Search for packages
| purl | pkg:deb/debian/linux@6.11.4-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-139c-g3zn-83dp | kernel: RDMA/rtrs-srv: Avoid null pointer deref during path establishment |
CVE-2024-50062
|
| VCID-13ha-2ceu-hyhs | kernel: net: phy: dp83869: fix memory corruption when enabling fiber |
CVE-2024-50188
|
| VCID-1c31-n1t4-xbab | kernel: mm/filemap: fix filemap_get_folios_contig THP panic |
CVE-2024-49873
|
| VCID-1pre-7cqx-4yee | kernel: drm/amd/display: Initialize denominators' default to 1 |
CVE-2024-49899
|
| VCID-1qk3-mmau-z7bz | kernel: cifs: Fix buffer overflow when parsing NFS reparse points |
CVE-2024-49996
|
| VCID-1syg-6cev-pkeq | kernel: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func |
CVE-2024-49909
|
| VCID-1y4p-2cgw-3ucc | kernel: bpftool: Fix undefined behavior in qsort(NULL, 0, ...) |
CVE-2024-49987
|
| VCID-1zkc-5ucw-e3et | kernel: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value |
CVE-2024-50009
|
| VCID-21fx-6crx-ske2 | kernel: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer |
CVE-2024-49918
|
| VCID-28m6-tuyv-uqev | kernel: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw |
CVE-2024-49917
|
| VCID-2bvr-9es2-87dt | kernel: drm/amd/display: Fix index out of bounds in degamma hardware format translation |
CVE-2024-49894
|
| VCID-2d3j-fkw9-vygn | kernel: net: fec: don't save PTP state if PTP is unsupported |
CVE-2024-50097
|
| VCID-2d7w-2f5y-qfdz | kernel: exec: don't WARN for racy path_noexec check |
CVE-2024-50010
|
| VCID-2dee-n8r8-d3hd | kernel: drm/xe/oa: Fix overflow in oa batch buffer |
CVE-2024-50090
|
| VCID-2gjf-37qn-kydv | BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177. |
CVE-2024-8805
|
| VCID-2pb5-p6ef-8ubx | kernel: kthread: unpark only parked kthread |
CVE-2024-50019
|
| VCID-2qt2-z5hu-ffcx | kernel: tracing/timerlat: Fix a race during cpuhp processing |
CVE-2024-49866
|
| VCID-39d9-jmr4-cbfz | kernel: block: fix integer overflow in BLKSECDISCARD |
CVE-2024-49994
|
| VCID-3a8a-ns8q-wbgy | kernel: drm/amd/display: Check null pointers before using them |
CVE-2024-49922
|
| VCID-3cwu-kg6p-yya7 | kernel: Bluetooth: L2CAP: Fix uaf in l2cap_connect |
CVE-2024-49950
|
| VCID-3szp-rd4q-3fbt | kernel: thermal: core: Free tzp copy along with the thermal zone |
CVE-2024-50027
|
| VCID-3vkp-ctjh-wqag | kernel: wifi: rtw89: avoid to add interface to list twice when SER |
CVE-2024-49939
|
| VCID-47cx-y8q8-cfcd | kernel: gso: fix udp gso fraglist segmentation after pull from frag_list |
CVE-2024-49978
|
| VCID-4jhv-srj9-yfam | kernel: i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition |
CVE-2024-49874
|
| VCID-4jk2-7scp-7qf4 | kernel: vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() |
CVE-2024-49863
|
| VCID-4k1b-g64y-43eg | kernel: smb: client: fix UAF in async decryption |
CVE-2024-50047
|
| VCID-4upm-pqsw-2khy | kernel: mm/gup: fix memfd_pin_folios alloc race panic |
CVE-2024-49872
|
| VCID-4xbz-d89x-hucp | kernel: net/xen-netback: prevent UAF in xenvif_flush_hash() |
CVE-2024-49936
|
| VCID-5fqv-jv6t-xbfb | kernel: ext4: aovid use-after-free in ext4_ext_insert_extent() |
CVE-2024-49883
|
| VCID-5vvm-dcqb-qyer | kernel: nfsd: fix possible badness in FREE_STATEID |
CVE-2024-50043
|
| VCID-5xpt-m65r-aben | kernel: static_call: Replace pointless WARN_ON() in static_call_module_notify() |
CVE-2024-49954
|
