Search for packages
| purl | pkg:deb/debian/linux@6.1.94-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-13u4-t725-7qh1 | kernel: eth: sungem: remove .ndo_poll_controller to avoid deadlocks |
CVE-2024-38597
|
| VCID-16dz-9bnx-uybv | kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() |
CVE-2024-36028
|
| VCID-1btx-dvze-suhw | kernel: usb: typec: tcpm: Check for port partner validity before consuming it |
CVE-2024-36893
|
| VCID-1gaz-gg4z-9ye2 | kernel: net: kernel: UAF in network route management |
CVE-2024-36971
|
| VCID-1hpy-guxt-uuab | kernel: KEYS: trusted: Do not use WARN when encode fails |
CVE-2024-36975
|
| VCID-1mkb-qaf9-17ct | kernel: drm/amd/display: Fix potential index out of bounds in color transformation function |
CVE-2024-38552
|
| VCID-1rj6-fgs9-mbab | kernel: drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails |
CVE-2024-38390
|
| VCID-1szb-4tyc-tues | kernel: Reapply "drm/qxl: simplify qxl_fence_wait" |
CVE-2024-36944
|
| VCID-23jg-hcqu-xqgy | kernel: xdp: use flags field to disambiguate broadcast redirect |
CVE-2024-36937
|
| VCID-2mam-3mfn-cfg8 | kernel: RDMA/hns: Fix deadlock on SRQ async events. |
CVE-2024-38591
|
| VCID-2s7n-67h2-auda | kernel: s390/ap: Fix crash in AP internal function modify_bitmap() |
CVE-2024-38661
|
| VCID-3bdu-hpbb-4ycp | kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure |
CVE-2024-38543
|
| VCID-3crq-t96y-5yec | kernel: jffs2: prevent xattr node from overflowing the eraseblock |
CVE-2024-38599
|
| VCID-3mj5-4jsg-93gx | kernel: fs/ntfs3: Use variable length array instead of fixed size |
CVE-2024-38623
|
| VCID-3p12-3rg3-syhx | kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() |
CVE-2024-36955
|
| VCID-3vu2-gx5x-9ffj | kernel: f2fs: compress: don't allow unaligned truncation on released compress inode |
CVE-2024-33847
|
| VCID-4d29-bb3x-bkhy | kernel: m68k: Fix spinlock race in kernel thread creation |
CVE-2024-38613
|
| VCID-4g9m-tgs9-63hf | kernel: phonet: fix rtm_phonet_notify() skb allocation |
CVE-2024-36946
|
| VCID-4k3a-jwjk-dkfr | kernel: drm/amdgpu: add error handle to avoid out-of-bounds |
CVE-2024-39471
|
| VCID-4qed-1xmj-9qhy | kernel: net/mlx5: Add a timeout to acquire the command queue semaphore |
CVE-2024-38556
|
| VCID-4r1c-et7a-13g9 | kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge |
CVE-2024-36000
|
| VCID-4vrw-kfvp-e3b9 | kernel: cppc_cpufreq: Fix possible null pointer dereference |
CVE-2024-38573
|
| VCID-4x9b-yg59-ckbz | kernel: tools/nolibc/stdlib: fix memory error in realloc() |
CVE-2024-38585
|
| VCID-4yrc-d7ec-9feq | kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command |
CVE-2024-36977
|
| VCID-4yyb-mfy5-4fch | kernel: nilfs2: fix use-after-free of timer for log writer thread |
CVE-2024-38583
|
| VCID-4zfz-kmh8-w7hw | kernel: drm/arm/malidp: fix a possible null pointer dereference |
CVE-2024-36014
|
| VCID-5272-b1dk-e3fp | kernel: wifi: carl9170: re-fix fortified-memset warning |
CVE-2024-38616
|
| VCID-5cs1-7b6w-wff4 | kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() |
CVE-2024-36924
|
| VCID-5jx3-bsa8-1qeq | kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout |
CVE-2024-27399
|
| VCID-5qdm-uk8j-vqaf | kernel: ring-buffer: Fix a race between readers and resize checks |
CVE-2024-38601
|
