Search for packages
| purl | pkg:deb/debian/linux@6.8.11-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1btx-dvze-suhw | kernel: usb: typec: tcpm: Check for port partner validity before consuming it |
CVE-2024-36893
|
| VCID-1hpy-guxt-uuab | kernel: KEYS: trusted: Do not use WARN when encode fails |
CVE-2024-36975
|
| VCID-1mt5-q22p-9ucu | kernel: erofs: reliably distinguish block based and fscache mode |
CVE-2024-36966
|
| VCID-1szb-4tyc-tues | kernel: Reapply "drm/qxl: simplify qxl_fence_wait" |
CVE-2024-36944
|
| VCID-23jg-hcqu-xqgy | kernel: xdp: use flags field to disambiguate broadcast redirect |
CVE-2024-36937
|
| VCID-3p12-3rg3-syhx | kernel: ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() |
CVE-2024-36955
|
| VCID-4g9m-tgs9-63hf | kernel: phonet: fix rtm_phonet_notify() skb allocation |
CVE-2024-36946
|
| VCID-4yrc-d7ec-9feq | kernel: usb: dwc3: Wait unconditionally after issuing EndXfer command |
CVE-2024-36977
|
| VCID-56ju-usbt-z3bc | kernel: e1000e: change usleep_range to udelay in PHY mdic access |
CVE-2024-36887
|
| VCID-5cs1-7b6w-wff4 | kernel: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() |
CVE-2024-36924
|
| VCID-5dvn-jwuc-zyce | kernel: thermal/debugfs: Free all thermal zone debug memory on zone removal |
CVE-2024-36956
|
| VCID-5jx3-bsa8-1qeq | kernel: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout |
CVE-2024-27399
|
| VCID-5kzd-ar7m-cqhk | kernel: thermal/debugfs: Fix two locking issues with thermal zone debug |
CVE-2024-36961
|
| VCID-5u3f-dumb-gfej | kernel: Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout |
CVE-2024-27398
|
| VCID-62pu-agc8-nfaa | kernel: maple_tree: fix mas_empty_area_rev() null pointer dereference |
CVE-2024-36891
|
| VCID-6kt2-tzb7-4ybp | kernel: scsi: mpi3mr: Avoid memcpy field-spanning write WARNING |
CVE-2024-36920
|
| VCID-6xwg-t7my-zbgk | kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on removal |
CVE-2024-36921
|
| VCID-6y86-317b-jfgs | kernel: dyndbg: fix old BUG_ON in >control parser |
CVE-2024-35947
|
| VCID-72u6-pymj-mfhu | kernel: nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). |
CVE-2024-36933
|
| VCID-73mt-g8xh-xfbj | kernel: drm/vmwgfx: Fix invalid reads in fence signaled events |
CVE-2024-36960
|
| VCID-7v4n-4x85-dygx | kernel: mm/userfaultfd: reset ptes when close() for wr-protected ones |
CVE-2024-36881
|
| VCID-8he7-jqy4-ufc5 | kernel: qibfs: fix dentry leak |
CVE-2024-36947
|
| VCID-8pa6-1src-eub8 | kernel: block: fix overflow in blk_ioctl_discard() |
CVE-2024-36917
|
| VCID-8r8x-wjrt-sfhk | kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault() |
CVE-2024-36884
|
| VCID-9cmf-8f5a-83cv | kernel: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete |
CVE-2024-36894
|
| VCID-9unb-bgme-ebfk | kernel: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails |
CVE-2024-36913
|
| VCID-9w92-jwnf-tqab | kernel: drm/amd/display: Fix division by zero in setup_dsc_config |
CVE-2024-36969
|
| VCID-a1rd-xu94-9bad | kernel: amd/amdkfd: sync all devices to wait all processes being evicted |
CVE-2024-36949
|
| VCID-a713-geaa-v3gy | kernel: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE |
CVE-2024-36926
|
| VCID-b746-drvq-37hn | kernel: TIPC message reassembly use-after-free remote code execution vulnerability |
CVE-2024-36886
|
| VCID-b8ds-ns33-2kad | kernel: pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() |
CVE-2024-36959
|
| VCID-cxtx-363a-ufhd | kernel: Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() |
CVE-2024-36013
|
| VCID-cy4u-dp82-7uag | kernel: blk-iocost: avoid out of bounds shift |
CVE-2024-36916
|
| VCID-dcg6-ew1b-37dz | kernel: net: core: reject skb_copy(_expand) for fraglist GSO skbs |
CVE-2024-36929
|
