Search for packages
| purl | pkg:deb/debian/linux@6.1.85-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-18fj-d6s1-2bch | kernel: block: Fix page refcounts for unaligned buffers in __bio_release_pages() |
CVE-2024-35826
|
| VCID-1bhe-2kp1-bbb6 | kernel: x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD |
CVE-2024-35801
|
| VCID-1fre-d7x5-ybds | kernel: vfio/pci: Disable auto-enable of exclusive INTx IRQ |
CVE-2024-27437
|
| VCID-1hdj-kwry-ckea | kernel: bluetooth: race condition in sniff_{min,max}_interval_set() |
CVE-2024-24859
|
| VCID-1htu-trsy-y3cn | kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function |
CVE-2024-24858
|
| VCID-1n3b-rbnm-t7by | kernel: smb: client: fix potential UAF in cifs_stats_proc_write() |
CVE-2024-35868
|
| VCID-1nqk-1gvy-rkf7 | kernel: inet: inet_defrag: prevent sk release while still in use |
CVE-2024-26921
|
| VCID-1qxs-rymx-7bg4 | kernel: x86, relocs: Ignore relocations in .notes section |
CVE-2024-26816
|
| VCID-1tb8-t91c-63bp | x86: Native Branch History Injection |
CVE-2024-2201
XSA-456 |
| VCID-216n-yg9g-23fx | kernel: mac802154: fix llsec key resources release in mac802154_llsec_key_del |
CVE-2024-26961
|
| VCID-27bs-xtnx-r7ge | kernel: netfilter: nft_set_pipapo: release elements in clone only from destroy path |
CVE-2024-26809
|
| VCID-29rv-78j8-abft | kernel: net: phy: micrel: Fix potential null pointer dereference |
CVE-2024-35891
|
| VCID-29y6-m14b-1bhs | kernel: crypto: qat - resolve race condition during AER recovery |
CVE-2024-26974
|
| VCID-2kmm-2mwh-yqb4 | kernel: mlxbf_gige: call request_irq() after NAPI initialized |
CVE-2024-35907
|
| VCID-2p1e-znqq-33bb | kernel: ALSA: usb-audio: Stop parsing channels bits when all channels are found. |
CVE-2024-27436
|
| VCID-2t37-rkd1-dkdh | kernel: media: go7007: fix a memleak in go7007_load_encoder |
CVE-2024-27074
|
| VCID-2z45-4fwq-23hs | kernel: wireguard: netlink: access device through ctx instead of peer |
CVE-2024-26950
|
| VCID-3af7-yp4u-tyfe | kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() |
CVE-2024-35861
|
| VCID-3bav-awtq-8qeq | kernel: PCI/PM: Drain runtime-idle callbacks before driver removal |
CVE-2024-35809
|
| VCID-3hsh-6guz-8uh7 | kernel: clk: hisilicon: hi3559a: Fix an erroneous devm_kfree() |
CVE-2024-27039
|
| VCID-3mua-qee5-aybb | kernel: nilfs2: fix failure to detect DAT corruption in btree and direct mappings |
CVE-2024-26956
|
| VCID-3r27-df68-nkh6 | kernel: tls: handle backlogging of crypto requests |
CVE-2024-26584
|
| VCID-3uut-qcy8-wbdt | kernel: f2fs: compress: fix to cover normal cluster write with cp_rwsem |
CVE-2024-27034
|
| VCID-441g-m795-kkfz | kernel: smb: client: fix potential UAF in is_valid_oplock_break() |
CVE-2024-35863
|
| VCID-45v8-ubb3-xufs | kernel: octeontx2-af: race condition on interupts |
CVE-2024-27030
|
| VCID-4cuw-brqv-m3fn | kernel: vfio/platform: Create persistent IRQ handlers |
CVE-2024-26813
|
| VCID-4e34-8wxz-kkd7 | kernel: ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs |
CVE-2024-26654
|
| VCID-4p2q-yup3-43b9 | kernel: clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays |
CVE-2024-26970
|
| VCID-57cv-hqtm-ykgr | kernel: netfilter: validate user input for expected length |
CVE-2024-35896
|
| VCID-5ydt-fnpu-p3hx | kernel: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts |
CVE-2024-26898
|
| VCID-5yqp-43hw-cuhu | kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query |
CVE-2022-38096
|
| VCID-5z54-7skw-p7hm | kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() |