| VCID-5qjx-s9vp-4bbx | kernel: btrfs: fix crash on racing fsync and size-extending write into prealloc |
CVE-2024-37354
|
| VCID-5u3f-dumb-gfej | kernel: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout |
CVE-2024-27398
|
| VCID-62pu-agc8-nfaa | kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference |
CVE-2024-36891
|
| VCID-6b1b-mjtq-ffc2 | kernel: bpf: Allow delete from sockmap/sockhash only if update is allowed |
CVE-2024-38662
|
| VCID-6d6c-5dys-ayhh | kernel: nfc: nci: Fix uninit-value in nci_rx_work |
CVE-2024-38381
|
| VCID-6kt2-tzb7-4ybp | kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING |
CVE-2024-36920
|
| VCID-6y86-317b-jfgs | kernel: dyndbg: fix old BUG_ON in >control parser |
CVE-2024-35947
|
| VCID-6yqt-zn3j-7fck | kernel: kdb: Fix buffer overflow during tab-complete |
CVE-2024-39480
|
| VCID-72u6-pymj-mfhu | kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). |
CVE-2024-36933
|
| VCID-73mt-g8xh-xfbj | kernel: drm/vmwgfx: Fix invalid reads in fence signaled events |
CVE-2024-36960
|
| VCID-74mv-tu5w-ufay | kernel: ALSA: core: Fix NULL module pointer assignment at card init |
CVE-2024-38605
|
| VCID-75yg-gdmt-vfg8 | kernel: f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode() |
CVE-2024-39467
|
| VCID-7b78-ws69-uqc7 | kernel: soundwire: cadence: fix invalid PDI offset |
CVE-2024-38635
|
| VCID-7ufd-q9uj-wbhu | kernel: stm class: Fix a double free in stm_register_device() |
CVE-2024-38627
|
| VCID-7xsp-3dyr-ukgp | kernel: kunit: Fix kthread reference |
CVE-2024-38561
|
| VCID-845t-r1rb-fqbj | kernel: rcu: Fix buffer overflow in print_cpu_stall_info() |
CVE-2024-38576
|
| VCID-86gk-aqa2-43fa | kernel: wifi: ar5523: enable proper endpoint verification |
CVE-2024-38565
|
| VCID-87v5-p3qy-akhk | kernel: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow |
CVE-2024-38624
|
| VCID-88ec-dhuf-yfh8 | kernel: serial: max3100: Lock port->lock when calling uart_handle_cts_change() |
CVE-2024-38634
|
| VCID-8gsf-9fbu-nuey | kernel: wifi: carl9170: add a proper sanity check for endpoints |
CVE-2024-38567
|
| VCID-8he7-jqy4-ufc5 | kernel: qibfs: fix dentry leak |
CVE-2024-36947
|
| VCID-8pa6-1src-eub8 | kernel: block: fix overflow in blk_ioctl_discard() |
CVE-2024-36917
|
| VCID-9aye-3p6m-efen | kernel: 9p: add missing locking around taking dentry fid list |
CVE-2024-39463
|
| VCID-9ec3-yxds-4kbs | kernel: smb: client: fix deadlock in smb2_find_smb_tcon() |
CVE-2024-39468
|
| VCID-9w92-jwnf-tqab | kernel: drm/amd/display: Fix division by zero in setup_dsc_config |
CVE-2024-36969
|
| VCID-9wx6-3xb1-m7c9 | kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg |
CVE-2024-38596
|
| VCID-a713-geaa-v3gy | kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE |
CVE-2024-36926
|
| VCID-ary4-fza6-tybg | kernel: enic: Validate length of nl attributes in enic_set_vf_port |
CVE-2024-38659
|
| VCID-asru-czwx-kybc | kernel: cpufreq: exit() callback is optional |
CVE-2024-38615
|
| VCID-ax1j-ur4f-r3aq | kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() |
CVE-2023-52585
|
| VCID-b6yd-s1sc-m3br | kernel: riscv: prevent pt_regs corruption for secondary idle threads |
CVE-2024-38667
|
| VCID-b746-drvq-37hn | kernel: TIPC message reassembly use-after-free remote code execution vulnerability |
CVE-2024-36886
|
| VCID-b8ds-ns33-2kad | kernel: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() |
