Search for packages
| purl | pkg:deb/debian/linux@6.10.11-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1g53-791b-8fd7 | kernel: drm/amd/display: Validate function returns |
CVE-2024-46775
|
| VCID-22zw-13pm-fkct | kernel: scsi: pm80xx: Set phy->enable_completion only when we wait for it |
CVE-2024-47666
|
| VCID-2chj-sx99-t7hw | kernel: ice: move netif_queue_set_napi to rtnl-protected sections |
CVE-2024-46766
|
| VCID-2juk-2zz6-27bd | kernel: ASoC: Intel: soc-acpi-intel-mtl-match: add missing empty item |
CVE-2024-46862
|
| VCID-2y3b-ezx9-6bcg | kernel: net: phy: dp83822: Fix NULL pointer dereference on DP83825 devices |
CVE-2024-46856
|
| VCID-3ryc-kxde-9kew | kernel: xen: privcmd: Fix possible access to a freed kirqfd instance |
CVE-2024-46762
|
| VCID-3var-3dbf-rubz | kernel: usb: gadget: aspeed_udc: validate endpoint index for ast udc |
CVE-2024-46836
|
| VCID-3yf8-k2fy-ckf4 | kernel: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry |
CVE-2024-46822
|
| VCID-42cm-szry-pqcj | kernel: btrfs: handle errors from btrfs_dec_ref() properly |
CVE-2024-46753
|
| VCID-4mqj-4655-abgf | kernel: fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF |
CVE-2024-46786
|
| VCID-5256-8g7c-cyc6 | kernel: bpf: add check for invalid name in btf_name_valid_section() |
CVE-2024-46764
|
| VCID-56h2-bdrq-3yeh | kernel: perf/aux: Fix AUX buffer serialization |
CVE-2024-46713
|
| VCID-5716-hhg8-ryb6 | kernel: spi: rockchip: Resolve unbalanced runtime PM / system PM handling |
CVE-2024-46846
|
| VCID-5e2f-3cvw-tkg5 | kernel: ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery() |
CVE-2024-46735
|
| VCID-5ea3-gwak-sbf6 | kernel: btrfs: clean up our handling of refs == 0 in snapshot delete |
CVE-2024-46840
|
| VCID-5vfe-6xqu-vyfy | kernel: ila: call nf_unregister_net_hooks() sooner |
CVE-2024-46782
|
| VCID-6152-rej9-3qcv | kernel: tracing/osnoise: Use a cpumask to know what threads are kthreads |
CVE-2024-46788
|
| VCID-6j2g-psar-pyhj | kernel: usbnet: ipheth: do not stop RX on failing RX callback |
CVE-2024-46861
|
| VCID-6vrh-qer8-aqfa | kernel: hwmon: (adc128d818) Fix underflows seen when writing limit attributes |
CVE-2024-46759
|
| VCID-75cj-jfph-pfgj | kernel: wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check |
CVE-2024-46825
|
| VCID-78jv-4c2n-g7at | kernel: net: ethernet: ti: am65-cpsw: Fix NULL dereference on XDP_TX |
CVE-2024-46799
|
| VCID-7hgu-jgf1-gyhu | kernel: riscv: misaligned: Restrict user access to kernel memory |
CVE-2024-46792
|
| VCID-7pcn-q4sa-yyhn | kernel: spi: intel: Add check devm_kasprintf() returned value |
CVE-2024-46769
|
| VCID-7yd6-kcr5-v7a2 | kernel: scsi: ufs: core: Remove SCSI host only if added |
CVE-2024-46843
|
| VCID-8nuj-gv19-rqg2 | kernel: smb: client: fix double put of @cfile in smb2_set_path_size() |
CVE-2024-46796
|
| VCID-8qva-q75v-y3b1 | kernel: fou: fix initialization of grc |
CVE-2024-46865
|
| VCID-8tyy-y287-3qe6 | kernel: eventfs: Use list_del_rcu() for SRCU protected list variable |
CVE-2024-46785
|
| VCID-9bj5-f3tn-fkby | kernel: mm: vmalloc: ensure vmap_block is initialised before adding to queue |
CVE-2024-46847
|
| VCID-9dwa-etzm-syhf | kernel: of/irq: Prevent device address out-of-bounds read in interrupt map walk |