| VCID-djgy-muty-mygk | kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify |
CVE-2024-36899
|
| VCID-dqpz-g4ub-wqh9 | kernel: bna: ensure the copied buf is NUL terminated |
CVE-2024-36934
|
| VCID-ea2p-mqtk-buct | kernel: swiotlb: initialise restricted pool list_head when SWIOTLB_DYNAMIC=y |
CVE-2024-36925
|
| VCID-eqrs-ebsv-ckfe | kernel: spi: fix null pointer dereference within spi_sync |
CVE-2024-36930
|
| VCID-eswy-ps47-8fex | kernel: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl |
CVE-2024-36912
|
| VCID-etb2-844u-jfdu | kernel: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() |
CVE-2024-36968
|
| VCID-eumc-r17x-skh8 | kernel: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation |
CVE-2024-36017
|
| VCID-ex74-t2p2-dydf | kernel: net: hns3: fix kernel crash when devlink reload during initialization |
CVE-2024-36900
|
| VCID-f2ta-craw-n3hk | kernel: ice: ensure the copied buf is NUL terminated |
CVE-2024-36935
|
| VCID-f766-5qnh-pqep | kernel: bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue |
CVE-2024-36938
|
| VCID-farp-v4kj-kqa5 | kernel: mm/slub: avoid zeroing outside-object freepointer for single free |
CVE-2024-36892
|
| VCID-g7t7-tspv-fqdc | kernel: ipv6: Fix potential uninit-value access in __ip6_make_skb() |
CVE-2024-36903
|
| VCID-g9f7-f9kv-4fgf | kernel: drm/xe/xe_migrate: Cast to output precision before multiplying operands |
CVE-2024-36948
|
| VCID-gsux-4ub3-6yhg | kernel: NFSD: Fix nfsd4_encode_fattr4() crasher |
CVE-2024-36958
|
| VCID-hk9z-ke75-dfec | kernel: wifi: nl80211: don't free NULL coalescing rule |
CVE-2024-36941
|
| VCID-hmr2-4zsa-tffa | kernel: firewire: ohci: mask bus reset interrupts between ISR and bottom half |
CVE-2024-36950
|
| VCID-hn3a-kr41-cydp | kernel: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload |
CVE-2024-36919
|
| VCID-hwqf-vtx4-jycu | kernel: Bluetooth: qca: add missing firmware sanity checks |
CVE-2024-36880
|
| VCID-jnw6-dx6k-9fh8 | kernel: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change |
CVE-2023-52882
|
| VCID-jwps-a8wj-eyck | kernel: fs/9p: only translate RWX permissions for plain 9P2000 |
CVE-2024-36964
|
| VCID-k55u-tqsr-gqcy | kernel: pinctrl: core: delete incorrect free in pinctrl_enable() |
CVE-2024-36940
|
| VCID-k9yz-p7ch-vua1 | kernel: s390/qeth: Fix kernel panic after setting hsuid |
CVE-2024-36928
|
| VCID-kfm3-qs9s-xbbm | kernel: Bluetooth: HCI: Fix potential null-ptr-deref |
CVE-2024-36011
|
| VCID-kkc5-qny7-7bgx | kernel: blk-iocost: do not WARN if iocg was already offlined |
CVE-2024-36908
|
| VCID-kpxn-v93a-9qhv | kernel: efi/unaccepted: touch soft lockup during memory accept |
CVE-2024-36936
|
| VCID-kq34-vrat-17f4 | kernel: ARM: 9381/1: kasan: clear stale stack poison |
CVE-2024-36906
|
| VCID-ky32-n1qj-nydf | kernel: hv_netvsc: Don't free decrypted memory |
CVE-2024-36911
|
| VCID-m4mt-jnhw-pqgf | kernel: bpf: Check bloom filter map value size |
CVE-2024-36918
|
| VCID-m8n7-j86u-7ugj | kernel: drm/amdkfd: range check cp bad op exception interrupts |
CVE-2024-36951
|
| VCID-mm6m-hj9m-hqab | kernel: mm: use memalloc_nofs_save() in page_cache_ra_order() |
CVE-2024-36882
|
| VCID-mme1-5xt2-p7hx | kernel: net/smc: fix neighbour and rtable leak in smc_ib_find_route() |
CVE-2024-36945
|
| VCID-mmk6-u1s9-87bg | kernel: workqueue: Fix selection of wake_cpu in kick_pool() |
CVE-2024-36888
|
| VCID-mtq8-yund-eyem | kernel: s390/cio: Ensure the copied buf is NUL terminated |
CVE-2024-36931
|
| VCID-n3fs-vy4p-nbhy | kernel: KEYS: trusted: Fix memory leak in tpm2_key_encode() |
CVE-2024-36967
|
| VCID-n93r-qr7w-vuec | kernel: firewire: nosy: ensure user_length is taken into account when fetching packet contents |
CVE-2024-27401
|
