Search for packages
| purl | pkg:deb/debian/linux@6.1.98-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3xgn-y5x1-v7em | kernel: xdp: Remove WARN() from __xdp_reg_mem_model() |
CVE-2024-42082
|
| VCID-3xmh-yxeg-uyab | kernel: net/mlx5: E-switch, Create ingress ACL when needed |
CVE-2024-42142
|
| VCID-41ur-7cwy-tyf1 | kernel: wifi: mt76: replace skb_put with skb_put_zero |
CVE-2024-42225
|
| VCID-4fhy-bbaj-9yan | kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible |
CVE-2024-42124
|
| VCID-4xre-66st-mqhj | kernel: crypto: aead,cipher - zeroize key buffer after use |
CVE-2024-42229
|
| VCID-52q3-gkq8-jqgs | kernel: IB/core: Implement a limit on UMAD receive List |
CVE-2024-42145
|
| VCID-59fk-ysn2-43ew | kernel: mm: avoid overflows in dirty throttling logic |
CVE-2024-42131
|
| VCID-5aqe-ry2y-1kcd | kernel: crypto: ecdh - explicitly zeroize private_key |
CVE-2024-42098
|
| VCID-64b6-jjdu-rkfg | kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind() |
CVE-2024-41097
|
| VCID-6q6c-286k-5kd1 | kernel: nilfs2: fix inode number range checks |
CVE-2024-42105
|
| VCID-7j6n-nqwg-qycj | kernel: powerpc/pseries: Fix scv instruction crash with kexec |
CVE-2024-42230
|
| VCID-7quz-kzpx-fqfb | kernel: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD |
CVE-2024-42161
|
| VCID-7vj5-mmz9-sqf4 | kernel: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() |
CVE-2024-42068
|
| VCID-8163-nw9c-tqav | kernel: bpf: Fix overrunning reservations in ringbuf |
CVE-2024-41009
|
| VCID-8437-vey1-x7cn | kernel: cdrom: rearrange last_media_change check to avoid unintentional overflow |
CVE-2024-42136
|
| VCID-8a4m-zrzh-xfef | kernel: ocfs2: fix DIO failure due to insufficient transaction credits |
CVE-2024-42077
|
| VCID-8nee-wq2j-4kfq | kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment |
CVE-2024-42152
|
| VCID-98vg-c3eq-jufc | kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER |
CVE-2024-42090
|
| VCID-a2es-a93m-6bhe | kernel: inet_diag: Initialize pad field in struct inet_diag_req_v2 |
CVE-2024-42106
|
| VCID-a4aq-ymqp-6yb1 | kernel: btrfs: fix adding block group to a reclaim list and the unused list during reclaim |
CVE-2024-42103
|
| VCID-a6fe-z15w-vfa7 | kernel: drm/amd/display: Check pipe offset before setting vblank |
CVE-2024-42120
|
| VCID-aeeg-udzb-3kch | kernel: net: can: j1939: Initialize unused data in j1939_send_one() |
CVE-2024-42076
|
| VCID-b4xw-xqea-fbcd | kernel: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file |
CVE-2024-42138
|
| VCID-bnhb-84ma-s7es | kernel: net/dpaa2: Avoid explicit cpumask var allocation on stack |
CVE-2024-42093
|
| VCID-c6qs-xpwm-eucz | kernel: drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep |
CVE-2024-42087
|
| VCID-cjeb-4tju-mqfg | kernel: drm/amd/display: Skip finding free audio for unknown engine_id |
CVE-2024-42119
|
| VCID-cxgg-768q-53dv | kernel: scsi: mpi3mr: Sanitise num_phys |
CVE-2024-42159
|
| VCID-ddw4-7kwf-6faq | kernel: RDMA/restrack: Fix potential invalid address access |
CVE-2024-42080
|
| VCID-dmwn-nnek-73gg | kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers |
CVE-2024-41092
|
| VCID-dqcg-m3sm-1qca | kernel: net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new |
CVE-2023-52887
|
| VCID-e3qg-mz91-t3c9 | kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes |
CVE-2024-41089
|
| VCID-ert1-ccux-83b1 | kernel: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() |
CVE-2024-42110
|
