Search for packages
| purl | pkg:deb/debian/linux@6.11.6-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1nzk-g8gv-xfbx | kernel: firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup() |
CVE-2024-50159
|
| VCID-21nx-d8cp-eqhd | kernel: x86/lam: Disable ADDRESS_MASKING in most cases |
CVE-2024-50112
|
| VCID-23xy-za5d-zqf7 | kernel: xfrm: validate new SA's prefixlen using SA family when sel.family is unset |
CVE-2024-50142
|
| VCID-36tr-gx3y-sbf1 | kernel: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). |
CVE-2024-50154
|
| VCID-3tjs-dntt-3ycc | kernel: KVM: arm64: Unregister redistributor for failed vCPU creation |
CVE-2024-50114
|
| VCID-4s4m-bf1u-tyht | kernel: nvme-pci: fix race condition between reset and nvme_dev_disable() |
CVE-2024-50135
|
| VCID-542p-wzkb-uqfe | kernel: net: wwan: fix global oob in wwan_rtnl_policy |
CVE-2024-50128
|
| VCID-5qga-wmku-cbec | kernel: LoongArch: Don't crash in stack_top() for tasks without vDSO |
CVE-2024-50133
|
| VCID-5vfz-y2ud-bqct | kernel: fs: don't try and remove empty rbtree node |
CVE-2024-50204
|
| VCID-6bd5-nxfe-f7eg | kernel: bpf: devmap: provide rxq after redirect |
CVE-2024-50162
|
| VCID-773b-29f4-9udk | kernel: btrfs: reject ro->rw reconfiguration if there are hard ro requirements |
CVE-2024-50118
|
| VCID-7egj-ffph-kyc2 | kernel: Bluetooth: SCO: Fix UAF on sco_sock_timeout |
CVE-2024-50125
|
| VCID-7qdt-gt2d-kyfh | kernel: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too |
CVE-2024-50108
|
| VCID-7sbg-xmx1-skea | kernel: netdevsim: use cond_resched() in nsim_dev_trap_report_work() |
CVE-2024-50155
|
| VCID-7u1b-9qua-gkgr | kernel: sched/core: Disable page allocation in task_tick_mm_cid() |
CVE-2024-50140
|
| VCID-7v7w-59tz-x7g8 | kernel: drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() |
CVE-2024-50156
|
| VCID-8wma-spyd-jydr | kernel: KVM: arm64: Fix shift-out-of-bounds bug |
CVE-2024-50139
|
| VCID-94ax-anfv-37ex | kernel: bpf: Make sure internal and UAPI bpf_redirect flags don't overlap |
CVE-2024-50163
|
| VCID-9yd9-3bxj-a3b3 | kernel: tracing/probes: Fix MAX_TRACE_ARGS limit handling |
CVE-2024-50132
|
| VCID-a6dd-75ne-5yaz | kernel: xfrm: fix one more kernel-infoleak in algo dumping |
CVE-2024-50110
|
| VCID-ann8-xtng-bucz | kernel: net: sched: fix use-after-free in taprio_change() |
CVE-2024-50127
|
| VCID-av2k-qrby-suhg | kernel: LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context |
CVE-2024-50111
|
| VCID-bc95-1a99-yyfg | kernel: tracing: Consider the NULL character when validating the event length |
CVE-2024-50131
|
| VCID-bkmf-5g3r-8kcg | kernel: vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame |
CVE-2024-58099
|
| VCID-bu86-vtzj-vbat | kernel: ASoC: qcom: sc7280: Fix missing Soundwire runtime stream alloc |
CVE-2024-50105
|
| VCID-djcm-qrn5-tkhv | kernel: md/raid10: fix null ptr dereference in raid10_size() |
CVE-2024-50109
|
| VCID-dx8m-g8vq-h7h9 | kernel: smb: client: Handle kstrdup failures for passwords |
CVE-2024-50120