CVE-2024-26928
|
| VCID-61xb-qymz-aqh9 | kernel: media: pvrusb2: fix uaf in pvr2_context_set_notify |
CVE-2024-26875
|
| VCID-6f1k-j1t4-hygc | kernel: bpf: Fix hashtab overflow check on 32-bit arches |
CVE-2024-26884
|
| VCID-6gz1-3nxd-jyd8 | kernel: USB: core: Fix deadlock in port "disable" sysfs attribute |
CVE-2024-26933
|
| VCID-6k2a-unf2-77at | kernel: drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node |
CVE-2023-52662
|
| VCID-6kr3-zexr-qfeq | kernel: x86/efistub: Call mixed mode boot services on the firmware's stack |
CVE-2024-35803
|
| VCID-6ph4-pnb9-a7g1 | kernel: crash due to a missing check for leb_size |
CVE-2024-25739
|
| VCID-6q1a-gyqe-tkct | kernel: clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays |
CVE-2024-26966
|
| VCID-6r7n-bx5b-tkdy | kernel: Integer Overflow in raid5_cache_count |
CVE-2024-23307
|
| VCID-6rp5-u6as-s7dq | kernel: iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected |
CVE-2024-26891
|
| VCID-6vd7-sjnw-x7bg | kernel: net: ethernet: mtk_eth_soc: fix PPE hanging issue |
CVE-2024-27432
|
| VCID-74ty-z7jy-hqb4 | kernel: possibility of deadlock in libbpf function sock_hash_delete_elem |
CVE-2023-0160
|
| VCID-781p-ba9u-63e8 | kernel: scsi: qla2xxx: Fix command flush on cable pull |
CVE-2024-26931
|
| VCID-782d-ry2e-23g5 | kernel: efi: fix panic in kdump kernel |
CVE-2024-35800
|
| VCID-7nh7-jczk-jyba | kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios |
CVE-2024-35872
|
| VCID-7nm5-zsbw-pkef | kernel: fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion |
CVE-2024-35815
|
| VCID-7s4v-25jh-x3hu | kernel: crypto: xilinx - call finalize with bh disabled |
CVE-2024-26877
|
| VCID-7szt-j9ps-uqcj | kernel: NTB: fix possible name leak in ntb_register_device() |
CVE-2023-52652
|
| VCID-816t-8ubf-mbdv | kernel: drm/i915/gt: Reset queue_priority_hint on parking |
CVE-2024-26937
|
| VCID-83ma-z3xa-r3cc | kernel: ubifs: Set page uptodate in the correct place |
CVE-2024-35821
|
| VCID-86ze-vdhf-b3dp | kernel: net: wwan: t7xx: Split 64bit accesses to fix alignment issues |
CVE-2024-35909
|
| VCID-89pa-kzvn-yyck | kernel: tcp: properly terminate timers for kernel sockets |
CVE-2024-35910
|
| VCID-8jw8-s1a7-2qgb | kernel: riscv: process: Fix kernel gp leakage |
CVE-2024-35871
|
| VCID-8mhy-r49h-aqhj | kernel: media: dvb-frontends: avoid stack overflow warnings with clang |
CVE-2024-27075
|
| VCID-8u9c-55ad-vucc | kernel: f2fs: compress: fix reserve_cblocks counting error when out of space |
CVE-2024-35844
|
| VCID-8xwt-5zgs-tqag | kernel: vfio/pci: Create persistent INTx handler |
CVE-2024-26812
|
| VCID-94rx-y389-xucu | kernel: firmware: arm_scmi: Fix double free in SMC transport cleanup path |
CVE-2024-26893
|
| VCID-94tm-cdt1-3fep | kernel: dm: call the resume method on internal suspend |
CVE-2024-26880
|
| VCID-95mj-ptgp-fqcm | kernel: KVM: Always flush async #PF workqueue when vCPU is being destroyed |
CVE-2024-26976
|
| VCID-95nd-thu1-n3ew | kernel: vfio/fsl-mc: Block calling interrupt handler without trigger |
CVE-2024-26814
|
| VCID-95r1-kx53-xff9 | kernel: media: edia: dvbdev: fix a use-after-free |
CVE-2024-27043
|
| VCID-9661-pt2m-2yeh | kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems |
CVE-2024-35875
|
| VCID-9ap9-2s46-1fcu | kernel: wireguard: netlink: check for dangling peer via is_dead instead of empty list |
CVE-2024-26951
|
| VCID-9bz4-gq14-1ugx | kernel: s390/zcrypt: fix reference counting on zcrypt card objects |
CVE-2024-26957
|