| VCID-68wx-sjuq-gbc1 | kernel: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion |
CVE-2024-49868
|
| VCID-6bwt-an4d-23d8 | kernel: serial: protect uart_port_dtr_rts() in uart_shutdown() too |
CVE-2024-50058
|
| VCID-6nb2-upxw-87am | kernel: btrfs: don't readahead the relocation inode on RST |
CVE-2024-49932
|
| VCID-6p8c-hn98-e7gu | kernel: ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins() |
CVE-2024-50021
|
| VCID-6q4x-x6z9-mugs | kernel: ocfs2: remove unreasonable unlock in ocfs2_read_blocks |
CVE-2024-49965
|
| VCID-6trw-82f1-13ar | kernel: jfs: check if leafidx greater than num leaves per dmap tree |
CVE-2024-49902
|
| VCID-6x7e-pew4-jkha | kernel: uprobes: fix kernel info leak via "[uprobes]" vma |
CVE-2024-49975
|
| VCID-74ys-m19c-p7f3 | kernel: drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw |
CVE-2024-49915
|
| VCID-76ey-88ru-23bg | kernel: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug |
CVE-2024-49886
|
| VCID-7a5q-hn39-8kft | kernel: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition |
CVE-2024-50059
|
| VCID-7bsu-23dg-qkaf | kernel: ocfs2: cancel dqi_sync_work before freeing oinfo |
CVE-2024-49966
|
| VCID-7kr5-5cu2-h7cf | kernel: mm, slub: avoid zeroing kmalloc redzone |
CVE-2024-49885
|
| VCID-7m22-vnh2-bqep | kernel: drm/amd/display: Deallocate DML memory if allocation fails |
CVE-2024-49972
|
| VCID-7mtq-x5sm-bqgv | kernel: ice: Fix increasing MSI-X on VF |
CVE-2024-50042
|
| VCID-7q5q-my64-p7gw | kernel: gfs2: fix double destroy_workqueue error |
CVE-2024-49956
|
| VCID-7q62-t5tn-2bd8 | kernel: io_uring: check if we need to reschedule during overflow flush |
CVE-2024-50060
|
| VCID-7thv-6jna-gkd1 | kernel: drm/amd/display: Check stream before comparing them |
CVE-2024-49896
|
| VCID-82mh-nwfw-hqh9 | kernel: media: venus: fix use after free bug in venus_remove due to race condition |
CVE-2024-49981
|
| VCID-8hht-ep2m-5kd5 | kernel: fbdev: pxafb: Fix possible use after free in pxafb_task() |
CVE-2024-49924
|
| VCID-8hsu-9gwu-hye7 | kernel: drm/panthor: Fix race when converting group handle to group object |
CVE-2024-50174
|
| VCID-8qdb-6tpa-vkgm | kernel: x86/ioapic: Handle allocation failures gracefully |
CVE-2024-49927
|
| VCID-8xdj-ys7r-rffm | kernel: ksmbd: add refcnt to ksmbd_conn struct |
CVE-2024-49988
|
| VCID-8zt5-wc4g-rfb9 | kernel: zram: free secondary algorithms names |
CVE-2024-50064
|
| VCID-9387-3355-yug2 | kernel: HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() |
CVE-2024-50189
|
| VCID-94qd-cpxj-zudp | kernel: wifi: ath12k: fix array out-of-bound access in SoC stats |
CVE-2024-49931
|
| VCID-95xu-ba37-b7ca | kernel: scsi: fnic: Move flush_work initialization out of if block |
CVE-2024-50025
|
| VCID-9a71-kyv3-kudp | kernel: resource: fix region_intersects() vs add_memory_driver_managed() |
CVE-2024-49878
|
| VCID-9ewq-11eq-z7ch | kernel: mailbox: bcm2835: Fix timeout during suspend mode |
CVE-2024-49963
|
| VCID-9ff6-z4zb-dffc | kernel: ext4: don't set SB_RDONLY after filesystem errors |
CVE-2024-50191
|
| VCID-9k7s-spmf-t7e1 | kernel: gpiolib: Fix potential NULL pointer dereference in gpiod_get_label() |
CVE-2024-49941
|
| VCID-9qq3-mxee-ybh8 | kernel: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func |
CVE-2024-49911
|
| VCID-9t8m-uvzr-xych | kernel: drm/amdgpu: add list empty check to avoid null pointer issue |
CVE-2024-49904
|
