8ba7 | kernel: aoe: avoid potential deadlock at set_capacity |
CVE-2024-26775
|
| VCID-pwxm-x4u1-pffw | kernel: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() |
CVE-2024-26852
|
| VCID-q37j-g4wv-3ufp | kernel: lan966x: Fix crash when adding interface under a lag |
CVE-2024-26723
|
| VCID-q4p5-kwzx-1yb9 | kernel: btrfs_get_root_ref has an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation |
CVE-2024-23850
|
| VCID-q626-2juw-n7a7 | kernel: rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back |
CVE-2024-27414
|
| VCID-qbej-n8yk-ubbc | kernel: media: rc: bpf attach/detach requires write permission |
CVE-2023-52642
|
| VCID-qd7c-769p-gkeh | kernel: phonet/pep: fix racy skb_queue_empty() use |
CVE-2024-27402
|
| VCID-qey9-br54-4uak | kernel: NULL Pointer dereference bluetooth allows Overflow Buffers |
CVE-2024-22099
|
| VCID-qnrb-hsen-y7d8 | kernel: netfilter: ipset: fix performance regression in swap operation |
CVE-2024-26910
|
| VCID-qthv-ewky-zkd6 | kernel: mptcp: fix data races on remote_id |
CVE-2024-27404
|
| VCID-qvdm-arkx-p3fd | kernel: ext4: avoid online resizing failures due to oversized flex bg |
CVE-2023-52622
|
| VCID-rcgs-k68c-q7f2 | kernel: bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() |
CVE-2024-26731
|
| VCID-rd66-swur-nqhc | kernel: ARM: ep93xx: Add terminator to gpiod_lookup_table |
CVE-2024-26751
|
| VCID-rs4g-ftqf-afe2 | kernel: stmmac: Clear variable when destroying workqueue |
CVE-2024-26802
|
| VCID-rw4x-nvsd-8ucb | kernel: hugetlbfs: Null pointer dereference in hugetlbfs_fill_super function |
CVE-2024-0841
|
| VCID-rxg9-r5be-c7ds | kernel: RDMA/irdma: Fix KASAN issue with tasklet |
CVE-2024-26838
|
| VCID-rxhs-4w1n-x7ah | kernel: mm: huge_memory: don't force huge page alignment on 32 bit |
CVE-2024-26621
|
| VCID-rygq-nw8t-tkd4 | kernel: s390/ptrace: handle setting of fpc register correctly |
CVE-2023-52598
|
| VCID-ryyq-d5hc-fbbv | kernel: nftables: nft_set_rbtree skip end interval element from gc |
CVE-2024-26581
|
| VCID-s6ed-f4sh-j3dj | kernel: ext4: fix double-free of blocks due to wrong extents moved_len |
CVE-2024-26704
|
| VCID-s7ex-f53w-fqd5 | kernel: sr9800: Add check for usbnet_get_endpoints |
CVE-2024-26651
|
| VCID-sauk-qw37-hbgw | kernel: iommu/sprd: Release dma buffer to avoid memory leak |
CVE-2023-53801
|
| VCID-sb29-fbqn-47aw | kernel: md: Fix missing release of 'active_io' for flush |
CVE-2024-27023
|
| VCID-sdkh-c3yd-g3ak | kernel: Slab-out-of-bound read in compare_netdev_and_ip |
CVE-2023-2176
|
| VCID-sefq-tp4u-zqea | kernel: cachefiles: fix memory leak in cachefiles_add_cache() |
CVE-2024-26840
|
| VCID-sh44-jt7p-9yc5 | kernel: netdevsim: avoid potential loop in nsim_dev_trap_report_work() |
CVE-2024-26681
|
| VCID-sny1-rwgv-j7c5 | kernel: FS:JFS:UBSAN: array-index-out-of-bounds in dbAdjTree |
CVE-2023-52604
|
| VCID-svm9-a6aw-gyd5 | kernel: dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read |
CVE-2024-26790
|
| VCID-sx2x-9yj3-g7gs | kernel: nvmet-fc: avoid deadlock on delete association path |
CVE-2024-26769
|
| VCID-syzp-m2pa-xyf1 | kernel: media: ir_toy: fix a memleak in irtoy_tx |
CVE-2024-26829
|
| VCID-t3rd-gv37-rubr | kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() |
CVE-2024-26663
|
| VCID-t9ys-6gar-4bbf | kernel: riscv: Sparse-Memory/vmemmap out-of-bounds fix |
CVE-2024-26795
|
| VCID-tc7r-9fyp-fkdn | kernel: tomoyo: fix UAF write bug in tomoyo_write_control() |
CVE-2024-26622
|
| VCID-tcvd-jyrx-zfhj | kernel: net: ip_tunnel: prevent perpetual headroom growth |
CVE-2024-26804
|
| VCID-tfhk-epj4-7yh3 | kernel: IB/ipoib: Fix mcast list locking |
CVE-2023-52587
|
| VCID-tksd-6duj-t7a3 | kernel: powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV |
CVE-2024-26745
|
| VCID-tywc-jesg-e7hy | kernel: netlink: add nla be16/32 types to minlen array |
CVE-2024-26849
|
| VCID-u1wk-h9yz-duh6 | kernel: usb: ulpi: Fix debugfs directory leak |
CVE-2024-26919
|
| VCID-ua4v-jdn7-mqar | kernel: iio: core: fix memleak in iio_device_register_sysfs |
CVE-2023-52643
|
| VCID-ujfc-hqyx-bugp | kernel: jfs: fix slab-out-of-bounds Read in dtSearch |
CVE-2023-52602
|
| VCID-unts-rgnw-8bdy | kernel: wifi: rt2x00: restart beacon queue when hardware reset |
