Search for packages
| purl | pkg:deb/debian/linux@6.1.90-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1fz1-3x2y-juab | kernel: fork: defer linking file vma until vma is fully initialized |
CVE-2024-27022
|
| VCID-1hn9-3ze2-tkbj | kernel: batman-adv: Avoid infinite loop trying to resize local TT |
CVE-2024-35982
|
| VCID-1y3t-eb99-kfdq | kernel: ksmbd: validate request buffer size in smb2_allocate_rsp_buf() |
CVE-2024-26936
|
| VCID-238x-pbyv-ykaa | kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() |
CVE-2024-35930
|
| VCID-2m9m-jm5s-hycv | kernel: i2c: smbus: fix NULL function pointer dereference |
CVE-2024-35984
|
| VCID-2sec-tfha-4ud5 | kernel: ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf |
CVE-2024-26980
|
| VCID-2ux4-bxe2-w3h9 | kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly |
CVE-2024-26922
|
| VCID-33r5-k3qg-4bdy | kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() |
CVE-2024-27019
|
| VCID-3erj-wg4r-huc9 | kernel: ipv4: check for NULL idev in ip_route_use_hint() |
CVE-2024-36008
|
| VCID-3vh9-c7m1-dubs | kernel: net/mlx5e: Prevent deadlock while disabling aRFS |
CVE-2024-27014
|
| VCID-3wc4-dm3u-syet | kernel: speakup: Avoid crash on very long word |
CVE-2024-26994
|
| VCID-3xew-rc9n-sfg8 | kernel: irqchip/gic-v3-its: Prevent double free on error |
CVE-2024-35847
|
| VCID-3yce-jdjt-tkf8 | kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit |
CVE-2024-27395
|
| VCID-48rh-n8cu-87fr | kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash |
CVE-2024-35854
|
| VCID-4aje-a5cu-ryes | kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash |
CVE-2024-36007
|
| VCID-4e3a-wpq4-vbcr | kernel: Julia Lawall reported this null pointer dereference, this should fix it. |
CVE-2024-36023
|
| VCID-4mr2-ch1g-vbfh | kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING |
CVE-2024-35976
|
| VCID-558f-uje7-f7hx | kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage |
CVE-2024-36006
|
| VCID-57g6-pfmw-gqbs | kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() |
CVE-2024-26993
|
| VCID-5f5a-x78f-pygg | kernel: af_unix: Clear stale u->oob_skb. |
CVE-2024-35970
|
| VCID-6v9k-zz25-tkga | kernel: KVM: x86/pmu: Disable support for adaptive PEBS |
CVE-2024-26992
|
| VCID-76yw-2yt8-ekbc | kernel: netfilter: nft_set_pipapo: do not free live element |
CVE-2024-26924
|
| VCID-7ht1-s4up-jkdj | kernel: dma: xilinx_dpdma: Fix locking |
CVE-2024-35990
|
| VCID-7me4-v9ak-w7da | kernel: nouveau: fix instmem race condition around ptr stores |
CVE-2024-26984
|
| VCID-7p78-wsqr-tuax | kernel: Bluetooth: btintel: Fix null ptr deref in btintel_read_version |
CVE-2024-35933
|
| VCID-7phh-a2bm-9kee | kernel: cpu: Re-enable CPU mitigations by default for !X86 architectures |
CVE-2024-35996
|
| VCID-817k-d64n-g3ez | kernel: serial: mxs-auart: add spinlock around changing cts state |
CVE-2024-27000
|
| VCID-8ekn-g2ds-bbh9 | kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr |
CVE-2024-35969
|
| VCID-8hap-636e-23bt | kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work |
CVE-2024-35852
|
| VCID-8nsp-v995-vbbz | kernel: net: ena: Fix incorrect descriptor free behavior |
CVE-2024-35958
|
| VCID-92x8-1m3a-vfb8 | kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled |
CVE-2024-26987
|
| VCID-9f4s-rt9q-byd6 | kernel: btrfs: fix information leak in btrfs_ioctl_logical_to_ino() |
CVE-2024-35849
|
| VCID-9hh7-eef4-vuh2 | kernel: sysv: don't call sb_bread() with pointers_lock held |