| VCID-9wdj-482w-9kfq | kernel: ext4: dax: fix overflowing extents beyond inode size when partially writing |
CVE-2024-50015
|
| VCID-a1tm-fg3e-hkct | kernel: drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream |
CVE-2024-49913
|
| VCID-ah5f-a8ty-rfak | kernel: RDMA/mad: Improve handling of timed out WRs of mad agent |
CVE-2024-50095
|
| VCID-aj3p-9trr-87cz | kernel: net/ncsi: Disable the ncsi work before freeing the associated structure |
CVE-2024-49945
|
| VCID-aq43-mrqu-nqdb | kernel: NFSD: Limit the number of concurrent async COPY operations |
CVE-2024-49974
|
| VCID-aqmq-mvvg-uqde | kernel: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition |
CVE-2024-50061
|
| VCID-asyn-jnwj-7uav | kernel: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c |
CVE-2024-50056
|
| VCID-aytb-bq4j-83bm | kernel: drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35 |
CVE-2024-50004
|
| VCID-bcd5-eesw-cuff | kernel: wifi: iwlwifi: mvm: avoid NULL pointer dereference |
CVE-2024-49929
|
| VCID-bjwg-thks-73ab | kernel: wifi: ath11k: fix array out-of-bound access in SoC stats |
CVE-2024-49930
|
| VCID-bs5f-j2kr-93hq | kernel: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error |
CVE-2024-49959
|
| VCID-c5x3-74ek-uyfa | kernel: i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume |
CVE-2024-49985
|
| VCID-cd2x-nzpw-1yee | kernel: blk_iocost: fix more out of bound shifts |
CVE-2024-49933
|
| VCID-cfgz-qkqh-77gu | kernel: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs |
CVE-2024-50048
|
| VCID-cfr1-1u57-d7b5 | kernel: ext4: update orig_path in ext4_find_extent() |
CVE-2024-49881
|
| VCID-cmwd-vs9p-3fa8 | kernel: net: gso: fix tcp fraglist segmentation after pull from frag_list |
CVE-2024-49979
|
| VCID-cnwd-yywa-tycs | kernel: afs: Fix the setting of the server responding flag |
CVE-2024-49999
|
| VCID-cuup-1udp-7bdx | kernel: drm/amd/display: Check null-initialized variables |
CVE-2024-49898
|
| VCID-cvw6-a674-zfa9 | kernel: drm/amd/display: Check null pointer before try to access it |
CVE-2024-49906
|
| VCID-d1k1-2urz-h7bq | kernel: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() |
CVE-2024-49962
|
| VCID-d1x4-dmpq-qfct | kernel: ext4: fix slab-use-after-free in ext4_split_extent_at() |
CVE-2024-49884
|
| VCID-d693-z5hn-8uha | kernel: ext4: fix i_data_sem unlock order in ext4_ind_migrate() |
CVE-2024-50006
|
| VCID-dpc2-pmux-mqhm | kernel: ceph: remove the incorrect Fw reference check when dirtying pages |
CVE-2024-50179
|
| VCID-dqvp-mzuh-cuhg | kernel: ext4: fix access to uninitialised lock in fc replay path |
CVE-2024-50014
|
| VCID-e6th-hujj-6bby | kernel: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags |
CVE-2024-49923
|
| VCID-ea36-7v42-fyfp | kernel: usb: typec: tipd: Free IRQ only if it was requested before |
CVE-2024-50057
|
| VCID-ecxb-qhqp-qqgr | kernel: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer |
CVE-2024-49991
|
| VCID-eff6-c3rx-afhu | kernel: scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths |
CVE-2024-49891
|
| VCID-ehb4-pphm-qqh7 | kernel: media: i2c: ar0521: Use cansleep version of gpiod_set_value() |
CVE-2024-49961
|
| VCID-em75-cm2z-xkck | kernel: drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) |
CVE-2024-49905
|
| VCID-esv2-psjw-8yfs | kernel: wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit |
CVE-2024-49938
|