| VCID-nwe9-gm4x-x7bj | kernel: ipv4: Fix uninit-value access in __ip_make_skb() |
CVE-2024-36927
|
| VCID-nxs1-jr97-9ffr | kernel: btrfs: make sure that WRITTEN is set on all metadata blocks |
CVE-2024-35949
|
| VCID-p9n9-wja3-tbcy | kernel: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). |
CVE-2024-36904
|
| VCID-qdw4-u1ew-r7c3 | kernel: Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted |
CVE-2024-36909
|
| VCID-qrtn-57xu-xqfm | kernel: ipv6: prevent NULL dereference in ip6_output() |
CVE-2024-36901
|
| VCID-r5xv-e7y9-1qde | kernel: keys: Fix overwrite of key expiration on instantiation |
CVE-2024-36031
|
| VCID-r8kv-6huj-bbcg | kernel: tracefs: Reset permissions on remount if permissions are options |
CVE-2024-36963
|
| VCID-s69k-cfrk-6bg2 | kernel: mm/slab: make __free(kfree) accept error pointers |
CVE-2024-36890
|
| VCID-s6c6-74rf-8bb5 | kernel: remoteproc: mediatek: Make sure IPI buffer fits in L2TCM |
CVE-2024-36965
|
| VCID-s946-s5q1-c3ea | kernel: thermal/debugfs: Prevent use-after-free from occurring after cdev removal |
CVE-2024-36932
|
| VCID-sayn-p81k-67fn | kernel: USB: core: Fix access violation during port device removal |
CVE-2024-36896
|
| VCID-sb21-dhrc-7ugc | kernel: net: fix out-of-bounds access in ops_init |
CVE-2024-36883
|
| VCID-sc5s-f152-wqgf | kernel: net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs |
CVE-2024-36962
|
| VCID-st2v-mdq3-9qbj | kernel: gpiolib: cdev: fix uninitialised kfifo |
CVE-2024-36898
|
| VCID-t8hb-hxgq-mbac | kernel: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies |
CVE-2024-36915
|
| VCID-tb3q-ndrt-mkg3 | kernel: wifi: iwlwifi: read txq->read_ptr under lock |
CVE-2024-36922
|
| VCID-thmm-sntz-4qhy | kernel: usb: gadget: uvc: use correct buffer size when parsing configfs lists |
CVE-2024-36895
|
| VCID-tqem-8n6r-ybhx | kernel: mptcp: ensure snd_nxt is properly initialized on connect |
CVE-2024-36889
|
| VCID-tw4g-9umx-a3bu | kernel: drm/amd/display: Skip on writeback when it's not applicable |
CVE-2024-36914
|
| VCID-twy3-a6w2-7ugn | kernel: drm/amdkfd: don't allow mapping the MMIO HDP page with large pages |
CVE-2024-41011
|
| VCID-ueyw-9v3y-zbfd | kernel: drm/amd/display: Atom Integrated System Info v2_2 for DCN35 |
CVE-2024-36897
|
| VCID-usyd-cz63-gkfg | kernel: tipc: fix a possible memleak in tipc_buf_append |
CVE-2024-36954
|
| VCID-vcr4-b98d-w7a4 | kernel: Bluetooth: qca: fix info leak when fetching fw build id |
CVE-2024-36032
|
| VCID-vh8y-zwf1-c7b8 | kernel: Bluetooth: msft: fix slab-use-after-free in msft_do_close() |
CVE-2024-36012
|
| VCID-w2c3-15t5-nuar | kernel: uio_hv_generic: Don't free decrypted memory |
CVE-2024-36910
|
| VCID-wv98-2485-f3cv | kernel: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() |
CVE-2024-36902
|
| VCID-x22c-ausd-zfg5 | kernel: nfs: Handle error of rpc_proc_register() in nfs_net_init(). |
CVE-2024-36939
|
| VCID-xar6-gwcn-fbed | kernel: Bluetooth: qca: fix info leak when fetching board id |
CVE-2024-36033
|
| VCID-xhn3-uqqx-7yec | kernel: KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() |
CVE-2024-36953
|
| VCID-xjap-w711-8kdn | kernel: drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 |
CVE-2024-27400
|
| VCID-z33w-mv89-h3en | kernel: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets |
CVE-2024-36905
|
| VCID-z5cz-xkzn-fbb6 | kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application |
CVE-2024-21823
|
| VCID-z6ge-2e1n-z7c4 | kernel: fs/proc/task_mmu: fix loss of young/dirty bits during pagemap scan |
CVE-2024-36943
|
| VCID-znrv-kg8b-67g7 | kernel: scsi: lpfc: Move NPIV's transport unregistration to after resource clean up |
CVE-2024-36952
|
| VCID-zx1z-mhtk-x7cn | kernel: octeontx2-af: avoid off-by-one read from userspace |
CVE-2024-36957
|