CVE-2023-52699
|
| VCID-9w3f-zzee-qug6 | kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB |
CVE-2024-35938
|
| VCID-a3h9-m5gg-ukce | kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion |
CVE-2024-35897
|
| VCID-bha1-btf5-dfhf | kernel: usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error |
CVE-2024-26996
|
| VCID-bk34-68fb-sfaw | kernel: net/mlx5: Properly link new fs rules into the tree |
CVE-2024-35960
|
| VCID-cah9-wdc8-73b1 | kernel: s390/cio: fix race condition during online processing |
CVE-2024-27009
|
| VCID-cbd1-5snc-37bs | kernel: smb3: fix lock ordering potential deadlock in cifs_sync_mid_result |
CVE-2024-35998
|
| VCID-d4e1-3wew-sbcc | kernel: drm/vc4: don't check if plane->state->fb == state->fb |
CVE-2024-35932
|
| VCID-d7gj-bb73-dfhg | kernel: fbmon: prevent division by zero in fb_videomode_from_videomode() |
CVE-2024-35922
|
| VCID-eeen-rmnw-wudw | kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex |
CVE-2024-35950
|
| VCID-ep87-x6sb-gyb5 | kernel: af_unix: Fix garbage collector racing against connect() |
CVE-2024-26923
|
| VCID-evne-w3ey-kud2 | kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS |
CVE-2024-35983
|
| VCID-f22d-h1n1-83fy | kernel: btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() |
CVE-2024-35936
|
| VCID-fguw-527b-h3de | kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue |
CVE-2024-36004
|
| VCID-fue2-teap-zqa5 | kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow |
CVE-2024-35959
|
| VCID-fw9k-a5nm-wke7 | kernel: ax25: Fix netdev refcount issue |
CVE-2024-36009
|
| VCID-g12g-j38e-dyag | kernel: phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered |
CVE-2024-35986
|
| VCID-g21e-w385-y7g6 | kernel: bootconfig: use memblock_free_late to free xbc memory to buddy |
CVE-2024-26983
|
| VCID-g2ge-t77f-8fdk | kernel: net: ks8851: Handle softirqs at the end of IRQ thread to fix hang |
CVE-2024-35971
|
| VCID-g6vp-7pee-2qa1 | kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update |
CVE-2024-35855
|
| VCID-ghkf-f8r8-pygj | kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses |
CVE-2024-35995
|
| VCID-gxwt-u1ck-8qd6 | kernel: netfilter: flowtable: incorrect pppoe tuple |
CVE-2024-27015
|
| VCID-h3qa-bbjk-fubq | kernel: netfilter: flowtable: validate pppoe header |
CVE-2024-27016
|
| VCID-hqgr-ehp3-hubn | kernel: binder: check offset alignment in binder_get_object() |
CVE-2024-26926
|
| VCID-jcag-qbxr-gues | kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms |
CVE-2024-35989
|
| VCID-jm2j-kgpv-x7bq | kernel: comedi: vmk80xx: fix incomplete endpoint checking |
CVE-2024-27001
|
| VCID-jpmz-hms3-q3c7 | kernel: amdkfd: use calloc instead of kzalloc to avoid integer overflow |
CVE-2024-26817
|
| VCID-krtf-1qas-67dv | kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() |
CVE-2024-36025
|
| VCID-kysr-qgch-v7d9 | kernel: drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 |
CVE-2024-36026
|
| VCID-m17d-mcs6-xqcz | kernel: geneve: fix header validation in geneve[6]_xmit_skb |
CVE-2024-35973
|
| VCID-m1fx-2hzp-8kca | kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() |
CVE-2024-27020
|
| VCID-m227-ndat-z3ey | kernel: kprobes: Fix possible use-after-free issue on kprobe registration |
CVE-2024-35955
|
| VCID-m789-2w4h-n7ap | kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() |
CVE-2024-35944
|
| VCID-mfpg-yb8m-zugn | kernel: netfilter: br_netfilter: skip conntrack input hook for promisc packets |