| VCID-9juy-tw5f-93hz | kernel: Bluetooth: hci_core: Fix possible buffer overflow |
CVE-2024-26889
|
| VCID-9m3s-crj4-73ca | kernel: drm/tegra: dsi: Add missing check for of_find_device_by_node |
CVE-2023-52650
|
| VCID-9pn2-uujx-bkha | kernel: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak |
CVE-2024-26901
|
| VCID-9rdy-mwkb-qqef | kernel: misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume |
CVE-2024-35824
|
| VCID-9uwd-c6uc-tkdr | kernel: netfilter: nf_tables: reject new basechain after table flag update |
CVE-2024-35900
|
| VCID-9xbs-pna5-6fgc | kernel: packet: annotate data-races around ignore_outgoing |
CVE-2024-26862
|
| VCID-a1mj-at6s-8bh1 | kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() |
CVE-2024-35865
|
| VCID-a3f2-zg7s-9ucw | kernel: tls: race between tx work scheduling and socket close |
CVE-2024-26585
|
| VCID-a5vc-acae-1kad | kernel: nbd: null check for nla_nest_start |
CVE-2024-27025
|
| VCID-a611-19r8-z7gu | kernel: wireguard: receive: annotate data-race around receiving_counter.counter |
CVE-2024-26861
|
| VCID-aa92-hpfv-wfa8 | kernel: serial: max310x: fix NULL pointer dereference in I2C instantiation |
CVE-2024-26978
|
| VCID-ab8k-muqg-dkds | kernel: net/sched: act_skbmod: prevent kernel-infoleak |
CVE-2024-35893
|
| VCID-acgh-g7wc-jbdx | kernel: dm-integrity: fix a memory leak when rechecking the data |
CVE-2024-26860
|
| VCID-aqb7-x1t2-xqak | kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() |
CVE-2024-26906
|
| VCID-ayru-t6ft-d7er | Linux/xen-netfront: Memory leak due to missing cleanup function |
CVE-2024-27393
|
| VCID-bezg-mxj9-pbf7 | kernel: drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' |
CVE-2024-27045
|
| VCID-bhhr-zefe-13ca | kernel: ipv6: Fix infinite recursion in fib6_dump_done(). |
CVE-2024-35886
|
| VCID-cbh2-m1hn-t7hc | kernel: mlxbf_gige: stop interface during shutdown |
CVE-2024-35885
|
| VCID-cbvg-b6j8-qka3 | kernel: USB: core: Fix deadlock in usb_deauthorize_interface() |
CVE-2024-26934
|
| VCID-cc9c-b9z4-47ds | kernel: cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value |
CVE-2024-27051
|
| VCID-cs71-k59a-eybd | kernel: erspan: make sure erspan_base_hdr is present in skb->head |
CVE-2024-35888
|
| VCID-cvfp-c9qq-9kce | kernel: wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled |
CVE-2023-52644
|
| VCID-cwda-3u57-j7fu | kernel: nilfs2: prevent kernel bug at submit_bh_wbc() |
CVE-2024-26955
|
| VCID-cz79-nh8x-b3hp | kernel: nfp: flower: handle acti_netdevs allocation failure |
CVE-2024-27046
|
| VCID-d4yk-stc7-zfcc | kernel: of: dynamic: Synchronize of_changeset_destroy() with the devlink removals |
CVE-2024-35879
|
| VCID-dd8e-mqbz-zydu | kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work |
CVE-2024-27052
|
| VCID-ddmq-dqw8-q7bz | kernel: scsi: core: Fix unremoved procfs host directory regression |
CVE-2024-26935
|
| VCID-dfke-m8r4-93aq | kernel: nvme: fix reconnection fail due to reserved tag allocation |
CVE-2024-27435
|
| VCID-e1py-puxg-t3a1 | kernel: ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down() |
CVE-2024-27390
|
| VCID-e9nf-scyj-m3c6 | kernel: KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() |
CVE-2024-35791
|
| VCID-edhz-upaz-67hk | kernel: RDMA/srpt: Do not register event handler until srpt device is fully setup |
CVE-2024-26872
|
| VCID-ef8x-nm9h-4ub2 | kernel: usb: xhci: Add error handling in xhci_map_urb_for_dma |
CVE-2024-26964
|
| VCID-eg2g-ntne-cyau | kernel: net: ll_temac: platform_get_resource replaced by wrong function |
CVE-2024-35796