|
| VCID-dy3b-tpha-73hu | kernel: ALSA: hda/cs8409: Fix possible NULL dereference |
CVE-2024-50160
|
| VCID-em85-tye9-8bcu | kernel: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages |
CVE-2024-50208
|
| VCID-enns-kkdk-qufm | kernel: net/sun3_82586: fix potential memory leak in sun3_82586_send_packet() |
CVE-2024-50168
|
| VCID-evh2-ynnc-1fde | kernel: RDMA/bnxt_re: Add a check for memory allocation |
CVE-2024-50209
|
| VCID-f322-swjz-4yhb | kernel: net: systemport: fix potential memory leak in bcm_sysport_xmit() |
CVE-2024-50171
|
| VCID-fcn8-fwuk-fuez | kernel: udf: fix uninit-value use in udf_get_fileshortad |
CVE-2024-50143
|
| VCID-fkhm-e4e3-uufh | kernel: drm/xe: Don't free job in TDR |
CVE-2024-50149
|
| VCID-fs84-tck8-jyes | kernel: scsi: target: core: Fix null-ptr-deref in target_alloc_device() |
CVE-2024-50153
|
| VCID-fukf-ys7z-2udv | kernel: net: pse-pd: Fix out of bound for loop |
CVE-2024-50129
|
| VCID-gbsy-mmdt-y3hy | kernel: bpf: Use raw_spinlock_t in ringbuf |
CVE-2024-50138
|
| VCID-gvya-5wgk-j3cv | kernel: udf: refactor inode_bmap() to handle error |
CVE-2024-50211
|
| VCID-hfmz-nrrs-xfay | kernel: drm/xe: fix unbalanced rpm put() with fence_fini() |
CVE-2024-50144
|
| VCID-hm3d-5ktm-6bd1 | kernel: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory |
CVE-2024-50115
|
| VCID-j4mb-mqtp-93g8 | kernel: vsock: Update rx_bytes on read_skb() |
CVE-2024-50169
|
| VCID-jtja-v96g-2uex | kernel: bpf: Preserve param->string when parsing mount options |
CVE-2024-50165
|
| VCID-k8yg-bbzs-yqbn | kernel: firewire: core: fix invalid port index for parent device |
CVE-2024-50113
|
| VCID-m8u1-c9ff-7fbj | kernel: RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop |
CVE-2024-50157
|
| VCID-me2j-kn2g-u3fu | kernel: net: sched: use RCU read-side critical section in taprio_dump() |
CVE-2024-50126
|
| VCID-mew4-u7k6-r3ds | kernel: drm/amd: Guard against bad data for ATIF ACPI method |
CVE-2024-50117
|
| VCID-n53b-2zbb-vff2 | kernel: net/mlx5: Fix command bitmask initialization |
CVE-2024-50147
|
| VCID-nsa2-qgf5-xffq | kernel: fsl/fman: Fix refcount handling of fman-related devices |
CVE-2024-50166
|
| VCID-nu3y-ca1d-auas | kernel: nfsd: fix race between laundromat and free_stateid |
CVE-2024-50106
|
| VCID-nxqc-k9mq-pqd6 | kernel: uprobe: avoid out-of-bounds memory access of fetching args |
CVE-2024-50067
|
| VCID-p4tw-7m93-2yar | kernel: RDMA/bnxt_re: Fix a possible memory leak |
CVE-2024-50172
|
| VCID-p5t8-k4m7-23cx | kernel: nilfs2: fix kernel bug due to missing clearing of buffer delay flag |
CVE-2024-50116
|
| VCID-p772-utu4-sbhu | kernel: be2net: fix potential memory leak in be_xmit() |
CVE-2024-50167
|
| VCID-pfwu-he58-x3d6 | kernel: Bluetooth: bnep: fix wild-memory-access in proto_unregister |
CVE-2024-50148
|
| VCID-puhc-5h95-13ff | kernel: Kernel: Bluetooth HCI local DoS |
CVE-2024-58241
|
| VCID-pzrw-u1qz-f3fz | kernel: bpf: Fix overloading of MEM_UNINIT's meaning |
CVE-2024-50164
|