| VCID-f8r8-spm9-fyhh | kernel: ocfs2: fix null-ptr-deref when journal load failed. |
CVE-2024-49957
|
| VCID-f9yj-e6ws-tbg4 | kernel: ext4: filesystems without casefold feature cannot be mounted with siphash |
CVE-2024-49968
|
| VCID-fds5-x8be-47fj | kernel: net: do not delay dst_entries_add() in dst_release() |
CVE-2024-50036
|
| VCID-fq2p-4m1f-qydc | kernel: drm/vc4: Stop the active perfmon before being destroyed |
CVE-2024-50187
|
| VCID-fr9j-c1f4-dycd | kernel: Bluetooth: MGMT: Fix possible crash on mgmt_index_removed |
CVE-2024-49951
|
| VCID-g5x3-q1sw-z7br | kernel: net: phy: Remove LED entry from LEDs list on unregister |
CVE-2024-50023
|
| VCID-g8uj-2fkk-5ud6 | kernel: jfs: Fix uninit-value access of new_ea in ea_buffer |
CVE-2024-49900
|
| VCID-gg3r-zq3k-gyhx | kernel: ice: fix memleak in ice_init_tx_topology() |
CVE-2024-50190
|
| VCID-gstk-xrzv-s7af | kernel: drm/amd/display: Check phantom_stream before it is used |
CVE-2024-49897
|
| VCID-h1e4-mhtd-wfbh | kernel: exfat: fix memory leak in exfat_load_bitmap() |
CVE-2024-50013
|
| VCID-h2jm-xwzt-afg5 | kernel: drm/xe/guc_submit: add missing locking in wedged_fini |
CVE-2024-49943
|
| VCID-h892-26cq-6fav | kernel: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() |
CVE-2024-50000
|
| VCID-hces-d1m4-6ygy | kernel: drm/v3d: Stop the active perfmon before being destroyed |
CVE-2024-50031
|
| VCID-hj26-eqjg-xkbn | kernel: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE |
CVE-2024-53144
|
| VCID-hnrs-f1mv-akb4 | kernel: drm/amd/display: Check null pointers before using dc->clk_mgr |
CVE-2024-49907
|
| VCID-hq7x-1csm-p3bv | kernel: driver core: bus: Fix double free in driver API bus_register() |
CVE-2024-50055
|
| VCID-j3n2-2rtg-eygp | kernel: net: test for not too small csum_start in virtio_net_hdr_to_skb() |
CVE-2024-49947
|
| VCID-j76y-m4es-4yej | kernel: Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change |
CVE-2024-50044
|
| VCID-ja5b-m1y8-5bhh | kernel: ppp: do not assume bh is held in ppp_channel_bridge_input() |
CVE-2024-49946
|
| VCID-jb7c-wux6-jkfh | kernel: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free |
CVE-2024-49983
|
| VCID-jbk8-b5z4-kuhq | kernel: r8169: add tally counter fields added with RTL8125 |
CVE-2024-49973
|
| VCID-jfrf-qe3s-gbax | kernel: drm/amd/display: Check stream_status before it is used |
CVE-2024-49893
|
| VCID-jftr-apzy-rkdh | kernel: bpf: Prevent tail call between progs attached to different hooks |
CVE-2024-50063
|
| VCID-jgke-4yqg-s7g7 | kernel: drm/amd/display: Check null pointers before used |
CVE-2024-49921
|
| VCID-jhvu-tacv-vugb | kernel: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation |
CVE-2024-49895
|
| VCID-jqm5-psje-myf1 | kernel: ext4: fix timer use-after-free on failed mount |
CVE-2024-49960
|
| VCID-jw26-mwka-x3dr | kernel: cpufreq: Avoid a bad reference count on CPU node |
CVE-2024-50012
|
| VCID-k9e5-ykzu-qyew | kernel: drm/amd/display: Add null check for pipe_ctx->plane_state in dcn20_program_pipe |
CVE-2024-49914
|
| VCID-kc2h-81ye-mfdk | kernel: drm/amd/display: fix double free issue during amdgpu module unload |
CVE-2024-49989
|
| VCID-kk6m-vhxv-y3fw | kernel: NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() |
CVE-2024-50046
|
| VCID-kptu-sm1d-kuae | kernel: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer |
CVE-2024-49919
|
| VCID-ktwx-grht-aqh5 | kernel: drm/xe/hdcp: Check GSC structure validity |