| VCID-fp7e-5d7y-fbcr | kernel: powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt. |
CVE-2024-42126
|
| VCID-fp7k-kzrv-pybz | kernel: serial: 8250_omap: Implementation of Errata i2310 |
CVE-2024-42095
|
| VCID-fxnd-53ca-1ugh | kernel: bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode |
CVE-2024-42063
|
| VCID-g3q7-91wp-dba4 | kernel: ata: libata-core: Fix double free on error |
CVE-2024-41087
|
| VCID-gf29-6gu1-7bbz | kernel: gpio: davinci: Validate the obtained number of IRQs |
CVE-2024-42092
|
| VCID-h5uc-rhns-8kfq | kernel: usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock |
CVE-2024-42085
|
| VCID-jv32-9ewn-ckcm | kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers |
CVE-2024-42070
|
| VCID-jwck-jfv1-c7ec | kernel: Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot |
CVE-2024-42137
|
| VCID-kn6a-kb3h-e7bx | kernel: nilfs2: add missing check for inode numbers on directory entries |
CVE-2024-42104
|
| VCID-ku6a-16yf-wke1 | kernel: net/iucv: Avoid explicit cpumask var allocation on stack |
CVE-2024-42094
|
| VCID-mw5v-1gp9-fyd7 | kernel: iio: chemical: bme680: Fix overflows in compensate() functions |
CVE-2024-42086
|
| VCID-p73q-3qux-qke5 | kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes |
CVE-2024-42101
|
| VCID-p9xt-2zv1-b3ff | kernel: drm/amd/display: Check index msg_id before read or write |
CVE-2024-42121
|
| VCID-pm4y-dcud-5kcy | kernel: x86: stop playing stack games in profile_pc() |
CVE-2024-42096
|
| VCID-qcb2-n6n4-23dw | kernel: ASoC: fsl-asoc-card: set priv-->pdev before using it |
CVE-2024-42089
|
| VCID-sabj-cszg-yqg6 | kernel: jffs2: Fix potential illegal address access in jffs2_free_inode |
CVE-2024-42115
|
| VCID-spaf-z2nd-jkcw | kernel: crypto: hisilicon/debugfs - Fix debugfs uninit process issue |
CVE-2024-42147
|
| VCID-t88w-bjuz-5qc9 | kernel: net: dsa: mv88e6xxx: Correct check for empty list |
CVE-2024-42224
|
| VCID-tp4y-rw9k-tyf7 | kernel: drm/lima: fix shared irq handling on driver remove |
CVE-2024-42127
|
| VCID-u9he-smjk-mfe4 | kernel: s390/pkey: Wipe sensitive data on failure |
CVE-2024-42157
|
| VCID-uq1v-xtyk-8kc8 | kernel: media: dvb-frontends: tda10048: Fix integer overflow |
CVE-2024-42223
|
| VCID-uvkf-qdzx-wyhu | kernel: ftruncate: pass a signed offset |
CVE-2024-42084
|
| VCID-uvmf-963f-bkag | kernel: netfilter: nf_tables: unconditionally flush pending work before notifier |
CVE-2024-42109
|
| VCID-vffe-tb8s-eucn | kernel: can: mcp251xfd: fix infinite loop when xmit fails |
CVE-2024-41088
|
| VCID-vng1-dbwe-t3ep | kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" |
CVE-2024-42102
|
| VCID-w6px-a9a1-1uh2 | kernel: tcp_metrics: validate source addr length |
CVE-2024-42154
|
| VCID-wcqy-8yu3-ubeb | kernel: ALSA: emux: improve patch ioctl data validation |
CVE-2024-42097
|
| VCID-x2m2-25vm-h3c3 | kernel: i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr |
CVE-2024-42153
|
| VCID-y1qm-vkq5-ekfw | kernel: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems |
CVE-2024-42073
|
| VCID-y3m6-ud9e-efe1 | kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes |
CVE-2024-41095
|
| VCID-yycj-8x1k-suf3 | kernel: drm/amdgpu: avoid using null object of framebuffer |
CVE-2024-41093
|
| VCID-z2v1-qy5j-q7ga | kernel: bnx2x: Fix multiple UBSAN array-index-out-of-bounds |
CVE-2024-42148
|
| VCID-zdgm-ab2g-nkhc | kernel: riscv: kexec: Avoid deadlock in kexec crash path |
CVE-2024-42140
|
| VCID-zq46-ub7q-6faw | kernel: f2fs: check validation of fault attrs in f2fs_build_fault_attr() |
CVE-2024-42160
|