CVE-2023-52595
|
| VCID-upvd-vvq1-w3du | kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever |
CVE-2024-26603
|
| VCID-uszg-hzsy-abaq | kernel: tls: stop recv() if initial process_rx_list gave us non-DATA |
CVE-2024-58239
|
| VCID-utwu-66b8-afgc | kernel: fs/ntfs3: Add length check in indx_get_root |
CVE-2023-53194
|
| VCID-uw5k-rjhq-6fat | kernel: af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC |
CVE-2024-26676
|
| VCID-uwac-p3w6-j7gj | kernel: signal epoll threads of self-work |
CVE-2024-26606
|
| VCID-v6z2-dwuy-g3fb | kernel: mmc: mmci: stm32: fix DMA API overlapping mappings warning |
CVE-2024-26787
|
| VCID-ve2w-upz5-gufe | kernel: crypto: virtio/akcipher - Fix stack overflow on memcpy |
CVE-2024-26753
|
| VCID-vexy-z52v-audg | kernel: ceph: prevent use-after-free in encode_cap_msg() |
CVE-2024-26689
|
| VCID-vvx8-gvt8-quax | kernel: RDMA/qedr: Fix qedr_create_user_qp error flow |
CVE-2024-26743
|
| VCID-vw97-wv4u-vud6 | kernel: Revert "drm/amd: flush any delayed gfxoff on suspend entry" |
CVE-2024-26916
|
| VCID-vz55-n2g2-zyfr | kernel: f2fs: fix to tag gcing flag on page during block migration |
CVE-2023-52588
|
| VCID-w1vu-htm1-cfcr | kernel: spmi: mediatek: Fix UAF on device remove |
CVE-2023-52584
|
| VCID-w45n-4su1-v7gz | kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove |
CVE-2024-26698
|
| VCID-wc3q-scn6-cfdp | kernel: scsi: Revert "scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock" |
CVE-2024-26917
|
| VCID-wg4r-kgcr-rfbe | kernel: af_unix: Fix task hung while purging oob_skb in GC. |
CVE-2024-26780
|
| VCID-wr1t-4ej9-6kdf | kernel: dmaengine: ti: edma: Add some null pointer checks to the edma_probe |
CVE-2024-26771
|
| VCID-wr73-m2yh-j3dh | kernel: net: atlantic: Fix DMA mapping for PTP hwts ring |
CVE-2024-26680
|
| VCID-wu22-etja-qqgx | kernel: scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler |
CVE-2024-26627
|
| VCID-wvwb-jxx2-ayg6 | kernel: drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup |
CVE-2024-26667
|
| VCID-ww39-6h4t-suen | kernel: scsi: target: pscsi: Fix bio_put() for error case |
CVE-2024-26760
|
| VCID-wwqj-ar5c-uucd | kernel: dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA |
CVE-2024-35833
|
| VCID-wyzb-1z24-dygv | kernel: netfilter: bridge: confirm multicast packets before passing them up the stack |
CVE-2024-27415
|
| VCID-x6j6-xyqc-guhn | kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) |
CVE-2023-52637
|
| VCID-xjqd-zx8p-2uhs | kernel: pmdomain: mediatek: fix race conditions with genpd |
CVE-2023-52645
|
| VCID-xxke-mdpj-kfbm | kernel: crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init |
CVE-2023-52616
|
| VCID-xzy7-2gsp-vbd8 | kernel: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() |
CVE-2024-26754
|
| VCID-y1n6-njkj-6uhu | kernel: drm/amd/display: Fix MST Null Ptr for RV |
CVE-2024-26700
|
| VCID-y8j1-wdx9-s3gc | kernel: l2tp: pass correct message length to ip6_append_data |
CVE-2024-26752
|
| VCID-yaps-gywk-auaf | kernel: blk-mq: fix IO hang from sbitmap wakeup race |
CVE-2024-26671
|
| VCID-yhkb-nnaf-1kbm | kernel: btrfs: dev-replace: properly validate device names |
CVE-2024-26791
|
| VCID-yk3n-6dve-wqft | kernel: wifi: mac80211: fix race condition on enabling fast-xmit |
CVE-2024-26779
|
| VCID-yqvj-f4kh-kybz | kernel: power: supply: bq27xxx-i2c: Do not free non existing IRQ |
CVE-2024-27412
|
| VCID-ys4q-tks4-g7eh | kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref |
CVE-2024-26735
|
| VCID-yu2z-4f94-mbgu | kernel: drm/amdkfd: lock dependency warning with srcu |
CVE-2023-52632
|
| VCID-yvy9-zzev-f3gw | kernel: net: sparx5: Fix use after free inside sparx5_del_mact_entry |
CVE-2024-26856
|
| VCID-ywtf-xf5k-xfeb | kernel: nvme-fc: do not wait in vain when unloading module |
CVE-2024-26846
|
| VCID-zdyy-tzus-eubm | kernel: HID: i2c-hid-of: fix NULL-deref on failed power up |
CVE-2024-26717
|
| VCID-zfyf-xpsw-cuaf | kernel: usb: roles: fix NULL pointer issue when put module's reference |
CVE-2024-26747
|
| VCID-zmdz-axz5-akgj | kernel: crypto: arm64/neonbs - fix out-of-bounds access on short input |
CVE-2024-26789
|
| VCID-zq9r-4e9s-e3gn | kernel: fs/ntfs3: NULL pointer dereference issue |
CVE-2023-52631
|