CVE-2024-49990
|
| VCID-kw45-zrzn-d7bd | kernel: ALSA: asihpi: Fix potential OOB array access |
CVE-2024-50007
|
| VCID-kys7-kwvw-tkfg | kernel: static_call: Handle module init failure correctly in static_call_del_module() |
CVE-2024-50002
|
| VCID-m4v3-xfhr-rbgt | kernel: rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb() |
CVE-2024-49926
|
| VCID-mfpq-6q7f-37f2 | kernel: drm/fbdev-dma: Only cleanup deferred I/O if necessary |
CVE-2024-50037
|
| VCID-mwrn-2c7n-d3gm | kernel: net: ethernet: lantiq_etop: fix memory disclosure |
CVE-2024-49997
|
| VCID-mxb7-a88f-wycr | kernel: sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start |
CVE-2024-49944
|
| VCID-nczy-8tnn-efhr | kernel: drm/xe: fix UAF around queue destruction |
CVE-2024-49876
|
| VCID-ndfh-x9yx-jbb1 | kernel: drm/amd/display: Check null pointer before dereferencing se |
CVE-2024-50049
|
| VCID-nezs-w5u8-nyhf | kernel: tracing/timerlat: Drop interface_lock in stop_kthread() |
CVE-2024-49976
|
| VCID-ng3h-5h85-tkhw | kernel: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() |
CVE-2024-50008
|
| VCID-np31-c99w-3fgd | kernel: scsi: wd33c93: Don't use stale scsi_pointer value |
CVE-2024-50026
|
| VCID-npfs-gbvp-tfdh | kernel: drm/panthor: Fix access to uninitialized variable in tick_ctx_cleanup() |
CVE-2024-50173
|
| VCID-nsx6-v78s-c3c6 | kernel: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash |
CVE-2024-50041
|
| VCID-nvxv-7adg-hqbp | kernel: slip: make slhc_remember() more robust against malicious packets |
CVE-2024-50033
|
| VCID-pcnu-66pn-xbg7 | kernel: cachefiles: fix dentry leak in cachefiles_open_file() |
CVE-2024-49870
|
| VCID-pgm5-vku1-q7em | kernel: fbdev: sisfb: Fix strbuf array overflow |
CVE-2024-50180
|
| VCID-ptjq-k3sd-mbg9 | kernel: net/mlx5: Fix error path in multi-packet WQE transmit |
CVE-2024-50001
|
| VCID-pu69-3e6q-pkab | kernel: f2fs: fix to don't panic system for no free segment fault injection |
CVE-2024-49887
|
| VCID-q1ts-48c2-xkgb | kernel: l2tp: prevent possible tunnel refcount underflow |
CVE-2024-49940
|
| VCID-q6g3-zqxy-myhx | kernel: drm/amd/pm: ensure the fw_info is not null before using it |
CVE-2024-49890
|
| VCID-qb4u-38pz-q3gn | kernel: net: stmmac: Fix zero-division error when disabling tc cbs |
CVE-2024-49977
|
| VCID-qc1g-k892-rbac | kernel: net/sched: accept TCA_STAB only for root qdisc |
CVE-2024-50039
|
| VCID-qd2p-jfnt-eyey | kernel: ext4: fix double brelse() the buffer of the extents path |
CVE-2024-49882
|
| VCID-qe24-fwf6-6bes | kernel: nfsd: map the EBADMSG to nfserr_io to avoid warning |
CVE-2024-49875
|
| VCID-qedq-9rx5-tyfs | kernel: dm vdo: don't refer to dedupe_context after releasing it |
CVE-2024-50091
|
| VCID-qn1v-p7x8-mkdq | kernel: netfilter: br_netfilter: fix panic with metadata_dst skb |
CVE-2024-50045
|
| VCID-qtb6-udqg-n3dr | kernel: net: avoid potential underflow in qdisc_pkt_len_init() with UFO |
CVE-2024-49949
|
| VCID-r2gb-pmbg-f3cr | kernel: drm/amd/display: Initialize get_bytes_per_element's default to 1 |
CVE-2024-49892
|
| VCID-r6aq-b146-vufp | kernel: drm/stm: Avoid use-after-free issues with crtc and plane |
CVE-2024-49992
|
| VCID-rap3-vzat-1ubv | kernel: drm/amd/display: fix a UBSAN warning in DML2.1 |
CVE-2024-50177
|
| VCID-rayk-m71k-pkd5 | kernel: drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn401_init_hw |
CVE-2024-49916
|