|
| VCID-eje1-bk96-zuec | kernel: wifi: wilc1000: do not realloc workqueue everytime an interface is added |
CVE-2024-27391
|
| VCID-ernt-afge-yfds | kernel: spi: spi-mt65xx: Fix NULL pointer access in interrupt handler |
CVE-2024-27028
|
| VCID-ez9f-uwta-zqg7 | kernel: wifi: wilc1000: fix RCU usage in connect path |
CVE-2024-27053
|
| VCID-f375-1j2h-5bep | kernel: nouveau/dmem: handle kcalloc() allocation failure |
CVE-2024-26943
|
| VCID-fsw8-mvby-ybhx | kernel: dm snapshot: fix lockup in dm_exception_table_exit |
CVE-2024-35805
|
| VCID-fyuu-g5g4-jub3 | kernel: usb: dwc3-am62: fix module unload/reload behavior |
CVE-2024-26963
|
| VCID-g27n-hpnr-ubd7 | kernel: Bluetooth: af_bluetooth: Fix deadlock |
CVE-2024-26886
|
| VCID-gfcb-9run-4qf7 | kernel: bpf: Fix DEVMAP_HASH overflow check on 32-bit arches |
CVE-2024-26885
|
| VCID-gnfv-gh2u-jbdy | kernel: tls: get psock ref after taking rxlock to avoid leak |
CVE-2024-35908
|
| VCID-gs7j-6s9n-5ba8 | kernel: quota: Fix potential NULL pointer dereference |
CVE-2024-26878
|
| VCID-gtt3-dfpq-bfhc | kernel: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet |
CVE-2024-35915
|
| VCID-guuy-wwxv-tbc2 | security update |
CVE-2024-24861
|
| VCID-h2r4-f7z1-pycq | kernel: wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete |
CVE-2024-26897
|
| VCID-h83a-y29q-5qfd | kernel: net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check |
CVE-2024-26815
|
| VCID-hau9-6bnb-x3gy | kernel: f2fs: fix to avoid potential panic during recovery |
CVE-2024-27032
|
| VCID-hdcd-jdjt-aua7 | kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel |
CVE-2024-35884
|
| VCID-hpg6-b6qt-cuc3 | kernel: clk: Fix clk_core_get NULL dereference |
CVE-2024-27038
|
| VCID-hqws-t161-jfaf | kernel: drm/amd/display: Fix potential NULL pointer dereferences in 'dcn10_set_output_transfer_func()' |
CVE-2024-27044
|
| VCID-hr77-daky-2qap | kernel: tls: fix use-after-free on failed backlog decryption |
CVE-2024-26800
|
| VCID-japv-yaqc-rked | kernel: powerpc/pseries: Fix potential memleak in papr_get_attr() |
CVE-2022-48669
|
| VCID-jfty-1e19-qbce | kernel: ext4: fix corruption during on-line resize |
CVE-2024-35807
|
| VCID-jkdy-8t72-23g6 | kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment |
CVE-2024-26907
|
| VCID-jsmv-a8gz-1bfn | kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() |
CVE-2024-35864
|
| VCID-jvzn-x1pm-6bes | kernel: soc: fsl: qbman: Always disable interrupts when taking cgr_lock |
CVE-2024-35806
|
| VCID-jzws-ne6q-37dd | kernel: usb: gadget: ncm: Fix handling of zero block length packets |
CVE-2024-35825
|
| VCID-k67f-s7b9-aqby | kernel: nfs: fix panic when nfs4_ff_layout_prepare_ds() fails |
CVE-2024-26868
|
| VCID-kq87-a6dk-7bej | kernel: mmc: core: Avoid negative index with array access |
CVE-2024-35813
|
| VCID-kwum-sn8t-7ubu | kernel: wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach |
CVE-2024-35811
|
| VCID-m2kf-p3us-w3a1 | kernel: i40e: fix vf may be used uninitialized in this function warning |
CVE-2024-36020
|
| VCID-m2v1-tz5k-jydj | kernel: LoongArch: Define the __io_aw() hook as mmiowb() |
CVE-2024-35818
|
| VCID-mcee-d48u-pqb7 | kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes |
CVE-2024-35789
|
| VCID-mjt7-dch6-syac | kernel: net/bnx2x: Prevent access to a freed page in page_pool |
CVE-2024-26859
|
| VCID-mtcn-dcrh-qkhw | kernel: ASoC: SOF: Add some bounds checking to firmware data |
CVE-2024-26927
|
| VCID-mte5-wm6t-mfdx | kernel: io_uring/net: fix overflow check in io_recvmsg_mshot_prep() |