CVE-2024-46743
|
| VCID-9w31-d2b3-rfg4 | kernel: smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open() |
CVE-2024-46742
|
| VCID-a51v-ajen-u7et | kernel: wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change |
CVE-2024-46860
|
| VCID-adr9-vryj-fqah | kernel: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object |
CVE-2024-46798
|
| VCID-askw-fcsn-h7c5 | kernel: staging: iio: frequency: ad9834: Validate frequency parameter value |
CVE-2024-47663
|
| VCID-aspx-2ymv-vqhb | kernel: PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) |
CVE-2024-47667
|
| VCID-bmpn-zgd9-r3d6 | kernel: ELF: fix kernel.randomize_va_space double read |
CVE-2024-46826
|
| VCID-by9q-frk7-5qaj | kernel: Squashfs: sanity check symbolic link size |
CVE-2024-46744
|
| VCID-cf8d-ma6m-c3g3 | kernel: btrfs: replace BUG_ON() with error handling at update_ref_for_cow() |
CVE-2024-46752
|
| VCID-d7mp-beeu-a3d8 | kernel: perf/x86/intel: Limit the period on Haswell |
CVE-2024-46848
|
| VCID-dhdb-gj1j-9ufk | kernel: btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() |
CVE-2024-46841
|
| VCID-e495-c57w-tkft | kernel: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware |
CVE-2024-47664
|
| VCID-e5jj-cumq-1qeg | kernel: ksmbd: unset the binding mark of a reused connection |
CVE-2024-46795
|
| VCID-e6b3-8s65-nbhj | kernel: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS |
CVE-2024-46830
|
| VCID-e6c8-xx93-vbcx | kernel: mptcp: pm: Fix uaf in __timer_delete_sync |
CVE-2024-46858
|
| VCID-efq9-b6xc-nffv | kernel: misc: fastrpc: Fix double free of 'buf' in error path |
CVE-2024-46741
|
| VCID-eng5-npdr-qbff | kernel: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup |
CVE-2024-46747
|
| VCID-epms-7dzu-6kaq | kernel: i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup |
CVE-2024-47665
|
| VCID-exfu-sgtk-d7a7 | kernel: dma-buf: heaps: Fix off-by-one in CMA heap fault handler |
CVE-2024-46852
|
| VCID-f35u-ajp9-aub7 | kernel: PCI: Add missing bridge lock to pci_bus_lock() |
CVE-2024-46750
|
| VCID-f7nv-pzr1-r3e7 | kernel: net: dpaa: Pad packets to ETH_ZLEN |
CVE-2024-46854
|
| VCID-ffjq-6qe6-mkbb | kernel: um: line: always fill *error_out in setup_one_line() |
CVE-2024-46844
|
| VCID-fgd8-hc11-u3g4 | kernel: sched: sch_cake: fix bulk flow accounting logic for host fairness |
CVE-2024-46828
|
| VCID-fk6p-cjft-2fbt | kernel: btrfs: fix race between direct IO write and fsync when using same fd |
CVE-2024-46734
|
| VCID-fws4-y57e-c7a4 | kernel: nilfs2: protect references to superblock parameters exposed in sysfs |
CVE-2024-46780
|
| VCID-g3g6-9bef-dqdb | kernel: ASoC: Intel: Boards: Fix NULL pointer deref in BYT/CHT boards harder |
CVE-2024-46793
|
| VCID-g7g9-zung-9fgb | kernel: HID: amd_sfh: free driver_data after destroying hid device |
CVE-2024-46746
|
| VCID-gcqh-ytsa-f7g1 | kernel: drm/amd/display: Run DC_LOG_DC after checking link->link_enc |
CVE-2024-46776
|
| VCID-gdt1-jgex-eug8 | kernel: nvmet-tcp: fix kernel crash if commands allocation fails |
CVE-2024-46737
|
| VCID-gh5z-xrgd-9bcs | kernel: net/mlx5: Fix bridge mode operations when there are no VFs |
CVE-2024-46857
|
| VCID-ghmv-y2s4-7fcp | kernel: drm/amd/display: Check denominator crb_pipes before used |