| VCID-rej2-k4rf-97h9 | kernel: ppp: fix ppp_async_encode() illegal access |
CVE-2024-50035
|
| VCID-rf3z-q8ur-a7dx | kernel: drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' |
CVE-2024-49912
|
| VCID-rn7e-unsj-4khr | kernel: drm/amd/display: Fix system hang while resume with TBT monitor |
CVE-2024-50003
|
| VCID-rsf6-gjkh-bug3 | kernel: net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC |
CVE-2024-50034
|
| VCID-rup3-z1qu-j3hr | kernel: thermal: core: Reference count the zone in thermal_zone_get_by_id() |
CVE-2024-50028
|
| VCID-s3dc-ntwb-kqe8 | kernel: ntfs3: Change to non-blocking allocation in ntfs_d_hash |
CVE-2024-50065
|
| VCID-s4vq-5qdu-9qej | kernel: fbdev: efifb: Register sysfs groups through driver core |
CVE-2024-49925
|
| VCID-s7qf-57u6-vkgt | kernel: drm/amd/display: Increase array size of dummy_boolean |
CVE-2024-49971
|
| VCID-snjj-epqp-dyhv | kernel: rxrpc: Fix a race between socket set up and I/O thread creation |
CVE-2024-49864
|
| VCID-ssaq-6w79-v3ay | kernel: platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors |
CVE-2024-49986
|
| VCID-t383-u3pd-9yhx | kernel: net: netconsole: fix wrong warning |
CVE-2024-50092
|
| VCID-t5y5-2hne-7keh | kernel: net: dsa: improve shutdown sequence |
CVE-2024-49998
|
| VCID-u7rc-esbm-b3cv | kernel: cpufreq: loongson3: Use raw_smp_processor_id() in do_service_request() |
CVE-2024-50178
|
| VCID-u7v1-r91f-wbhb | kernel: ACPI: battery: Fix possible crash when unregistering a battery hook |
CVE-2024-49955
|
| VCID-u8gh-ber8-q3dw | kernel: drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs |
CVE-2024-49901
|
| VCID-ucsm-guzh-z7d2 | kernel: aoe: fix the potential use-after-free problem in more places |
CVE-2024-49982
|
| VCID-uumj-np9z-jqe1 | kernel: scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance |
CVE-2024-50183
|
| VCID-uuxb-2vuz-3kfx | kernel: ACPI: PAD: fix crash in exit_round_robin() |
CVE-2024-49935
|
| VCID-uvcv-xcdj-ufgy | kernel: virtio_pmem: Check device status before requesting flush |
CVE-2024-50184
|
| VCID-uz62-1j2m-guhg | kernel: bpf: Fix a sdiv overflow issue |
CVE-2024-49888
|
| VCID-v1ka-ynm7-q3cw | kernel: drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2) |
CVE-2024-49908
|
| VCID-vanh-4zby-hkeb | kernel: net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice |
CVE-2024-49953
|
| VCID-vdft-qgsq-6ff4 | kernel: ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count() |
CVE-2024-50020
|
| VCID-vfxs-5p9x-5kcx | kernel: Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync |
CVE-2024-50029
|
| VCID-vra9-1qgj-ffgp | kernel: mm/hugetlb: fix memfd_pin_folios free_huge_pages leak |
CVE-2024-49964
|
| VCID-vuww-297b-h7gm | kernel: remoteproc: k3-r5: Fix error handling when power-up failed |
CVE-2024-50176
|
| VCID-vxwe-vwc8-jbeb | kernel: igb: Do not bring the device up after non-fatal error |
CVE-2024-50040
|
| VCID-vzkb-k69z-zbeb | kernel: jfs: Fix uaf in dbFreeBits |
CVE-2024-49903
|
| VCID-whdp-pvwx-zqat | kernel: mac802154: Fix potential RCU dereference issue in mac802154_scan_worker |
CVE-2024-50005
|
| VCID-wnab-44dq-97h3 | kernel: drm/xe/vm: move xa_alloc to prevent UAF |
CVE-2024-49865
|
| VCID-wnh7-18vz-vbgn | kernel: drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func |
CVE-2024-49910
|
| VCID-wqs9-utnj-2fgh | kernel: ocfs2: reserve space for inline xattr before attaching reflink tree |
CVE-2024-49958