CVE-2024-27018
|
| VCID-mm9r-t275-tfb3 | kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() |
CVE-2024-26989
|
| VCID-myb4-d1cy-qbdb | kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() |
CVE-2024-35857
|
| VCID-nc7y-q3d6-pud7 | kernel: clk: Get runtime PM before walking tree during disable_unused |
CVE-2024-27004
|
| VCID-ndhf-fz4e-s3ef | kernel: btrfs: send: handle path ref underflow in header iterate_inode_ref() |
CVE-2024-35935
|
| VCID-nefr-3ncm-5fba | kernel: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() |
CVE-2024-35934
|
| VCID-p6ja-67pe-53hx | kernel: PCI/ASPM: Fix deadlock when enabling ASPM |
CVE-2024-26605
|
| VCID-p8fa-6gv2-5kfa | kernel: usb: dwc2: host: Fix dereference issue in DDMA completion flow. |
CVE-2024-26997
|
| VCID-ptnp-r9em-akfw | kernel: init/main.c: Fix potential static_command_line memory overflow |
CVE-2024-26988
|
| VCID-qfxj-zqq9-r7ag | kernel: Bluetooth: L2CAP: Fix not validating setsockopt user input |
CVE-2024-35965
|
| VCID-qmdu-a2qh-fkd6 | kernel: serial/pmac_zilog: Remove flawed mitigation for rx irq flood |
CVE-2024-26999
|
| VCID-qr5f-1t12-aucr | kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash |
CVE-2024-35853
|
| VCID-r4gu-5894-5kbb | kernel: drm: nv04: Fix out of bounds access |
CVE-2024-27008
|
| VCID-s6y3-ryu7-e3cb | kernel: riscv: Fix TASK_SIZE on 64-bit NOMMU |
CVE-2024-35988
|
| VCID-t5nr-dn7j-xub3 | kernel: clk: mediatek: Do a runtime PM get on controllers during probe |
CVE-2024-27002
|
| VCID-t64g-hp4n-63ds | kernel: Bluetooth: Fix memory leak in hci_req_sync_complete() |
CVE-2024-35978
|
| VCID-te3f-pzk3-4ybg | kernel: Bluetooth: SCO: Fix not validating setsockopt user input |
CVE-2024-35967
|
| VCID-tgq4-vnwq-17aj | kernel: net: gtp: Fix Use-After-Free in gtp_dellink |
CVE-2024-27396
|
| VCID-u666-tga8-2yhk | kernel: dma-direct: Leak pages on dma_set_decrypted() failure |
CVE-2024-35939
|
| VCID-u6ws-1725-xya6 | kernel: nilfs2: fix OOB in nilfs_set_de_type |
CVE-2024-26981
|
| VCID-u6z7-mqv5-8fdy | kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path |
CVE-2024-36005
|
| VCID-uahw-nmpf-rfg4 | kernel: drm/ast: Fix soft lockup |
CVE-2024-35952
|
| VCID-ub98-wzaq-vqf2 | kernel: drm/i915/vma: Fix UAF on destroy against retire race |
CVE-2024-26939
|
| VCID-ugc9-637k-n3h1 | kernel: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up |
CVE-2024-35997
|
| VCID-uk33-eafe-zya6 | kernel: netfilter: complete validation of user input |
CVE-2024-35962
|
| VCID-uv1r-bvqe-kfd2 | kernel: clk: Get runtime PM before walking tree for clk_summary |
CVE-2024-27003
|
| VCID-vx4r-v2fc-nqa4 | kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path |
CVE-2024-26925
|
| VCID-vyzk-3662-uqbh | kernel: mmc: sdhci-msm: pervent access to suspended controller |
CVE-2024-36029
|
| VCID-xhhf-day1-5ues | kernel: pstore/zone: Add a null pointer check to the psz_kmsg_read |
CVE-2024-35940
|
| VCID-xtpb-6aqb-nyhn | kernel: block: prevent division by zero in blk_rq_stat_sum() |
CVE-2024-35925
|
| VCID-xx33-z963-87dg | kernel: phy: marvell: a3700-comphy: Fix out of bounds read |
CVE-2024-35992
|
| VCID-yg9a-u6pj-tkce | kernel: virtio_net: Do not send RSS key if it is not supported |
CVE-2024-35981
|
| VCID-z3cd-cps8-5khf | kernel: tun: limit printing rate when illegal packet received by tun dev |
CVE-2024-27013
|
| VCID-zptt-ueds-qkcf | kernel: Bluetooth: qca: fix NULL-deref on non-serdev suspend |
CVE-2024-35851
|