Search for packages
| purl | pkg:deb/debian/linux@6.11.2-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-19rb-87p4-hybx | kernel: nilfs2: fix potential oob read in nilfs_btree_check_delete() |
CVE-2024-47757
|
| VCID-1z5b-831k-c7aq | kernel: block: fix potential invalid pointer dereference in blk_add_partition |
CVE-2024-47705
|
| VCID-29kj-8mrt-aucn | kernel: bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos |
CVE-2024-49850
|
| VCID-2jrm-ra8a-tua7 | kernel: iommufd: Protect against overflow of ALIGN() during iova allocation |
CVE-2024-47719
|
| VCID-37dd-benh-dbdr | kernel: tpm: Clean up TPM space after command failure |
CVE-2024-49851
|
| VCID-3dw8-cjmf-2fdp | kernel: PCI: keystone: Fix if-statement expression in ks_pcie_quirk() |
CVE-2024-47756
|
| VCID-41r7-j3vy-rycp | kernel: ext4: check stripe size compatibility on remount as well |
CVE-2024-47700
|
| VCID-4kbk-38g4-6kb7 | kernel: bpf, lsm: Add check for BPF LSM return value |
CVE-2024-47703
|
| VCID-557v-vh74-gkdx | kernel: crypto: hisilicon/qm - inject error before stopping queue |
CVE-2024-47730
|
| VCID-5e6t-ybvx-uufr | kernel: ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate() |
CVE-2024-47686
|
| VCID-5p3d-dvyu-kuff | kernel: drivers/perf: Fix ali_drw_pmu driver interrupt status clearing |
CVE-2024-47731
|
| VCID-78ud-gtge-37h8 | kernel: firmware_loader: Block path traversal |
CVE-2024-47742
|
| VCID-7mrh-h913-hyc3 | kernel: ACPI: sysfs: validate return type of _STR method |
CVE-2024-49860
|
| VCID-7snz-vnyt-b7fb | kernel: ext4: avoid OOB when system.data xattr changes underneath the filesystem |
CVE-2024-47701
|
| VCID-86na-tcsy-s7gu | kernel: crypto: iaa - Fix potential use after free bug |
CVE-2024-47732
|
| VCID-8phf-wj44-u3hc | kernel: mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway |
CVE-2024-47676
|
| VCID-8sb2-qck7-ryet | kernel: vfs: fix race between evice_inodes() and find_inode()&iput() |
CVE-2024-47679
|
| VCID-9dwf-wu39-sbev | kernel: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition |
CVE-2024-47747
|
| VCID-9fkj-rjq9-rydn | kernel: f2fs: fix to wait dio completion |
CVE-2024-47726
|
| VCID-9map-hxxc-r7hb | kernel: wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param |
CVE-2024-47712
|
| VCID-9t4w-7npg-8kbt | kernel: sock_map: Add a cond_resched() in sock_hash_free() |
CVE-2024-47710
|
| VCID-a36g-8fby-2kht | kernel: nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() |
CVE-2024-47699
|
| VCID-aepw-c8cg-y7bj | kernel: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() |
CVE-2024-47685
|
| VCID-ah3a-9gpr-5ubt | kernel: icmp: change the order of rate limits |
CVE-2024-47678
|
| VCID-ak7d-8cgy-ckh2 | kernel: jfs: fix out-of-bounds in dbNextAG() and diAlloc() |
CVE-2024-47723
|
| VCID-awa8-kh47-yydn | kernel: driver core: Fix a potential null-ptr-deref in module_add_driver() |
CVE-2024-47688
|
| VCID-b74y-6ry9-b7b2 | kernel: af_unix: Don't return OOB skb in manage_oob(). |
CVE-2024-47711
|
| VCID-besd-5py2-47g2 | kernel: padata: use integer wrap around to prevent deadlock on seq_nr overflow |
CVE-2024-47739
|
| VCID-bfwj-zxfv-aff1 | kernel: ARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros |
CVE-2024-47716
|
| VCID-bhmn-6amr-k3cm | kernel: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func |