CVE-2024-35827
|
| VCID-mzn6-8yck-rbcn | kernel: dma-buf: Fix NULL pointer dereference in sanitycheck() |
CVE-2024-35916
|
| VCID-pc3b-6b14-c3f6 | kernel: ksmbd: validate payload size in ipc response |
CVE-2024-26811
|
| VCID-pee9-b5mt-dkft | kernel: rds: tcp: Fix use-after-free of net in reqsk_timer_handler(). |
CVE-2024-26865
|
| VCID-phjb-vw65-pka2 | kernel: clk: meson: Add missing clocks to axg_clk_regmaps |
CVE-2024-26879
|
| VCID-pkpq-wtc2-gugm | kernel: netfilter: nf_tables: flush pending destroy work before exit_net release |
CVE-2024-35899
|
| VCID-ppnn-6kpn-x3gt | kernel: media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity |
CVE-2024-27077
|
| VCID-pyq2-5rgm-8kc3 | kernel: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout |
CVE-2024-26643
|
| VCID-qfz9-k9z6-dfe3 | kernel: netfilter: nf_tables: do not compare internal table flags on updates |
CVE-2024-27065
|
| VCID-qs6z-vgr9-8bhk | kernel: mm: swap: fix race between free_swap_and_cache() and swapoff() |
CVE-2024-26960
|
| VCID-r918-hnay-pyhy | kernel: clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays |
CVE-2024-26969
|
| VCID-rafg-db4h-b3bn | kernel: USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command |
CVE-2024-27059
|
| VCID-rx1z-pc2t-xkdz | kernel: tee: optee: Fix kernel panic caused by incorrect error handling |
CVE-2024-35785
|
| VCID-s1yt-5av4-wqcg | kernel: hsr: Fix uninit-value access in hsr_get_node() |
CVE-2024-26863
|
| VCID-s1z2-acvu-p3c5 | kernel: KVM: x86: Mark target gfn of emulated atomic instruction as dirty |
CVE-2024-35804
|
| VCID-s2re-6tnf-akgc | kernel: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() |
CVE-2024-26894
|
| VCID-s2sm-14jr-73av | kernel: drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() |
CVE-2023-52661
|
| VCID-s324-upcr-2be7 | kernel: NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 |
CVE-2024-26870
|
| VCID-s9cp-epme-g7g2 | kernel: drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed |
CVE-2024-26940
|
| VCID-sgmt-udjs-nubt | kernel: drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip |
CVE-2024-26874
|
| VCID-spkh-8zw6-gkcp | kernel: bpf: Protect against int overflow for stack access size |
CVE-2024-35905
|
| VCID-ss98-4mhp-fffa | kernel: usb: udc: remove warning when queue disabled ep |
CVE-2024-35822
|
| VCID-sspu-bv8z-f7bx | kernel: smb: client: fix potential UAF in cifs_stats_proc_show() |
CVE-2024-35867
|
| VCID-ssut-45u7-8qb3 | kernel: netfilter: nf_tables: disallow anonymous set with timeout flag |
CVE-2024-26642
|
| VCID-tay6-x53s-bfet | kernel: media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak |
CVE-2024-27076
|
| VCID-tbsf-kzkh-3qc7 | kernel: vt: fix unicode buffer corruption when deleting characters |
CVE-2024-35823
|
| VCID-thmf-77ga-17hc | kernel: SUNRPC: fix some memleaks in gssx_dec_option_array |
CVE-2024-27388
|
| VCID-thxg-my7b-afcw | kernel: wifi: wfx: fix memory leak when starting AP |
CVE-2024-26896
|
| VCID-tn7p-t4zq-eqem | kernel: net/rds: fix possible cp null dereference |
CVE-2024-35902
|
| VCID-tt65-bgtb-8ugr | kernel: s390/dasd: fix double module refcount decrement |
CVE-2024-27054
|
| VCID-tth5-cn44-7ff9 | kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() |
CVE-2024-24857
|
| VCID-tv58-2k4b-qkg8 | kernel: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() |
CVE-2024-35828
|
| VCID-tyw9-5j4r-wkfa | kernel: net: hns3: fix kernel crash when devlink reload during pf initialization |
CVE-2024-36021
|