CVE-2024-36959
|
| VCID-bhwg-ksns-pbhn | kernel: md: fix kmemleak of rdev->serial |
CVE-2024-26900
|
| VCID-bvw2-zsb7-zybx | kernel: speakup: Fix sizeof() vs ARRAY_SIZE() bug |
CVE-2024-38587
|
| VCID-c31r-c9qm-xuhe | kernel: drm/amdgpu/mes: fix use-after-free issue |
CVE-2024-38581
|
| VCID-c3nf-jvu3-pyg3 | kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). |
CVE-2024-37356
|
| VCID-cef6-t3fj-tfap | kernel: ALSA: timer: Set lower bound of start tick time |
CVE-2024-38618
|
| VCID-cg39-mea5-xugm | kernel: media: stk1160: fix bounds checking in stk1160_copy_video() |
CVE-2024-38621
|
| VCID-cjdt-rytz-r7dy | kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 |
CVE-2024-38558
|
| VCID-cjp6-jxsx-mffx | kernel: net/9p: fix uninit-value in p9_client_rpc() |
CVE-2024-39301
|
| VCID-cmpm-gy15-tqch | kernel: net/mlx5: Discard command completions in internal error |
CVE-2024-38555
|
| VCID-cpub-yx9n-2kdx | kernel: serial: max3100: Update uart_driver_registered on driver removal |
CVE-2024-38633
|
| VCID-cy4u-dp82-7uag | kernel: blk-iocost: avoid out of bounds shift |
CVE-2024-36916
|
| VCID-dcg6-ew1b-37dz | kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs |
CVE-2024-36929
|
| VCID-dfnv-4knh-mban | kernel: thermal/drivers/tsens: Fix null pointer dereference |
CVE-2024-38571
|
| VCID-dkuv-uajy-z7hh | kernel: net: relax socket state check at accept time. |
CVE-2024-36484
|
| VCID-dqpz-g4ub-wqh9 | kernel: bna: ensure the copied buf is NUL terminated |
CVE-2024-36934
|
| VCID-dz4e-s494-rqb3 | kernel: net: bridge: mst: fix vlan use-after-free |
CVE-2024-36979
|
| VCID-e6by-z2hh-8qe9 | kernel: dma-mapping: benchmark: fix node id validation |
CVE-2024-34777
|
| VCID-e88z-rxbc-1yfz | kernel: media: lgdt3306a: Add a check against null-pointer-def |
CVE-2022-48772
|
| VCID-e981-6wkh-kfc4 | kernel: crypto: bcm - Fix pointer arithmetic |
CVE-2024-38579
|
| VCID-ehax-156z-z3du | kernel: f2fs: multidev: fix to recognize valid zero block address |
CVE-2024-38636
|
| VCID-eq1t-p8xt-1kcb | kernel: efi: libstub: only free priv.runtime_map when allocated |
CVE-2024-33619
|
| VCID-eqrs-ebsv-ckfe | kernel: spi: fix null pointer dereference within spi_sync |
CVE-2024-36930
|
| VCID-eswy-ps47-8fex | kernel: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl |
CVE-2024-36912
|
| VCID-eumc-r17x-skh8 | kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation |
CVE-2024-36017
|
| VCID-ex74-t2p2-dydf | kernel: net: hns3: fix kernel crash when devlink reload during initialization |
CVE-2024-36900
|
| VCID-ezwk-8s3n-5ygu | kernel: Input: cyapa - add missing input core locking to suspend/resume functions |
CVE-2023-52884
|
| VCID-f43g-bwp1-yufx | kernel: ecryptfs: Fix buffer size for tag 66 packet |
CVE-2024-38578
|
| VCID-f46y-3euy-q7gg | kernel: RDMA/hns: Fix UAF for cq async event |
CVE-2024-38545
|
| VCID-f766-5qnh-pqep | kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue |
CVE-2024-36938
|
| VCID-fgjg-b9mr-23h9 | kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. |
CVE-2024-38586
|
| VCID-gz41-s9d7-3yfx | kernel: tls: fix missing memory barrier in tls_init |
CVE-2024-36489
|
| VCID-hcj1-medk-xfgn | kernel: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() |
CVE-2024-36288
|
| VCID-hk9z-ke75-dfec | kernel: wifi: nl80211: don't free NULL coalescing rule |
