Search for packages
| purl | pkg:deb/debian/linux@6.7.7-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-143c-2xam-xkf3 | kernel: drm/amd/display: fix null-pointer dereference on edid reading |
CVE-2024-26728
|
| VCID-1bd1-y6hg-jkht | kernel: xhci: handle isoc Babble and Buffer Overrun events properly |
CVE-2024-26659
|
| VCID-1kfz-zcj1-jbh5 | kernel: net: stmmac: xgmac: fix handling of DPP safety error for DMA channels |
CVE-2024-26684
|
| VCID-1ngm-egxd-8fbg | kernel: drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr |
CVE-2024-26699
|
| VCID-1p9s-h3ug-q3ae | kernel: devlink: fix possible use-after-free and memory leaks in devlink_init() |
CVE-2024-26734
|
| VCID-1pt7-8yue-c3gk | kernel: tls: race between async notify and socket close |
CVE-2024-26583
|
| VCID-1xsv-tyfp-p3g3 | kernel: net: stmmac: protect updates of 64-bit statistics counters |
CVE-2024-26690
|
| VCID-2111-118v-uqeq | kernel: wifi: mac80211: fix potential sta-link leak |
CVE-2024-35838
|
| VCID-239p-skmu-duh2 | kernel: net: implement lockless setsockopt(SO_PEEK_OFF) |
CVE-2024-26732
|
| VCID-249q-v6wt-e7d3 | kernel: media: rkisp1: Fix IRQ disable race issue |
CVE-2023-52589
|
| VCID-2cdv-spwr-xfa4 | kernel: powerpc/kasan: Fix addr error caused by page alignment |
CVE-2024-26712
|
| VCID-2kk2-cj4m-6ucm | kernel: md: Don't ignore suspended array in md_check_recovery() |
CVE-2024-26758
|
| VCID-2yj3-xevt-9qgj | kernel: nilfs2: fix potential bug in end_buffer_async_write |
CVE-2024-26685
|
| VCID-2zvr-q3xg-4bgb | kernel: ext4: regenerate buddy after block freeing failed if under fc replay |
CVE-2024-26601
|
| VCID-35a3-rhpc-7fgv | kernel: block: Fix WARNING in _copy_from_iter |
CVE-2024-26844
|
| VCID-35x9-k6d4-2ya7 | kernel: hwmon: (nct6775) Fix access to temperature configuration registers |
CVE-2024-26730
|
| VCID-3bwh-381p-6qbh | kernel: drm/amd/display: 'panel_cntl' could be null in 'dcn21_set_backlight_level()' |
CVE-2024-26662
|
| VCID-3r27-df68-nkh6 | kernel: tls: handle backlogging of crypto requests |
CVE-2024-26584
|
| VCID-3sd5-9x47-mbgm | kernel: IB/hfi1: Fix a memleak in init_credit_return |
CVE-2024-26839
|
| VCID-3vua-8spr-57a6 | kernel: net: bridge: switchdev: Skip MDB replays of deferred events on offload |
CVE-2024-26837
|
| VCID-3zqk-jyq8-gfbw | kernel: smb: Fix regression in writes when non-standard maximum write size negotiated |
CVE-2024-26692
|
| VCID-3zuh-psk1-wqe1 | kernel: arp: Prevent overflow in arp_req_get(). |
CVE-2024-26733
|
| VCID-43jz-yfag-yfc1 | kernel: nfc: nci: free rx_data_reassembly skb on NCI device cleanup |
CVE-2024-26825
|
| VCID-44bz-6nx3-7fbn | kernel: dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished(). |
CVE-2024-26741
|
| VCID-463m-d1v4-hfd4 | kernel: net/handshake: Fix handshake_req_destroy_test1 |
CVE-2024-26831
|
| VCID-4cb5-a4nx-vbdd | kernel: crypto: algif_hash - Remove bogus SGL free on zero-length error path |
CVE-2024-26824
|
| VCID-4eky-dmz4-3qfh | kernel: iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC |
CVE-2024-26702
|
| VCID-4f94-neut-7qbq | kernel: scsi: target: core: Add TMF to tmr_list handling |
CVE-2024-26845
|
| VCID-4fpb-h2cf-17d7 | kernel: drm/amd/display: Implement bounds check for stream encoder creation in DCN301 |
CVE-2024-26660
|
| VCID-4kmy-n2ts-hfa2 | kernel: sched/membarrier: reduce the ability to hammer on sys_membarrier |
CVE-2024-26602
|
| VCID-4w9t-2ph1-akbs |
CVE-2023-7122
|
|
| VCID-543v-2c3q-4ua4 | kernel: efi: runtime: Fix potential overflow of soft-reserved region size |