CVE-2024-47720
|
| VCID-c6yj-9hqw-wqgx | kernel: exfat: resolve memory leak from exfat_create_upcase_table() |
CVE-2024-47677
|
| VCID-cd8c-vv2j-r3hw | kernel: can: bcm: Clear bo->bcm_proc_read after remove_proc_entry(). |
CVE-2024-47709
|
| VCID-cpvn-t6gc-1qcb | kernel: f2fs: check discard support for conventional zones |
CVE-2024-47680
|
| VCID-ct8w-njmr-qfgz | kernel: wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he |
CVE-2024-47681
|
| VCID-cyr4-fdka-abcd | kernel: drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error |
CVE-2024-47697
|
| VCID-d5e3-6wky-a7cp | kernel: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() |
CVE-2024-47707
|
| VCID-eaab-uus4-qqcr | kernel: netfs: Delete subtree of 'fs/netfs' when netfs module exits |
CVE-2024-47733
|
| VCID-ebdf-d1jx-c3bt | kernel: nbd: fix race between timeout and normal completion |
CVE-2024-49855
|
| VCID-ezp2-2nrr-qfd7 | kernel: wifi: mt76: mt7996: use hweight16 to get correct tx antenna |
CVE-2024-47714
|
| VCID-ffag-yek5-sqb1 | kernel: RDMA/cxgb4: Added NULL check for lookup_atid |
CVE-2024-47749
|
| VCID-fk64-3184-bkct | kernel: btrfs: fix race setting file private on concurrent lseek using same fd |
CVE-2024-47741
|
| VCID-fqdn-y5zw-y3cd | kernel: bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error |
CVE-2024-47728
|
| VCID-gspg-rx17-1qbw | kernel: drm/amd/display: Check link_res->hpo_dp_link_enc before using it |
CVE-2024-47704
|
| VCID-h1bz-1ddv-uqek | kernel: wifi: ath11k: use work queue to process beacon tx event |
CVE-2024-47724
|
| VCID-h3uk-37md-hufk | kernel: f2fs: fix to don't set SB_RDONLY in f2fs_handle_critical_error() |
CVE-2024-47689
|
| VCID-hbpj-7612-vbeu | kernel: wifi: mt76: mt7915: fix oops on non-dbdc mt7986 |
CVE-2024-47715
|
| VCID-hs28-3xmc-z7gj | kernel: block, bfq: fix possible UAF for bfqq->bic with merge chain |
CVE-2024-47706
|
| VCID-j76j-du7n-cye4 | kernel: PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() |
CVE-2024-47751
|
| VCID-juqm-qh8k-bugz | kernel: xfs: don't walk off the end of a directory data block |
CVE-2024-41013
|
| VCID-kukb-wvwk-h7ab | kernel: wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() |
CVE-2024-47713
|
| VCID-m79p-1b2a-qub2 | kernel: bpf: Fix helper writes to read-only maps |
CVE-2024-49861
|
| VCID-n1x1-k7cx-4kdx | kernel: RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency |
CVE-2024-47696
|
| VCID-p2ew-45gs-97hj | kernel: vhost_vdpa: assign irq bypass producer token correctly |
CVE-2024-47748
|
| VCID-p747-7t5g-7qdv | kernel: bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave() |
CVE-2024-47734
|
| VCID-pcgq-hqjf-nuae | kernel: KEYS: prevent NULL pointer dereference in find_asymmetric_key() |
CVE-2024-47743
|
| VCID-r1m4-nqg6-13ec | kernel: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() |
CVE-2024-49852
|
| VCID-r4t1-b5es-gkf8 | kernel: bpf: Fail verification for sign-extension of packet data/data_end/data_meta |
CVE-2024-47702
|
| VCID-r825-ahke-13cv | kernel: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning |
CVE-2024-47753
|
| VCID-rp3z-zrwp-kfc8 | kernel: tcp: check skb is non-NULL in tcp_rto_delta_us() |
CVE-2024-47684
|
| VCID-rsnz-px63-87hu | kernel: mm: call the security_mmap_file() LSM hook in remap_file_pages() |