CVE-2024-36941
|
| VCID-hkq4-sqv1-r3df | kernel: greybus: lights: check return of get_channel_from_mode |
CVE-2024-38637
|
| VCID-hksu-xdp6-nfbt | kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY |
CVE-2024-39488
|
| VCID-hmr2-4zsa-tffa | kernel: firewire: ohci: mask bus reset interrupts between ISR and bottom half |
CVE-2024-36950
|
| VCID-hn3a-kr41-cydp | kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload |
CVE-2024-36919
|
| VCID-hwqf-vtx4-jycu | kernel: Bluetooth: qca: add missing firmware sanity checks |
CVE-2024-36880
|
| VCID-jecd-ars7-nqdq | kernel: ipv6: sr: fix memleak in seg6_hmac_init_algo |
CVE-2024-39489
|
| VCID-jnw6-dx6k-9fh8 | kernel: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change |
CVE-2023-52882
|
| VCID-jp67-mtvm-83ch | kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP |
CVE-2024-36974
|
| VCID-jtvm-agk1-87am | kernel: af_unix: Update unix_sk(sk)->oob_skb under sk_receive_queue lock |
CVE-2024-36972
|
| VCID-jwps-a8wj-eyck | kernel: fs/9p: only translate RWX permissions for plain 9P2000 |
CVE-2024-36964
|
| VCID-k55u-tqsr-gqcy | kernel: pinctrl: core: delete incorrect free in pinctrl_enable() |
CVE-2024-36940
|
| VCID-k9yz-p7ch-vua1 | kernel: s390/qeth: Fix kernel panic after setting hsuid |
CVE-2024-36928
|
| VCID-khmq-fsdr-q7bp | kernel: netrom: fix possible dead-lock in nr_rt_ioctl() |
CVE-2024-38589
|
| VCID-kq34-vrat-17f4 | kernel: ARM: 9381/1: kasan: clear stale stack poison |
CVE-2024-36906
|
| VCID-kyru-d7tb-hyf3 | kernel: rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow |
CVE-2024-38577
|
| VCID-kyz7-3nqm-5fcf | kernel: bcache: fix variable length array abuse in btree_iter |
CVE-2024-39482
|
| VCID-m1bw-bxha-m7gj | kernel: scsi: qedf: Ensure the copied buf is NUL terminated |
CVE-2024-38559
|
| VCID-m3tm-er2s-8kex | kernel: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak |
CVE-2024-39493
|
| VCID-m4mt-jnhw-pqgf | kernel: bpf: Check bloom filter map value size |
CVE-2024-36918
|
| VCID-m5sg-ney3-8kb5 | kernel: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() |
CVE-2024-38780
|
| VCID-m6cv-w35d-sye1 | kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup |
CVE-2024-38388
|
| VCID-mm6m-hj9m-hqab | kernel: mm: use memalloc_nofs_save() in page_cache_ra_order() |
CVE-2024-36882
|
| VCID-mme1-5xt2-p7hx | kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route() |
CVE-2024-36945
|
| VCID-mnqb-zv4g-ebd9 | kernel: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group |
CVE-2024-38568
|
| VCID-mpyx-hk8u-13d1 | kernel: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group |
CVE-2024-38569
|
| VCID-mtq8-yund-eyem | kernel: s390/cio: Ensure the copied buf is NUL terminated |
CVE-2024-36931
|
| VCID-n3fs-vy4p-nbhy | kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode() |
CVE-2024-36967
|
| VCID-n93r-qr7w-vuec | kernel: firewire: nosy: ensure user_length is taken into account when fetching packet contents |
CVE-2024-27401
|
| VCID-nywh-bpaa-bybb | kernel: fbdev: savage: Handle err return when savagefb_check_var failed |
CVE-2024-39475
|
| VCID-nzw9-bpe2-cfg8 | kernel: drm/mediatek: Add 0 size check to mtk_drm_gem_obj |
CVE-2024-38549
|
| VCID-p9n9-wja3-tbcy | kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). |
CVE-2024-36904
|