CVE-2024-26843
|
| VCID-5a8x-wj8b-8ucr | kernel: sysctl: Fix out of bounds access for empty sysctl registers |
CVE-2023-52596
|
| VCID-5aq3-17g7-puh9 | kernel: usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend |
CVE-2024-26715
|
| VCID-5ehk-s7ww-vfc7 | kernel: platform/x86: think-lmi: Fix password opcode ordering for workstations |
CVE-2024-26836
|
| VCID-5jdk-yfrh-7kay | kernel: wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() |
CVE-2023-52594
|
| VCID-5m1x-wksg-mbbz | kernel: netfilter: nft_flow_offload: reset dst in route object after setting up flow |
CVE-2024-27403
|
| VCID-5zqw-uv5b-nkcb | kernel: fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super |
CVE-2024-26688
|
| VCID-664r-nygz-p3g4 | kernel: net: mvpp2: clear BM pool before initialization |
CVE-2024-35837
|
| VCID-66ar-kth1-nqgr | kernel: RDMA/srpt: Support specifying the srpt_service_guid parameter |
CVE-2024-26744
|
| VCID-67u4-sdzt-w7ep | kernel: i40e: Do not allow untrusted VF to remove administratively set MAC |
CVE-2024-26830
|
| VCID-6cjn-bwy4-bbdq | kernel: btrfs: don't drop extent_map for free space inode on write error |
CVE-2024-26726
|
| VCID-6dy7-vw8u-muhw | kernel: drm/amd/display: Fix disable_otg_wa logic |
CVE-2023-52634
|
| VCID-6qvk-hx6p-aqa5 | kernel: LoongArch: Disable IRQ before init_fn() for nonboot CPUs |
CVE-2024-26765
|
| VCID-6we8-qvfc-57e3 | kernel: tls: use-after-free with partial reads and async decrypt |
CVE-2024-26582
|
| VCID-73tm-jbcc-cybu | kernel: bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel |
CVE-2024-26737
|
| VCID-7bzd-w6v7-jkce | kernel: ceph: fix deadlock or deadcode of misusing dget() |
CVE-2023-52583
|
| VCID-7c2w-d53w-eqbg | kernel: mptcp: fix data re-injection from stale subflow |
CVE-2024-26826
|
| VCID-7cx9-5ckf-y7cq | kernel: drm/buddy: Fix alloc_range() error handling code |
CVE-2024-26911
|
| VCID-7etf-u5j1-9fgt | kernel: inet: read sk->sk_family once in inet_recv_error() |
CVE-2024-26679
|
| VCID-7gbj-q5tk-sfgm | kernel: tunnels: fix out of bounds access when building IPv6 PMTU error |
CVE-2024-26665
|
| VCID-7gj5-1gbe-kfey | kernel: PCI: switchtec: Fix stdev_release() crash after surprise hot remove |
CVE-2023-52617
|
| VCID-7hcx-3pjv-bbbw | kernel: UBSAN: array-index-out-of-bounds in dtSplitRoot |
CVE-2023-52603
|
| VCID-7jee-ctd9-qkg8 | kernel: io_uring/rw: split io_read() into a helper |
CVE-2023-52926
|
| VCID-7pyp-phjy-yue8 | kernel: net/mlx5e: fix a double-free in arfs_create_groups |
CVE-2024-35835
|
| VCID-7tqq-f1wh-87gr | kernel: ALSA: scarlett2: Add missing mutex lock around get meter levels |
CVE-2023-52689
|
| VCID-7yey-ku8y-bfdx | kernel: um: time-travel: fix time corruption |
CVE-2023-52633
|
| VCID-8gn5-y3mp-9qh2 | kernel: powerpc/lib: Validate size for vector operations |
CVE-2023-52606
|
| VCID-8jp1-5yua-k7aw | kernel: interconnect: qcom: sc8180x: Mark CO0 BCM keepalive |
CVE-2024-26714
|
| VCID-8pfz-xb85-r3ef | kernel: iio: adc: ad4130: zero-initialize clock init data |
CVE-2024-26711
|
| VCID-8pmy-wjva-rkf9 | kernel: powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller |
CVE-2024-26738
|
| VCID-8ry8-z6kv-jfgu | kernel: fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats |
CVE-2024-26686
|
| VCID-8rzz-8u2c-xkbf | kernel: jfs: fix uaf in jfs_evict_inode |
CVE-2023-52600
|
| VCID-94kq-ycmm-3bgn | kernel: LoongArch: Update cpu_sibling_map when disabling nonboot CPUs |
CVE-2024-26841
|