|
| VCID-wrhx-jz6p-2kgb | kernel: net: explicitly clear the sk pointer, when pf->create fails |
CVE-2024-50186
|
| VCID-wvcr-8vpc-tyb7 | kernel: nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error |
CVE-2024-50096
|
| VCID-wzy5-1p8z-5kfr | kernel: mptcp: handle consistently DSS corruption |
CVE-2024-50185
|
| VCID-x232-nuja-z3gc | kernel: drm/xe/ct: prevent UAF in send_recv() |
CVE-2024-50030
|
| VCID-x5ec-vwcj-mbcy | kernel: drm/amd/display: Fix index out of bounds in DCN30 color transformation |
CVE-2024-49969
|
| VCID-x8em-u5be-4yft | kernel: drm/v3d: Prevent out of bounds access in performance query extensions |
CVE-2024-49984
|
| VCID-xdw8-ms7r-bfc4 | kernel: net: add more sanity checks to qdisc_pkt_len_init() |
CVE-2024-49948
|
| VCID-xncx-nvr7-k7d8 | kernel: x86/mm/ident_map: Use gbpages only where full GB page should be mapped. |
CVE-2024-50017
|
| VCID-xq7q-bzjv-17gu | kernel: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name |
CVE-2024-49934
|
| VCID-xxhg-up2k-yyhv | kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN401 |
CVE-2024-49970
|
| VCID-xy48-byfc-53g2 | kernel: thermal: intel: int340x: processor: Fix warning during module unload |
CVE-2024-50093
|
| VCID-y3cb-qtwm-mfcj | kernel: netfilter: xtables: avoid NFPROTO_UNSPEC where needed |
CVE-2024-50038
|
| VCID-y3yy-xyjw-7uar | kernel: secretmem: disable memfd_secret() if arch cannot set direct map |
CVE-2024-50182
|
| VCID-y5wf-nhjs-h7e5 | kernel: ext4: fix off by one issue in alloc_flex_gd() |
CVE-2024-49880
|
| VCID-y7wh-qssq-cbg1 | kernel: drm/amd/display: Check null pointers before multiple uses |
CVE-2024-49920
|
| VCID-ya59-ayvw-huaj | kernel: drm: omapdrm: Add missing check for alloc_ordered_workqueue |
CVE-2024-49879
|
| VCID-ybyh-s1ym-w3bf | kernel: btrfs: send: fix buffer overflow detection when copying path to cache entry |
CVE-2024-49869
|
| VCID-ycyh-15eg-xkf5 | kernel: sfc: Don't invoke xdp_do_flush() from netpoll. |
CVE-2024-50094
|
| VCID-yd6y-gtg1-q3c1 | kernel: drm/xe: Prevent null pointer access in xe_migrate_copy |
CVE-2024-49942
|
| VCID-yefv-yzvy-vbem | kernel: device-dax: correct pgoff align in dax_set_mapping() |
CVE-2024-50022
|
| VCID-yej7-dhzw-efbd | kernel: ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item |
CVE-2024-50011
|
| VCID-yjxd-bhxr-bqfp | kernel: Input: adp5589-keys - fix NULL pointer dereference |
CVE-2024-49871
|
| VCID-ymn3-8zru-9qgd | kernel: media: qcom: camss: Remove use_count guard in stop_streaming |
CVE-2024-50175
|
| VCID-ysg3-gaus-nfca | kernel: btrfs: wait for fixup workers before stopping cleaner kthread during umount |
CVE-2024-49867
|
| VCID-yynf-qcsn-4bg9 | kernel: wifi: cfg80211: Set correct chandef when starting CAC |
CVE-2024-49937
|
| VCID-yz41-uqnc-xyhs | kernel: net: Fix an unsafe loop on the list |
CVE-2024-50024
|
| VCID-z1d3-8ypx-83bj | kernel: netfilter: nf_tables: prevent nf_skb_duplicated corruption |
CVE-2024-49952
|
| VCID-z2h3-f18x-2kau | kernel: wifi: rtw89: avoid reading out of bounds when loading TX power FW elements |
CVE-2024-49928
|
| VCID-z2z9-umm2-vkdt | kernel: ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate |
CVE-2024-49877
|
| VCID-z9t8-b7vx-wyb8 | kernel: vrf: revert "vrf: Remove unnecessary RCU-bh critical section" |
CVE-2024-49980
|
| VCID-zz38-awwp-k3bw | kernel: ext4: avoid use-after-free in ext4_ext_show_leaf() |
CVE-2024-49889
|