Search for packages
| purl | pkg:deb/debian/linux@6.11.9-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-13b9-m28b-hfb9 | kernel: bpf: Check validity of link->type in bpf_link_show_fdinfo() |
CVE-2024-53099
|
| VCID-1hvg-tmga-nfhm | kernel: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() |
CVE-2024-53068
|
| VCID-1kfb-qzjj-6fc8 | kernel: net: arc: fix the device for dma_map_single/dma_unmap_single |
CVE-2024-50295
|
| VCID-2bay-kzph-yya3 | kernel: RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES |
CVE-2024-53094
|
| VCID-2s5m-15wa-93d3 | kernel: USB: serial: io_edgeport: fix use after free in debug printk |
CVE-2024-50267
|
| VCID-2zcx-p5k1-7ydn | kernel: ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp |
CVE-2024-50283
|
| VCID-3x91-m1uq-uufj | kernel: net: vertexcom: mse102x: Fix possible double free of TX skb |
CVE-2024-50276
|
| VCID-4fe1-5u1k-xubh | kernel: media: dvb-core: add missing buffer index check |
CVE-2024-50291
|
| VCID-51jb-1n28-nqeq | kernel: dm: fix a crash if blk_alloc_disk fails |
CVE-2024-50277
|
| VCID-5xud-fsmq-93cs | kernel: nvme: tcp: avoid race between queue_lock lock and destroy |
CVE-2024-53100
|
| VCID-6c3x-q991-5uh7 | kernel: net: enetc: allocate vf_state during PF probes |
CVE-2024-50298
|
| VCID-6f63-djtc-pkcm | kernel: mm: krealloc: Fix MTE false alarm in __do_krealloc |
CVE-2024-53097
|
| VCID-719s-u3xc-gyas | kernel: media: dvbdev: prevent the risk of out of memory access |
CVE-2024-53063
|
| VCID-7etb-wzrv-17ck | kernel: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format |
CVE-2024-53104
|
| VCID-88sg-akpr-nfah | kernel: scsi: ufs: core: Start the RTC update work later |
CVE-2024-53067
|
| VCID-8w7y-pzaz-zug3 | kernel: i40e: fix race condition by adding filter's intermediate sync state |
CVE-2024-53088
|
| VCID-8x5z-wwqe-k3dk | kernel: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans |
CVE-2024-50264
|
| VCID-a89e-bca3-1qfg | kernel: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() |
CVE-2024-50282
|
| VCID-ajqr-9kbr-5fhq | kernel: clk: qcom: videocc-sm8350: use HW_CTRL_TRIGGER for vcodec GDSCs |
CVE-2024-50266
|
| VCID-aqny-mux9-53b1 | kernel: virtio_pci: Fix admin vq cleanup by using correct info pointer |
CVE-2024-53092
|
| VCID-bbyk-8kpf-cygb | kernel: media: vivid: fix buffer overwrite when using > 32 buffers |
CVE-2024-50288
|
| VCID-c288-s5y9-afd6 | kernel: net/smc: do not leave a dangling sk pointer in __smc_create() |
CVE-2024-50293
|
| VCID-c8nj-6r7j-cbdz | kernel: nfs: Fix KMSAN warning in decode_getfattr_attrs() |
CVE-2024-53066
|
| VCID-cqye-p3y7-bfdp | kernel: mm/thp: fix deferred split unqueue naming and locking |
CVE-2024-53079
|
| VCID-d1bh-3anc-sqax | kernel: signal: restore the override_rlimit logic |
CVE-2024-50271
|
| VCID-d2sh-awet-47br | kernel: arm64/sve: Discard stale CPU state when handling SVE traps |
CVE-2024-50275
|
| VCID-d313-d7rr-1ufq | kernel: media: v4l2-tpg: prevent the risk of a division by zero |
CVE-2024-50287
|
| VCID-e2qa-qvbq-rkf6 | kernel: drm/xe/ufence: Prefetch ufence addr to catch bogus address |
CVE-2024-53098
|
| VCID-e42z-ac66-gye3 | kernel: ksmbd: check outstanding simultaneous SMB operations |
CVE-2024-50285
|
| VCID-e57d-cw7e-73an | kernel: media: av7110: fix a spectre vulnerability |
CVE-2024-50289
|
| VCID-e89h-5xpk-gbfx | kernel: ksmbd: Fix the missing xa_store error check |
CVE-2024-50284
|
| VCID-efdz-65kh-4ycs | kernel: KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation |
CVE-2024-50281
|
| VCID-f1qx-m6tb-u7d2 | kernel: btrfs: reinitialize delayed ref list after deleting it from the list |
CVE-2024-50273
|
| VCID-f8xt-eu56-cuh3 | kernel: usb: typec: qcom-pmic: init value of hdr_len/txbuf_len earlier |
CVE-2024-53083
|
| VCID-fk4r-x3ke-sba5 | kernel: mm/damon/core: avoid overflow in damon_feed_loop_next_input() |
CVE-2024-50270
|
| VCID-gvhf-97c2-g7cv | kernel: drm/xe: Fix possible exec queue leak in exec IOCTL |
CVE-2024-53087
|
| VCID-hc84-6ccr-dqbg | kernel: media: s5p-jpeg: prevent buffer overflows |
CVE-2024-53061
|