CVE-2024-46772
|
| VCID-gv6s-wsnd-t3em | kernel: ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item |
CVE-2024-46863
|
| VCID-gy8t-jfpr-efaj | kernel: netfilter: nft_socket: fix sk refcount leaks |
CVE-2024-46855
|
| VCID-gzfh-c35y-2kh4 | kernel: wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() |
CVE-2024-46755
|
| VCID-h2vv-g11m-aqcv | kernel: drm/panthor: Restrict high priorities on group_create |
CVE-2024-46837
|
| VCID-haaz-25w4-wfg4 | kernel: nilfs2: fix missing cleanup on rollforward recovery error |
CVE-2024-46781
|
| VCID-hkx2-59tk-p3fr | kernel: tracing/timerlat: Only clear timer if a kthread exists |
CVE-2024-46845
|
| VCID-hwat-fnmq-vydn | kernel: userfaultfd: fix checks for huge PMDs |
CVE-2024-46787
|
| VCID-hyrr-ze68-c3by | kernel: cachefiles: Set the max subreq size for cache writes to MAX_RW_COUNT |
CVE-2024-46748
|
| VCID-hzfz-z24r-w7h7 | kernel: smb: client: fix double put of @cfile in smb2_rename_path() |
CVE-2024-46736
|
| VCID-j6tp-1cya-kka2 | kernel: drm/amd/display: Check UnboundedRequestEnabled's value |
CVE-2024-46778
|
| VCID-jbkc-8tms-33g8 | kernel: sch/netem: fix use after free in netem_dequeue |
CVE-2024-46800
|
| VCID-jj78-a4gk-wudp | kernel: uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind |
CVE-2024-46739
|
| VCID-jupy-x3sh-vqcp | kernel: bpf: Remove tst_run from lwt_seg6local_prog_ops. |
CVE-2024-46754
|
| VCID-jw6e-24ag-3ucs | kernel: can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open |
CVE-2024-46791
|
| VCID-jyt8-8n8z-5yaq | kernel: kunit/overflow: Fix UB in overflow_allocation_test |
CVE-2024-46823
|
| VCID-k29n-spa9-uqdz | kernel: ethtool: fail closed if we can't get max channel used in indirection tables |
CVE-2024-46834
|
| VCID-myzt-t2h1-ubav | kernel: binder: fix UAF caused by offsets overwrite |
CVE-2024-46740
|
| VCID-n4hs-s6e7-f7c1 | kernel: btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() |
CVE-2024-46751
|
| VCID-ndba-795t-afgp | kernel: net: hns3: void array out of bound when loop tnl_num |
CVE-2024-46833
|
| VCID-nh1c-h3td-tkc7 | kernel: nilfs2: fix state management in error path of log writing function |
CVE-2024-47669
|
| VCID-nuzn-h4hz-hyh4 | kernel: spi: nxp-fspi: fix the KASAN report out-of-bounds bug |
CVE-2024-46853
|
| VCID-p73g-gujt-rqgs | kernel: drm/imagination: Free pvr_vm_gpuva after unlink |
CVE-2024-46779
|
| VCID-p8k5-tr7y-vffx | kernel: drm/amdgpu: Fix smatch static checker warning |
CVE-2024-46835
|
| VCID-paq6-d6fg-fbaa | kernel: ASoC: meson: axg-card: fix 'use-after-free' |
CVE-2024-46849
|
| VCID-pkrj-hds8-5bfp | kernel: wifi: ath12k: fix firmware crash due to invalid peer nss |
CVE-2024-46827
|
| VCID-prcs-72d6-pbe1 | kernel: x86/hyperv: fix kexec crash due to VP assist page corruption |
CVE-2024-46864
|
| VCID-q2hs-ferx-fuds | kernel: udf: Avoid excessive partition lengths |
CVE-2024-46777
|
| VCID-q6ez-rrgj-p3ht | kernel: can: bcm: Remove proc entry when dev is unregistered. |
CVE-2024-46771
|
| VCID-r23v-vjat-6qdk | kernel: ice: protect XDP configuration with a mutex |
CVE-2024-46765
|
| VCID-r5y9-2rqq-g3ce | kernel: drm/xe/client: add missing bo locking in show_meminfo() |
CVE-2024-46866
|
| VCID-rd2g-en5y-6fbf | kernel: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv |
CVE-2024-46761
|
| VCID-rfzv-5u3a-fuh9 | kernel: libfs: fix get_stashed_dentry() |
CVE-2024-46801
|
| VCID-rk9d-uwzn-47d7 | kernel: drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct() |
CVE-2024-46851
|
| VCID-rtyn-p5g7-8yfp | kernel: net: phy: Fix missing of_node_put() for leds |
CVE-2024-46767
|
| VCID-ru4t-7413-7kay | kernel: tcp_bpf: fix return value of tcp_bpf_sendmsg() |
CVE-2024-46783
|
| VCID-sddt-bfaw-zbew | kernel: net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup |
CVE-2024-46784
|
| VCID-sj8w-m8hv-xfbe | kernel: codetag: debug: mark codetags for poisoned page as empty |
CVE-2024-46790
|
| VCID-sm2c-62u9-5kaz | kernel: scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info |
CVE-2024-46842
|
| VCID-srvy-853g-rbdt | kernel: hwmon: (hp-wmi-sensors) Check if WMI event data exists |
CVE-2024-46768
|
| VCID-t5d6-k453-mug7 | kernel: rtmutex: Drop rt_mutex::wait_lock before scheduling |
CVE-2024-46829
|
| VCID-t6g3-n2fm-abg8 | kernel: mm: avoid leaving partial pfn mappings around in error case |
CVE-2024-47674
|
| VCID-ursm-7smd-c3as | kernel: drm/amd/display: Avoid race between dcn35_set_drr() and dc_state_destruct() |
CVE-2024-46850
|
| VCID-v3up-q48a-efhg | kernel: ice: Add netif_device_attach/detach into PF reset flow |
CVE-2024-46770
|
| VCID-v4mk-9evk-fkdr | kernel: powerpc/qspinlock: Fix deadlock in MCS queue |
CVE-2024-46797
|
| VCID-v9vh-3bu7-q7cn | kernel: fou: Fix null-ptr-deref in GRO. |
CVE-2024-46763
|
| VCID-vgea-u817-jbg5 | kernel: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses |
CVE-2024-46859
|
| VCID-w1ta-rphv-vqd6 | kernel: iommufd: Require drivers to supply the cache_invalidate_user ops |
CVE-2024-46824
|
| VCID-wcet-4wex-rfdy | kernel: MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed |
CVE-2024-46832
|
| VCID-wfpz-5vq9-17fh | kernel: mm/slub: add check for s->flags in the alloc_tagging_slab_free_hook |
CVE-2024-46789
|
| VCID-wgny-q352-gfg8 | kernel: drm/xe/client: fix deadlock in show_meminfo() |
CVE-2024-46867
|
| VCID-x6kd-y436-nbaw | kernel: wifi: rtw88: usb: schedule rx work after everything is set up |
CVE-2024-46760
|
| VCID-x8he-jwxh-s7bt | kernel: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() |
CVE-2024-47668
|
| VCID-xue4-a62k-e7hx | kernel: userfaultfd: don't BUG_ON() if khugepaged yanks our page table |
CVE-2024-46838
|
| VCID-y78e-a98j-afgk | kernel: x86/tdx: Fix data leak in mmio_read() |
CVE-2024-46794
|
| VCID-yasq-85v6-8bfv | kernel: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() |
CVE-2024-46774
|
| VCID-yuwc-h2qn-r7dv | kernel: drm/amd/display: Check denominator pbn_div before used |
CVE-2024-46773
|
| VCID-ywnx-fxr4-cudy | kernel: Input: uinput - reject requests with unreasonable number of slots |
CVE-2024-46745
|
| VCID-zfp8-zgya-7fa5 | kernel: firmware: qcom: uefisecapp: Fix deadlock in qcuefi_acquire() |
CVE-2024-46868
|
| VCID-zmp7-m12g-zuby | kernel: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() |
CVE-2024-46738
|
| VCID-zne9-cpju-vqb6 | kernel: net: microchip: vcap: Fix use-after-free error in kunit test |
CVE-2024-46831
|
| VCID-ztb3-pmup-j7hr | kernel: Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush() |
CVE-2024-46749
|