| VCID-9axt-c2hy-63eb | kernel: net/sched: act_mirred: use the backlog for mirred ingress |
CVE-2024-26740
|
| VCID-9csm-qaa3-rfcy | kernel: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() |
CVE-2024-26641
|
| VCID-9k6q-vgp6-ckhf | kernel: ipmr: fix kernel panic when forwarding mcast packets |
CVE-2024-26626
|
| VCID-9pkf-9ydd-rug7 | kernel: missing check for struct in dm-table.c can cause a crash |
CVE-2023-52429
|
| VCID-9sf1-ae8k-x7au | kernel: nilfs2: fix data corruption in dsync block recovery for small block sizes |
CVE-2024-26697
|
| VCID-a3f2-zg7s-9ucw | kernel: tls: race between tx work scheduling and socket close |
CVE-2024-26585
|
| VCID-a77b-8hmz-w3gb | kernel: ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() |
CVE-2024-26722
|
| VCID-aapv-dj31-47cf | kernel: bcachefs: kvfree bch_fs::snapshots in bch2_fs_snapshots_exit |
CVE-2024-35832
|
| VCID-arr2-wbjp-mudf | kernel: ppp_async: limit MRU to 64K |
CVE-2024-26675
|
| VCID-asgh-162t-dfh8 | kernel: i2c: i801: Fix block process call transactions |
CVE-2024-26593
|
| VCID-avdc-4xxg-vyej | kernel: drm/amdgpu: Reset IH OVERFLOW_CLEAR bit |
CVE-2024-26915
|
| VCID-avj8-gend-sbdv | kernel: fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio |
CVE-2024-26764
|
| VCID-ax1j-ur4f-r3aq | kernel: drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper() |
CVE-2023-52585
|
| VCID-b1ne-6vj5-67ea | kernel: dpll: fix pin dump crash for rebound module |
CVE-2024-35836
|
| VCID-b5jb-hxj9-uqh7 | kernel: pds_core: Prevent race issues involving the adminq |
CVE-2024-26623
|
| VCID-btkk-63w4-6ke1 | kernel: netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations |
CVE-2024-26673
|
| VCID-bu5t-6nhy-ayfn | kernel: wifi: iwlwifi: mvm: fix a crash when we run out of stations |
CVE-2024-26693
|
| VCID-bu9s-yqrg-1yes | kernel: nilfs2: fix hang in nilfs_lookup_dirty_data_buffers() |
CVE-2024-26696
|
| VCID-bvz9-x3gb-zbhq | kernel: PM / devfreq: Synchronize devfreq_monitor_[start/stop] |
CVE-2023-52635
|
| VCID-bzd4-c6h2-xfer | kernel: ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt |
CVE-2024-26774
|
| VCID-c3wk-9gm2-fkeq | kernel: drm/amd/display: Refactor DMCUB enter/exit idle interface |
CVE-2023-52625
|
| VCID-cear-n94a-jqdq | kernel: KVM: arm64: Fix circular locking dependency |
CVE-2024-26691
|
| VCID-cjwn-zzv5-s3c1 | kernel: fbdev: sis: Error out if pixclock equals zero |
CVE-2024-26777
|
| VCID-crvg-cykq-7fce | kernel: netfilter: nf_tables: set dormant flag on hook register failure |
CVE-2024-26835
|
| VCID-d1vr-psec-ykb6 | kernel: drm/amd/display: fixed integer types and null check locations |
CVE-2024-26767
|
| VCID-d7as-hy17-jyhw | kernel: smb: client: set correct id, uid and cruid for multiuser automounts |
CVE-2024-26822
|
| VCID-dcd5-4y9y-euf5 | kernel: drm/amd/display: Wake DMCUB before sending a command cause deadlock |
CVE-2023-52485
|
| VCID-dn3r-s1en-t3cx | kernel: hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed |
CVE-2024-26820
|
| VCID-dntc-n9fg-syd9 | kernel: usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs |
CVE-2024-27405
|
| VCID-dqe1-cf2v-myes | kernel: ocfs2: Avoid touching renamed directory if parent does not change |
CVE-2023-52590
|
| VCID-dv15-b2j5-pkg2 | kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() |
CVE-2024-26772
|
| VCID-e5qn-m9c1-6bdg | kernel: scsi: smartpqi: Fix disable_managed_interrupts |
CVE-2024-26742
|
| VCID-e8k6-75u2-yyhp | kernel: IB/hfi1: Fix sdma.h tx->num_descs off-by-one error |