| VCID-j12u-u3h9-7kay | kernel: dm cache: fix out-of-bounds access to the dirty bitset when resizing |
CVE-2024-50279
|
| VCID-jbcp-t4z6-huep | kernel: HID: core: zero-initialize the report buffer |
CVE-2024-50302
|
| VCID-jnsp-4jt9-aqas | kernel: dm cache: fix potential out-of-bounds access on the first resume |
CVE-2024-50278
|
| VCID-jse8-z36k-n3c1 | kernel: idpf: avoid vport access in idpf_get_link_ksettings |
CVE-2024-50274
|
| VCID-k5kp-w1r3-mka3 | kernel: drm/panthor: Be stricter about IO mapping flags |
CVE-2024-53071
|
| VCID-k8rb-1eb9-cyad | kernel: regulator: rtq2208: Fix uninitialized use of regulator_config |
CVE-2024-50300
|
| VCID-kdnu-vdbr-j3dx | kernel: virtio_net: Add hash_key_length check |
CVE-2024-53082
|
| VCID-mrqr-xr12-m3bt | kernel: idpf: fix idpf_vc_core_init error path |
CVE-2024-53064
|
| VCID-mw1y-1bts-myc8 | kernel: ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() |
CVE-2024-50265
|
| VCID-nffy-y512-y7eb | kernel: rxrpc: Fix missing locking causing hanging calls |
CVE-2024-50294
|
| VCID-nfue-k99d-j7gm | kernel: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() |
CVE-2024-50268
|
| VCID-p47c-bn8d-6ka7 | kernel: LoongArch: KVM: Mark hrtimer to expire in hard interrupt context |
CVE-2024-53089
|
| VCID-pdqf-1g62-hbdw | kernel: mm/slab: fix warning caused by duplicate kmem_cache creation in kmem_buckets_create |
CVE-2024-53065
|
| VCID-pke6-9ymy-nugy | kernel: firmware: qcom: scm: fix a NULL-pointer dereference |
CVE-2024-53069
|
| VCID-ppgp-v6th-y3ar | kernel: smb: client: Fix use-after-free of network namespace. |
CVE-2024-53095
|
| VCID-qkqv-9qa2-9yh1 | kernel: drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL |
CVE-2024-53086
|
| VCID-qrsb-4ya6-h3c7 | kernel: net: hns3: fix kernel crash when uninstalling driver |
CVE-2024-50296
|
| VCID-qsh4-teb7-8fdw | kernel: media: mgb4: protect driver against spectre |
CVE-2024-53062
|
| VCID-qw5g-hukq-kfb1 | kernel: filemap: Fix bounds checking in filemap_read() |
CVE-2024-50272
|
| VCID-qzy8-dgxc-2kgd | kernel: dm cache: fix flushing uninitialized delayed_work on cache_ctr error |
CVE-2024-50280
|
| VCID-r8df-7maq-aqdd | kernel: nvme-multipath: defer partition scanning |
CVE-2024-53093
|
| VCID-sduq-4eqy-subt | kernel: media: cx24116: prevent overflows on SNR calculus |
CVE-2024-50290
|
| VCID-szze-gp8f-ayau | kernel: net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts |
CVE-2024-50297
|
| VCID-tvc9-zhxc-pycb | kernel: fs: Fix uninitialized value issue in from_kuid and from_kgid |
CVE-2024-53101
|
| VCID-u3yu-4asz-dfea | kernel: usb: musb: sunxi: Fix accessing an released usb phy |
CVE-2024-50269
|
| VCID-v41b-jva8-u7at | kernel: afs: Fix lock recursion |
CVE-2024-53090
|
| VCID-v8tr-mqz7-57he | kernel: drm/panthor: Lock XArray when getting entries for the VM |
CVE-2024-53080
|
| VCID-vaud-8ds2-qyfu | kernel: ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove |
CVE-2024-50292
|
| VCID-vhhs-psam-b3cs | kernel: drm/imagination: Break an object reference loop |
CVE-2024-53084
|
| VCID-wp1v-bqdp-t3ct | kernel: sctp: properly validate chunk size in sctp_sf_ootb() |
CVE-2024-50299
|
| VCID-xb4p-ngcu-m3by | kernel: tpm: Lock TPM chip in tpm_pm_suspend() first |
CVE-2024-53085
|
| VCID-ye4m-yv6w-wff1 | kernel: drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported |
CVE-2024-53060
|
| VCID-yp2f-3vbz-y7cf | kernel: platform/x86/amd/pmc: Detect when STB is not available |
CVE-2024-53072
|
| VCID-yp3t-dtgd-1qaq | kernel: ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create |
CVE-2024-50286
|
| VCID-yp6e-f5fp-7kbz | kernel: security/keys: fix slab-out-of-bounds in key_task_permission |
CVE-2024-50301
|
| VCID-yrgr-2c4c-3fgq | kernel: bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx |
CVE-2024-53091
|
| VCID-zhbd-4d3e-1udf | kernel: media: ar0521: don't overflow when checking PLL values |
CVE-2024-53081
|
| VCID-zkx5-gp3j-93gx | kernel: usb: dwc3: fix fault at system suspend if device was already runtime suspended |
CVE-2024-53070
|
| VCID-zs6h-f21e-vked | kernel: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer |
CVE-2024-53103
|