| VCID-u45m-75f6-xqfp | kernel: soc: fsl: qbman: Use raw spinlock for cgr_lock |
CVE-2024-35819
|
| VCID-uhzc-svve-4qb1 | kernel: fat: fix uninitialized field in nostale filehandles |
CVE-2024-26973
|
| VCID-ujn5-yzfe-r7gj | kernel: media: rkisp1: Fix IRQ handling due to shared interrupts |
CVE-2023-52660
|
| VCID-up4s-4efy-8yar | kernel: Use after free in brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c |
CVE-2023-47233
|
| VCID-uqpt-bysn-m3f9 | kernel: media: ttpci: fix two memleaks in budget_av_attach |
CVE-2024-27073
|
| VCID-uvsz-xsvm-p7bf | kernel: nfs: fix UAF in direct writes |
CVE-2024-26958
|
| VCID-uw1p-1ep9-8ff6 | kernel: clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays |
CVE-2024-26965
|
| VCID-uywx-y773-17hz | kernel: net: hns3: fix kernel crash when 1588 is received on HIP08 devices |
CVE-2024-26881
|
| VCID-vcp6-zp3c-hubk | kernel: wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces |
CVE-2024-26895
|
| VCID-vkuq-u2a2-97cp | kernel: drm/lima: fix a memleak in lima_heap_alloc |
CVE-2024-35829
|
| VCID-vquw-k12t-syb4 | kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination |
CVE-2024-35845
|
| VCID-vsyr-1wh4-xbaj | kernel: f2fs: compress: fix to guarantee persisting compressed blocks by CP |
CVE-2024-27035
|
| VCID-vych-yxrw-6yak | kernel: pstore: inode: Only d_invalidate() is needed |
CVE-2024-27389
|
| VCID-w4ks-e4ng-yyan | kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem |
CVE-2024-35895
|
| VCID-w6sh-c859-47h6 | kernel: x86/mm/pat: fix VM_PAT handling in COW mappings |
CVE-2024-35877
|
| VCID-wkhk-7x67-x7ec | kernel: clk: zynq: Prevent null pointer dereference caused by kmalloc failure |
CVE-2024-27037
|
| VCID-wmc4-5xua-1kch | kernel: net: phy: fix phy_get_internal_delay accessing an empty array |
CVE-2024-27047
|
| VCID-wpyc-e4ks-zudv | kernel: bpf: Fix stackmap overflow check on 32-bit arches |
CVE-2024-26883
|
| VCID-ww17-8hne-xkhj | kernel: gro: fix ownership transfer |
CVE-2024-35890
|
| VCID-wxwj-v7eh-fyd6 | kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() |
CVE-2024-35892
|
| VCID-x5hn-61gz-gfgy | kernel: vfio/pci: Lock external INTx masking ops |
CVE-2024-26810
|
| VCID-xb2z-mbx6-budz | kernel: net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv() |
CVE-2024-26882
|
| VCID-xbt4-2vaa-s3ck | kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() |
CVE-2024-35898
|
| VCID-xfnm-yjdm-kbgc | kernel: io_uring: drop any code related to SCM_RIGHTS |
CVE-2023-52656
|
| VCID-xnxv-8n8b-37gm | kernel: tcp: Fix refcnt handling in __inet_hash_connect(). |
CVE-2024-26864
|
| VCID-y4ef-tngp-63gz | kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() |
CVE-2024-35862
|
| VCID-ykfc-usas-2yfw | kernel: pci_iounmap(): Fix MMIO mapping leak |
CVE-2024-26977
|
| VCID-yqq8-ed4a-27bc | kernel: tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc |
CVE-2023-52880
|
| VCID-ytjs-9bm9-jfbu | kernel: Linux kernel: md/raid10 soft lockup due to unlimited plugged bio |
CVE-2023-53151
|
| VCID-yvjj-9h2e-6fdq | kernel: kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address |
CVE-2024-26946
|
| VCID-z665-m6nr-83hg | kernel: media: tc358743: register v4l2 async device only after successful setup |
CVE-2024-35830
|
| VCID-z9zh-be3a-k3dn | kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks |
CVE-2024-35912
|
| VCID-zrq8-mz6x-tya1 | kernel: drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag |
CVE-2024-35817
|
| VCID-zyjj-6w2w-3fdj | kernel: media: v4l2-tpg: fix some memleaks in tpg_alloc |
CVE-2024-27078
|