CVE-2024-26766
|
| VCID-e8wz-cz6z-1ubk | kernel: nouveau: offload fence uevents work to workqueue |
CVE-2024-26719
|
| VCID-ebx6-ep7x-4qeq | kernel: tracing/trigger: Fix to return error if failed to alloc snapshot |
CVE-2024-26920
|
| VCID-ehrw-w91b-w3bw | kernel: jfs: fix array-index-out-of-bounds in diNewExt |
CVE-2023-52599
|
| VCID-ek71-xvpc-yqfm | kernel: usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() |
CVE-2024-26749
|
| VCID-exkc-gh4x-p3bh | kernel: drm/amd/display: Wake DMCUB before executing GPINT commands |
CVE-2023-52624
|
| VCID-ezrm-15ba-xybx | kernel: dm-crypt, dm-verity: disable tasklets |
CVE-2024-26718
|
| VCID-f2mv-ykhh-j7cf | kernel: block/rnbd-srv: Check for unlikely string overflow |
CVE-2023-52618
|
| VCID-f4hz-pyqx-rqd8 | kernel: tcp: add sanity checks to rx zerocopy |
CVE-2024-26640
|
| VCID-f5sw-8wup-nydf | kernel: cifs: fix underflow in parse_server_interfaces() |
CVE-2024-26828
|
| VCID-f965-vsaw-gkbp | kernel: tracing/timerlat: Move hrtimer_init to timerlat_fd open() |
CVE-2024-26703
|
| VCID-fjhn-c5da-sbc4 | kernel: bcachefs: grab s_umount only if snapshotting |
CVE-2024-26658
|
| VCID-fker-kfkw-j3dq | kernel: net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers |
CVE-2024-26724
|
| VCID-fnjy-w5n6-8ydh | kernel: fbdev: savage: Error out if pixclock equals zero |
CVE-2024-26778
|
| VCID-fwqk-pkyr-73bq | kernel: SUNRPC: Fix a suspicious RCU usage warning |
CVE-2023-52623
|
| VCID-fyj6-t5jr-u7d4 | kernel: stack overflow problem in Open vSwitch kernel module leading to DoS |
CVE-2024-1151
|
| VCID-fysg-mkt6-g7gm | kernel: pstore/ram: Fix crash when setting number of cpus to an odd number |
CVE-2023-52619
|
| VCID-g6m2-r1ab-vyev | kernel: powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach |
CVE-2024-26709
|
| VCID-gm3e-d4pv-53aq | kernel: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' |
CVE-2024-26661
|
| VCID-gtn4-34a8-13ad | kernel: xsk: recycle buffer in case Rx queue was full |
CVE-2024-35834
|
| VCID-gxcn-vsck-cbff | kernel: irqchip/gic-v3-its: Restore quirk probing for ACPI-based systems |
CVE-2024-26823
|
| VCID-h3m6-5d2d-87cd | kernel: HID: nvidia-shield: Add missing null pointer checks to LED initialization |
CVE-2024-26770
|
| VCID-hdyh-jmes-w7du | kernel: wifi: mac80211: improve CSA/ECSA connection refusal |
CVE-2024-26682
|
| VCID-hezj-4vaw-v3fz | kernel: netfilter: nft_flow_offload: release dst in case direct xmit path is used |
CVE-2024-26834
|
| VCID-hmwp-tuzr-vqam | kernel: xen/events: close evtchn after mapping cleanup |
CVE-2024-26687
|
| VCID-htyr-jnu7-e3gf | kernel: drm/msm/dpu: Add mutex lock in control vblank irq |
CVE-2023-52586
|
| VCID-hv12-tq9p-4qgd | kernel: fs/ntfs3: Fix oob in ntfs_listxattr |
CVE-2023-52640
|
| VCID-hxdv-tgyq-pkg5 | kernel: net: atlantic: eliminate double free in error handling logic |
CVE-2023-52664
|
| VCID-hxuu-q3q3-zbaj | kernel: wifi: ath12k: fix the error handler of rfkill config |
CVE-2023-52688
|
| VCID-hzyc-4137-fqbs | kernel: net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame() |
CVE-2024-26707
|
| VCID-j2ya-2dnx-3qd9 | kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers |
CVE-2023-52621
|
| VCID-jb11-v7nr-rbej | kernel: PCI: Fix active state requirement in PME polling |
CVE-2024-26918
|
| VCID-jnup-c1qn-y7cd | kernel: wifi: iwlwifi: fix double-free bug |
CVE-2024-26694
|
| VCID-jt1f-hbnn-abaf | kernel: btrfs: do not ASSERT() if the newly created subvolume already got read |
CVE-2024-26727