| VCID-q5jt-zx7c-fqd4 | kernel: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA |
CVE-2024-50134
|
| VCID-qms9-ezfc-zqbc | kernel: netfilter: bpf: must hold reference on net namespace |
CVE-2024-50130
|
| VCID-qrb9-cm48-jkd4 | kernel: bpf: Check the remaining info_cnt before repeating btf fields |
CVE-2024-50161
|
| VCID-rd5t-rgsc-rudg | kernel: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net |
CVE-2024-50121
|
| VCID-rhf7-7cbj-wfa9 | kernel: ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context |
CVE-2024-50141
|
| VCID-rmrs-en7k-v7h2 | kernel: bpf: sync_linked_regs() must preserve subreg_def |
CVE-2024-53125
|
| VCID-rnum-qw5t-5uby | kernel: usb: typec: altmode should keep reference to parent |
CVE-2024-50150
|
| VCID-sdty-9m1h-pkcj | kernel: bpf: Add the missing BPF_LINK_TYPE invocation for sockmap |
CVE-2024-50123
|
| VCID-sfat-99v7-auaq | kernel: octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx() |
CVE-2024-50145
|
| VCID-ssj7-z1m1-pqf1 | kernel: reset: starfive: jh71x0: Fix accessing the empty member on JH7110 SoC |
CVE-2024-50137
|
| VCID-t18c-z6sf-5kcp | kernel: RDMA/bnxt_re: Fix out of bound check |
CVE-2024-50158
|
| VCID-t9uh-m72b-g3bb | kernel: ring-buffer: Fix reader locking when changing the sub buffer order |
CVE-2024-50207
|
| VCID-ta95-qfqs-cbbp | kernel: ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() |
CVE-2024-50103
|
| VCID-tvuc-hsys-v7fj | kernel: smb: client: fix OOBs when building SMB2_IOCTL request |
CVE-2024-50151
|
| VCID-u1jy-6eha-r7fm | kernel: smb: client: fix possible double free in smb2_set_ea() |
CVE-2024-50152
|
| VCID-u7xr-nq3c-kbge | kernel: x86: fix user address masking non-canonical speculation issue |
CVE-2024-50102
|
| VCID-vb8u-62xq-x7an | kernel: ASoC: qcom: sdm845: add missing soundwire runtime stream alloc |
CVE-2024-50104
|
| VCID-vg8t-ypvc-mfer | kernel: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() |
CVE-2024-50205
|
| VCID-vm4e-s7ny-4ycp | kernel: cifs: fix warning when destroy 'cifs_io_request_pool' |
CVE-2024-50119
|
| VCID-vs6t-f467-gbac | kernel: net: bcmasp: fix potential memory leak in bcmasp_xmit() |
CVE-2024-50170
|
| VCID-w4ks-m4n4-yygw | kernel: net: ethernet: mtk_eth_soc: fix memory corruption during fq dma init |
CVE-2024-50206
|
| VCID-wb16-ndsd-5ufw | kernel: platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses |
CVE-2024-50107
|
| VCID-wf26-4pyj-dye2 | kernel: net/mlx5e: Don't call cleanup on profile rollback failure |
CVE-2024-50146
|
| VCID-ym1f-uxzz-bbbf | kernel: net/mlx5: Unregister notifier on eswitch init failure |
CVE-2024-50136
|
| VCID-ys99-fay9-v3ht | kernel: PCI: Hold rescan lock while adding devices during host probe |
CVE-2024-50122
|
| VCID-yun1-p953-8udc | kernel: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() |
CVE-2024-50210
|
| VCID-z38q-un1p-cyhf | kernel: bpf, arm64: Fix address emission with tag-based KASAN enabled |
CVE-2024-50203
|
| VCID-zg6p-1xh6-nkg9 | kernel: Bluetooth: ISO: Fix UAF on iso_sock_timeout |
CVE-2024-50124
|