CVE-2024-47745
|
| VCID-rxpz-xrk5-6uce | kernel: RISC-V: KVM: Don't zero-out PMU snapshot area before freeing data |
CVE-2024-47717
|
| VCID-sk93-hxg5-yffv | kernel: erofs: handle overlapped pclusters out of crafted images properly |
CVE-2024-47736
|
| VCID-sknp-1fjk-97eh | kernel: drm/xe: Use reserved copy engine for user binds on faulting devices |
CVE-2024-47729
|
| VCID-snvy-331a-tuh9 | kernel: bpf: Fix use-after-free in bpf_uprobe_multi_link_attach() |
CVE-2024-47675
|
| VCID-stkg-1cgz-1bc8 | kernel: xfs: add bounds checking to xlog_recover_process_data |
CVE-2024-41014
|
| VCID-stny-634a-4ff3 | kernel: nfsd: call cache_put if xdr_reserve_space returns NULL |
CVE-2024-47737
|
| VCID-tb9a-psth-zudc | kernel: scsi: sd: Fix off-by-one error in sd_read_block_characteristics() |
CVE-2024-47682
|
| VCID-tn3e-85jg-bbg7 | kernel: KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock |
CVE-2024-47744
|
| VCID-tnq3-smtx-dfh6 | kernel: wifi: mac80211: don't use rate mask for offchannel TX either |
CVE-2024-47738
|
| VCID-uf23-6wsu-2qer | kernel: RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds |
CVE-2024-47695
|
| VCID-ughm-c1ky-nkcu | kernel: IB/core: Fix ib_cache_setup_one error flow cleanup |
CVE-2024-47693
|
| VCID-uyah-n4fa-d7bd | kernel: wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading |
CVE-2024-47721
|
| VCID-v5et-qej6-7kaf | kernel: f2fs: fix to check atomic_file in f2fs ioctl interfaces |
CVE-2024-49859
|
| VCID-vr6h-w2kc-mqe7 | kernel: powercap: intel_rapl: Fix off by one in get_rpi() |
CVE-2024-49862
|
| VCID-vs9e-jhpa-jkg5 | kernel: x86/tdx: Fix "in-kernel MMIO" check |
CVE-2024-47727
|
| VCID-vzz7-k3dh-zqfh | kernel: f2fs: get rid of online repaire on corrupted directory |
CVE-2024-47690
|
| VCID-wd2z-jnpt-3bd3 | kernel: f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread() |
CVE-2024-47691
|
| VCID-wf2e-p8u9-gbcn | kernel: f2fs: Require FMODE_WRITE for atomic write ioctls |
CVE-2024-47740
|
| VCID-wga7-ag9q-h3gw | kernel: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled |
CVE-2024-47735
|
| VCID-wm3r-qwgk-yfeh | kernel: RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08 |
CVE-2024-47750
|
| VCID-wzkm-rtcg-cbdu | kernel: media: mediatek: vcodec: Fix H264 stateless decoder smatch warning |
CVE-2024-47752
|
| VCID-xem5-ehrv-4qgk | kernel: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption |
CVE-2024-49858
|
| VCID-xjuk-h9g4-97bn | kernel: fuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set |
CVE-2024-47746
|
| VCID-xwjx-dv2m-fug8 | kernel: vdpa/mlx5: Fix invalid mr resource destroy |
CVE-2024-47687
|
| VCID-xyh2-tgkm-d3d9 | kernel: wifi: rtw88: always wait for both firmware loading attempts |
CVE-2024-47718
|
| VCID-ynvw-rxsc-u7b9 | kernel: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning |
CVE-2024-47754
|
| VCID-yur1-b9nr-ebch | kernel: x86/sgx: Fix deadlock in SGX NUMA node search |
CVE-2024-49856
|
| VCID-z63g-5q23-2kad | kernel: firmware: arm_scmi: Fix double free in OPTEE transport |
CVE-2024-49853
|
| VCID-zc8p-pakr-q3b3 | kernel: nfsd: return -EINVAL when namelen is 0 |
CVE-2024-47692
|
| VCID-zh8h-914q-6ye3 | kernel: drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error |
CVE-2024-47698
|