|
| VCID-jxrt-7n71-jfaj | kernel: hwmon: (coretemp) Fix out-of-bounds memory access |
CVE-2024-26664
|
| VCID-jzdj-2xqf-dbhp | kernel: parisc: Fix random data corruption from exception handler |
CVE-2024-26706
|
| VCID-k6t6-t6ta-u3au | kernel: phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP |
CVE-2024-26600
|
| VCID-kg8v-183b-33ce | kernel: rxrpc: Fix delayed ACKs to not set the reference serial number |
CVE-2024-26677
|
| VCID-kh3q-mq8r-qfgx | kernel: cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window |
CVE-2024-26761
|
| VCID-kjvy-urtq-83f5 | kernel: fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame() |
CVE-2023-52641
|
| VCID-kqr7-ntzt-nke6 | kernel: wifi: cfg80211: detect stuck ECSA element in probe resp |
CVE-2024-26683
|
| VCID-kuce-ewwr-pbf1 | kernel: wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap() |
CVE-2023-52593
|
| VCID-kvrc-3jm4-vfcw | kernel: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() |
CVE-2024-26773
|
| VCID-m1yc-gwxv-m7fn | kernel: jfs: fix array-index-out-of-bounds in dbAdjTree |
CVE-2023-52601
|
| VCID-m527-1m79-ufdj | kernel: afs: Increase buffer size in afs_update_volume_status() |
CVE-2024-26736
|
| VCID-m6yv-nu11-ayg2 | kernel: drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue |
CVE-2024-26913
|
| VCID-m7vq-rzm8-vyfu | kernel: usb: cdns3: fix memory double free when handle zero packet |
CVE-2024-26748
|
| VCID-mbpp-vv7v-ekht | kernel: can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock |
CVE-2023-52638
|
| VCID-md1z-9uta-jqa4 | kernel: spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected |
CVE-2024-26776
|
| VCID-mjmu-rtay-zqgx | kernel: KVM: s390: vsie: fix race during shadow creation |
CVE-2023-52639
|
| VCID-mxy8-55u9-zugw | kernel: x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section |
CVE-2024-26678
|
| VCID-n172-tvh7-53b6 | kernel: drm/amd/display: Fix memory leak in dm_sw_fini() |
CVE-2024-26833
|
| VCID-n4c6-4174-5fhz | kernel: KVM: s390: fix setting of fpc register |
CVE-2023-52597
|
| VCID-npmt-bggh-akfx | kernel: drm/amd/display: Fix a debugfs null pointer error |
CVE-2023-52673
|
| VCID-nrdq-h2qv-tka6 | kernel: lib/Kconfig.debug: TEST_IOV_ITER depends on MMU |
CVE-2024-27406
|
| VCID-ns3b-y29f-skc4 | kernel: llc: call sock_orphan() at release time |
CVE-2024-26625
|
| VCID-ntqj-fmmb-b3g8 | kernel: md: Don't register sync_thread for reshape directly |
CVE-2024-26756
|
| VCID-nvrd-u2p1-cker | kernel: crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked |
CVE-2024-26695
|
| VCID-nx4j-stwh-mkdj | kernel: mm/swap: fix race when skipping swapcache |
CVE-2024-26759
|
| VCID-p3my-xcuy-qfh8 | kernel: powerpc/mm: Fix null-pointer dereference in pgtable_cache_add |
CVE-2023-52607
|
| VCID-p6ja-67pe-53hx | kernel: PCI/ASPM: Fix deadlock when enabling ASPM |
CVE-2024-26605
|
| VCID-pddw-t3ya-eyhy | kernel: mm: zswap: fix missing folio cleanup in writeback race path |
CVE-2024-26832
|
| VCID-peeu-wvm2-w3b2 | kernel: cxl/pci: Skip to handle RAS errors if CXL.mem device is detached |
CVE-2024-26762
|
| VCID-pk3g-b8uw-xuas | kernel: dm-crypt: don't modify the data when using authenticated encryption |
CVE-2024-26763
|
| VCID-pn8m-n4jt-8ba7 | kernel: aoe: avoid potential deadlock at set_capacity |
CVE-2024-26775
|
| VCID-q37j-g4wv-3ufp | kernel: lan966x: Fix crash when adding interface under a lag |
CVE-2024-26723
|
| VCID-qbej-n8yk-ubbc | kernel: media: rc: bpf attach/detach requires write permission |
CVE-2023-52642