| VCID-pafa-8kts-bkgu | kernel: thermal/drivers/qcom/lmh: Check for SCM availability at probe |
CVE-2024-39466
|
| VCID-pgsa-kx7f-33cf | kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() |
CVE-2024-39276
|
| VCID-pk9z-gu4q-qbbu | kernel: nilfs2: fix potential hang in nilfs_detach_log_writer() |
CVE-2024-38582
|
| VCID-pp9m-z7ym-g7br | kernel: drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference |
CVE-2024-38548
|
| VCID-qd52-fc7u-skaf | kernel: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt |
CVE-2024-38544
|
| VCID-qdw4-u1ew-r7c3 | kernel: Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted |
CVE-2024-36909
|
| VCID-qrtn-57xu-xqfm | kernel: ipv6: prevent NULL dereference in ip6_output() |
CVE-2024-36901
|
| VCID-r5xv-e7y9-1qde | kernel: keys: Fix overwrite of key expiration on instantiation |
CVE-2024-36031
|
| VCID-r7pe-jdr1-kbf8 | kernel: wifi: brcmfmac: pcie: handle randbuf allocation failure |
CVE-2024-38575
|
| VCID-rm5n-5bud-yyff | kernel: scsi: bfa: Ensure the copied buf is NUL terminated |
CVE-2024-38560
|
| VCID-rqnp-r6y9-4qb6 | kernel: RDMA/hns: Modify the print level of CQE error |
CVE-2024-38590
|
| VCID-rxa8-4b3f-e7hx | kernel: ALSA: Fix deadlocks with kctl removals at disconnection |
CVE-2024-38600
|
| VCID-s157-59hk-97bq | kernel: md: fix resync softlockup when bitmap size is less than array size |
CVE-2024-38598
|
| VCID-s47u-ka1p-sqcz | kernel: macintosh/via-macii: Fix "BUG: sleeping function called from invalid context" |
CVE-2024-38607
|
| VCID-s69k-cfrk-6bg2 | kernel: mm/slab: make __free(kfree) accept error pointers |
CVE-2024-36890
|
| VCID-s6c6-74rf-8bb5 | kernel: remoteproc: mediatek: Make sure IPI buffer fits in L2TCM |
CVE-2024-36965
|
| VCID-sayn-p81k-67fn | kernel: USB: core: Fix access violation during port device removal |
CVE-2024-36896
|
| VCID-sb21-dhrc-7ugc | kernel: net: fix out-of-bounds access in ops_init |
CVE-2024-36883
|
| VCID-sc5s-f152-wqgf | kernel: net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs |
CVE-2024-36962
|
| VCID-sc6z-cvjh-fbg3 | kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() |
CVE-2024-36016
|
| VCID-st2v-mdq3-9qbj | kernel: gpiolib: cdev: fix uninitialised kfifo |
CVE-2024-36898
|
| VCID-tbyx-zh99-4qfj | kernel: media: mc: Fix graph walk in media_pipeline_start |
CVE-2024-39481
|
| VCID-tq3a-g5u3-vufq | kernel: fpga: region: add owner module and take its refcount |
CVE-2024-35247
|
| VCID-tqem-8n6r-ybhx | kernel: mptcp: ensure snd_nxt is properly initialized on connect |
CVE-2024-36889
|
| VCID-tqfj-k95q-f7e5 | kernel: epoll: be better about file lifetimes |
CVE-2024-38580
|
| VCID-twy3-a6w2-7ugn | kernel: drm/amdkfd: don't allow mapping the MMIO HDP page with large pages |
CVE-2024-41011
|
| VCID-tzbb-3q6d-6fgt | kernel: eeprom: at24: fix memory corruption race condition |
CVE-2024-35848
|
| VCID-u3qk-8ejb-ekba | kernel: ppdev: Add an error check in register_device |
CVE-2024-36015
|
| VCID-u59n-5bvw-kker | kernel: netfilter: tproxy: bail out if IP has been disabled on the device |
CVE-2024-36270
|
| VCID-u8c8-7x2e-fqgd | kernel: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() |
CVE-2024-38610
|
| VCID-u9js-a69a-hbau | kernel: ASoC: kirkwood: Fix potential NULL dereference |
CVE-2024-38550
|
| VCID-ub7v-5u16-xqau | kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline |
CVE-2024-31076
|