|
| VCID-qd7c-769p-gkeh | kernel: phonet/pep: fix racy skb_queue_empty() use |
CVE-2024-27402
|
| VCID-qfuw-du38-d3bs | kernel: drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address |
CVE-2024-26721
|
| VCID-qgh4-xfdk-97cu | kernel: tools/rtla: Fix clang warning about mount_point var size |
CVE-2024-26818
|
| VCID-qnrb-hsen-y7d8 | kernel: netfilter: ipset: fix performance regression in swap operation |
CVE-2024-26910
|
| VCID-qthv-ewky-zkd6 | kernel: mptcp: fix data races on remote_id |
CVE-2024-27404
|
| VCID-qvdm-arkx-p3fd | kernel: ext4: avoid online resizing failures due to oversized flex bg |
CVE-2023-52622
|
| VCID-rb9m-rdph-uqeu | kernel: mptcp: really cope with fastopen race |
CVE-2024-26708
|
| VCID-rcgs-k68c-q7f2 | kernel: bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() |
CVE-2024-26731
|
| VCID-rd66-swur-nqhc | kernel: ARM: ep93xx: Add terminator to gpiod_lookup_table |
CVE-2024-26751
|
| VCID-rdch-b3ck-qugc | kernel: drm/amd/display: Fix hang/underflow when transitioning to ODM4:1 |
CVE-2023-52671
|
| VCID-rxg9-r5be-c7ds | kernel: RDMA/irdma: Fix KASAN issue with tasklet |
CVE-2024-26838
|
| VCID-rxhs-4w1n-x7ah | kernel: mm: huge_memory: don't force huge page alignment on 32 bit |
CVE-2024-26621
|
| VCID-rygq-nw8t-tkd4 | kernel: s390/ptrace: handle setting of fpc register correctly |
CVE-2023-52598
|
| VCID-ryyq-d5hc-fbbv | kernel: nftables: nft_set_rbtree skip end interval element from gc |
CVE-2024-26581
|
| VCID-rzvj-774t-cqf8 | kernel: drm/amdgpu: variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()' |
CVE-2024-26672
|
| VCID-s3n2-xxqf-dqeg | kernel: parisc: BTLB: Fix crash when setting up BTLB at CPU bringup |
CVE-2024-26705
|
| VCID-s6ed-f4sh-j3dj | kernel: ext4: fix double-free of blocks due to wrong extents moved_len |
CVE-2024-26704
|
| VCID-s955-t5xv-8yhh | kernel: usb: core: Prevent null pointer dereference in update_port_device_state |
CVE-2024-26716
|
| VCID-sb29-fbqn-47aw | kernel: md: Fix missing release of 'active_io' for flush |
CVE-2024-27023
|
| VCID-sefq-tp4u-zqea | kernel: cachefiles: fix memory leak in cachefiles_add_cache() |
CVE-2024-26840
|
| VCID-sh44-jt7p-9yc5 | kernel: netdevsim: avoid potential loop in nsim_dev_trap_report_work() |
CVE-2024-26681
|
| VCID-sny1-rwgv-j7c5 | kernel: FS:JFS:UBSAN: array-index-out-of-bounds in dbAdjTree |
CVE-2023-52604
|
| VCID-sx2x-9yj3-g7gs | kernel: nvmet-fc: avoid deadlock on delete association path |
CVE-2024-26769
|
| VCID-sxfg-8pnj-5fex | kernel: drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv |
CVE-2024-26729
|
| VCID-syzp-m2pa-xyf1 | kernel: media: ir_toy: fix a memleak in irtoy_tx |
CVE-2024-26829
|
| VCID-t3rd-gv37-rubr | kernel: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() |
CVE-2024-26663
|
| VCID-tf1n-h74u-guex | kernel: net: tls, fix WARNIING in __sk_msg_free |
CVE-2024-35841
|
| VCID-tfhk-epj4-7yh3 | kernel: IB/ipoib: Fix mcast list locking |
CVE-2023-52587
|
| VCID-tgch-ns3e-qkhc | kernel: LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC] |
CVE-2024-26768
|
| VCID-tjzs-ktu1-kugh | In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events After the blamed commit, we started doing this dereference for every NETDEV_CHANGEUPPER and NETDEV_PRECHANGEUPPER event in the system. static inline struct dsa_port *dsa_user_to_port(const struct net_device *dev) { struct dsa_user_priv *p = netdev_priv(dev); return p->dp; } Which is obviously bogus, because not all net_devices have a netdev_priv() of type struct dsa_user_priv. But struct dsa_user_priv is fairly small, and p->dp means dereferencing 8 bytes starting with offset 16. Most drivers allocate that much private memory anyway, making our access not fault, and we discard the bogus data quickly afterwards, so this wasn't caught. But the dummy interface is somewhat special in that it calls alloc_netdev() with a priv size of 0. So every netdev_priv() dereference is invalid, and we get this when we emit a NETDEV_PRECHANGEUPPER event with a VLAN as its new upper: $ ip link add dummy1 type dummy $ ip link add link dummy1 name dummy1.100 type vlan id 100 [ 43.309174] ================================================================== [ 43.316456] BUG: KASAN: slab-out-of-bounds in dsa_user_prechangeupper+0x30/0xe8 [ 43.323835] Read of size 8 at addr ffff3f86481d2990 by task ip/374 [ 43.330058] [ 43.342436] Call trace: [ 43.366542] dsa_user_prechangeupper+0x30/0xe8 [ 43.371024] dsa_user_netdevice_event+0xb38/0xee8 [ 43.375768] notifier_call_chain+0xa4/0x210 [ 43.379985] raw_notifier_call_chain+0x24/0x38 [ 43.384464] __netdev_upper_dev_link+0x3ec/0x5d8 [ 43.389120] netdev_upper_dev_link+0x70/0xa8 [ 43.393424] register_vlan_dev+0x1bc/0x310 [ 43.397554] vlan_newlink+0x210/0x248 [ 43.401247] rtnl_newlink+0x9fc/0xe30 [ 43.404942] rtnetlink_rcv_msg+0x378/0x580 Avoid the kernel oops by dereferencing after the type check, as customary. |
CVE-2024-26596
|
| VCID-tsw8-19qk-5bcm | kernel: wifi: mac80211: fix RCU use in TDLS fast-xmit |
CVE-2024-26666
|
| VCID-twgp-pmh7-vqaj | kernel: md: Don't suspend the array for interrupted reshape |
CVE-2024-26755
|
| VCID-tzx8-35su-3uee | kernel: drm/amd/display: Check writeback connectors in create_validate_stream_for_sink |
CVE-2023-52695
|
| VCID-u1wk-h9yz-duh6 | kernel: usb: ulpi: Fix debugfs directory leak |
CVE-2024-26919
|
| VCID-ua4v-jdn7-mqar | kernel: iio: core: fix memleak in iio_device_register_sysfs |
CVE-2023-52643
|
| VCID-ugcg-6z1z-1fgp | kernel: x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups |
CVE-2024-26674
|
| VCID-ujay-r4dd-37fh | kernel: net/sched: act_mirred: don't override retval if we already lost the skb |
CVE-2024-26739
|
| VCID-ujfc-hqyx-bugp | kernel: jfs: fix slab-out-of-bounds Read in dtSearch |
CVE-2023-52602
|
| VCID-unts-rgnw-8bdy | kernel: wifi: rt2x00: restart beacon queue when hardware reset |
CVE-2023-52595
|
| VCID-upvd-vvq1-w3du | kernel: x86/fpu: Stop relying on userspace for info to fault in xsave buffer that cause loop forever |
CVE-2024-26603
|
| VCID-urnh-q2jd-27dj | kernel: netfilter: nf_tables: use timestamp to check for set element timeout |
CVE-2024-27397
|
| VCID-uszg-hzsy-abaq | kernel: tls: stop recv() if initial process_rx_list gave us non-DATA |
CVE-2024-58239
|
| VCID-utgf-thte-q7et | kernel: scsi: ufs: core: Fix shift issue in ufshcd_clear_cmd() |
CVE-2024-26842
|
| VCID-uw5k-rjhq-6fat | kernel: af_unix: Call kfree_skb() for dead unix_(sk)->oob_skb in GC |
CVE-2024-26676
|
| VCID-uwac-p3w6-j7gj | kernel: signal epoll threads of self-work |
CVE-2024-26606
|
| VCID-uyrh-qydt-byek | kernel: null pointer dereference in kobject |
CVE-2024-26604
|
| VCID-ve2w-upz5-gufe | kernel: crypto: virtio/akcipher - Fix stack overflow on memcpy |
CVE-2024-26753
|
| VCID-vexy-z52v-audg | kernel: ceph: prevent use-after-free in encode_cap_msg() |
CVE-2024-26689
|
| VCID-vm6q-9huu-4qcf | kernel: ASoC: mediatek: sof-common: Add NULL check for normal_link string |
CVE-2024-35842