| VCID-uej8-rjx2-8ufe | kernel: dma-mapping: benchmark: handle NUMA_NO_NODE correctly |
CVE-2024-39277
|
| VCID-ueyw-9v3y-zbfd | kernel: drm/amd/display: Atom Integrated System Info v2_2 for DCN35 |
CVE-2024-36897
|
| VCID-usyd-cz63-gkfg | kernel: tipc: fix a possible memleak in tipc_buf_append |
CVE-2024-36954
|
| VCID-v67a-9d1m-zbbr | kernel: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() |
CVE-2024-38603
|
| VCID-vcr4-b98d-w7a4 | kernel: Bluetooth: qca: fix info leak when fetching fw build id |
CVE-2024-36032
|
| VCID-vdnt-dzsy-zuab | kernel: ipv6: sr: fix invalid unregister error path |
CVE-2024-38612
|
| VCID-vgzc-k8ue-5fh6 | kernel: ax25: Fix reference count leak issue of net_device |
CVE-2024-38554
|
| VCID-vh8y-zwf1-c7b8 | kernel: Bluetooth: msft: fix slab-use-after-free in msft_do_close() |
CVE-2024-36012
|
| VCID-w2c3-15t5-nuar | kernel: uio_hv_generic: Don't free decrypted memory |
CVE-2024-36910
|
| VCID-w57y-kq47-xkbe | kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING |
CVE-2024-39476
|
| VCID-wgcf-sukj-9kax | kernel: use-after-free in cec_queue_msg_fh |
CVE-2024-23848
|
| VCID-wv98-2485-f3cv | kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() |
CVE-2024-36902
|
| VCID-x22c-ausd-zfg5 | kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). |
CVE-2024-36939
|
| VCID-x82q-fm6k-6kda | kernel: smb3: missing lock when picking channel |
CVE-2024-35999
|
| VCID-x8js-rwzq-r7fk | kernel: media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries |
CVE-2024-38547
|
| VCID-xar6-gwcn-fbed | kernel: Bluetooth: qca: fix info leak when fetching board id |
CVE-2024-36033
|
| VCID-xgje-4fmc-pydz | kernel: ax25: Fix reference count leak issues of ax25_dev |
CVE-2024-38602
|
| VCID-xhn3-uqqx-7yec | kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() |
CVE-2024-36953
|
| VCID-xjap-w711-8kdn | kernel: drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 |
CVE-2024-27400
|
| VCID-xkzk-v8pm-vubj | kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound |
CVE-2024-33621
|
| VCID-xp6n-zuk6-pbbw | kernel: ftrace: Fix possible use-after-free issue in ftrace_location() |
CVE-2024-38588
|
| VCID-xqzg-b9zt-dydp | kernel: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() |
CVE-2024-36286
|
| VCID-xuj7-veq8-g3f2 | kernel: f2fs: compress: fix to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock |
CVE-2024-34027
|
| VCID-yfa4-ncak-zycy | kernel: drm: vc4: Fix possible null pointer dereference |
CVE-2024-38546
|
| VCID-yjc3-k4fv-9fay | kernel: um: Add winch to winch_handlers before registering winch IRQ |
CVE-2024-39292
|
| VCID-yuyy-u84g-1ufb | kernel: net: bridge: xmit: make sure we have at least eth header len bytes |
CVE-2024-38538
|
| VCID-z33w-mv89-h3en | kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets |
CVE-2024-36905
|
| VCID-z4vk-6hpp-9ug4 | kernel: ipv6: sr: fix missing sk_buff release in seg6_input_core |
CVE-2024-39490
|
| VCID-z5cz-xkzn-fbb6 | kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application |
CVE-2024-21823
|
| VCID-znrv-kg8b-67g7 | kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up |
CVE-2024-36952
|
| VCID-zs1j-jkav-byb3 | kernel: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. |
CVE-2024-38628
|
| VCID-zx1z-mhtk-x7cn | kernel: octeontx2-af: avoid off-by-one read from userspace |
CVE-2024-36957
|