|
| VCID-vt3e-tx5j-b7aq | kernel: reiserfs: Avoid touching renamed directory if parent does not change |
CVE-2023-52591
|
| VCID-vvx8-gvt8-quax | kernel: RDMA/qedr: Fix qedr_create_user_qp error flow |
CVE-2024-26743
|
| VCID-vw97-wv4u-vud6 | kernel: Revert "drm/amd: flush any delayed gfxoff on suspend entry" |
CVE-2024-26916
|
| VCID-vyvg-v6b3-hye4 | kernel: drm/nouveau: fix several DMA buffer leaks |
CVE-2024-26912
|
| VCID-vz55-n2g2-zyfr | kernel: f2fs: fix to tag gcing flag on page during block migration |
CVE-2023-52588
|
| VCID-w1vu-htm1-cfcr | kernel: spmi: mediatek: Fix UAF on device remove |
CVE-2023-52584
|
| VCID-w45n-4su1-v7gz | kernel: hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove |
CVE-2024-26698
|
| VCID-wc3q-scn6-cfdp | kernel: scsi: Revert "scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock" |
CVE-2024-26917
|
| VCID-wr1t-4ej9-6kdf | kernel: dmaengine: ti: edma: Add some null pointer checks to the edma_probe |
CVE-2024-26771
|
| VCID-wr73-m2yh-j3dh | kernel: net: atlantic: Fix DMA mapping for PTP hwts ring |
CVE-2024-26680
|
| VCID-wu22-etja-qqgx | kernel: scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler |
CVE-2024-26627
|
| VCID-wvwb-jxx2-ayg6 | kernel: drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup |
CVE-2024-26667
|
| VCID-ww39-6h4t-suen | kernel: scsi: target: pscsi: Fix bio_put() for error case |
CVE-2024-26760
|
| VCID-wwqj-ar5c-uucd | kernel: dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA |
CVE-2024-35833
|
| VCID-x6j6-xyqc-guhn | kernel: can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) |
CVE-2023-52637
|
| VCID-xjqd-zx8p-2uhs | kernel: pmdomain: mediatek: fix race conditions with genpd |
CVE-2023-52645
|
| VCID-xkvs-16y6-aua1 | kernel: fs/ntfs3: Fixed overflow check in mi_enum_attr() |
CVE-2024-27407
|
| VCID-xs28-ecvs-mfhp | kernel: dpll: fix possible deadlock during netlink dump operation |
CVE-2024-26725
|
| VCID-xt3k-ke6q-ufet | kernel: firmware: qcom: qseecom: fix memory leaks in error paths |
CVE-2023-52684
|
| VCID-xzy7-2gsp-vbd8 | kernel: gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() |
CVE-2024-26754
|
| VCID-y1n6-njkj-6uhu | kernel: drm/amd/display: Fix MST Null Ptr for RV |
CVE-2024-26700
|
| VCID-y8j1-wdx9-s3gc | kernel: l2tp: pass correct message length to ip6_append_data |
CVE-2024-26752
|
| VCID-yaps-gywk-auaf | kernel: blk-mq: fix IO hang from sbitmap wakeup race |
CVE-2024-26671
|
| VCID-yk3n-6dve-wqft | kernel: wifi: mac80211: fix race condition on enabling fast-xmit |
CVE-2024-26779
|
| VCID-ys4q-tks4-g7eh | kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref |
CVE-2024-26735
|
| VCID-yu2z-4f94-mbgu | kernel: drm/amdkfd: lock dependency warning with srcu |
CVE-2023-52632
|
| VCID-ywtf-xf5k-xfeb | kernel: nvme-fc: do not wait in vain when unloading module |
CVE-2024-26846
|
| VCID-z24p-wtzg-a3gh | kernel: md: Don't ignore read-only array in md_check_recovery() |
CVE-2024-26757
|
| VCID-zdyy-tzus-eubm | kernel: HID: i2c-hid-of: fix NULL-deref on failed power up |
CVE-2024-26717
|
| VCID-zfyf-xpsw-cuaf | kernel: usb: roles: fix NULL pointer issue when put module's reference |
CVE-2024-26747
|
| VCID-zq9r-4e9s-e3gn | kernel: fs/ntfs3: NULL pointer dereference issue |
CVE-2023-52631
|
| VCID-zrf8-efng-gfd9 | kernel: drm/amd/display: fix incorrect mpc_combine array size |
CVE-2024-26914
|
| VCID-ztyh-48na-u7c1 | kernel: libceph: just wait for more data to be available on the socket |
CVE-2023-52636
|