Search for packages
| purl | pkg:deb/debian/linux@6.8.12-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-13u4-t725-7qh1 | kernel: eth: sungem: remove .ndo_poll_controller to avoid deadlocks |
CVE-2024-38597
|
| VCID-1mkb-qaf9-17ct | kernel: drm/amd/display: Fix potential index out of bounds in color transformation function |
CVE-2024-38552
|
| VCID-2mam-3mfn-cfg8 | kernel: RDMA/hns: Fix deadlock on SRQ async events. |
CVE-2024-38591
|
| VCID-2xu6-y5w6-8bdk | kernel: block: refine the EOF check in blkdev_iomap_begin |
CVE-2024-38604
|
| VCID-3bdu-hpbb-4ycp | kernel: lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure |
CVE-2024-38543
|
| VCID-3crq-t96y-5yec | kernel: jffs2: prevent xattr node from overflowing the eraseblock |
CVE-2024-38599
|
| VCID-3fge-x83q-tycx | kernel: drm/mediatek: Init `ddp_comp` with devm_kcalloc() |
CVE-2024-38592
|
| VCID-45qm-naju-pycn | kernel: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE |
CVE-2024-38564
|
| VCID-4d29-bb3x-bkhy | kernel: m68k: Fix spinlock race in kernel thread creation |
CVE-2024-38613
|
| VCID-4qed-1xmj-9qhy | kernel: net/mlx5: Add a timeout to acquire the command queue semaphore |
CVE-2024-38556
|
| VCID-4vrw-kfvp-e3b9 | kernel: cppc_cpufreq: Fix possible null pointer dereference |
CVE-2024-38573
|
| VCID-4x9b-yg59-ckbz | kernel: tools/nolibc/stdlib: fix memory error in realloc() |
CVE-2024-38585
|
| VCID-4yyb-mfy5-4fch | kernel: nilfs2: fix use-after-free of timer for log writer thread |
CVE-2024-38583
|
| VCID-4zfz-kmh8-w7hw | kernel: drm/arm/malidp: fix a possible null pointer dereference |
CVE-2024-36014
|
| VCID-5272-b1dk-e3fp | kernel: wifi: carl9170: re-fix fortified-memset warning |
CVE-2024-38616
|
| VCID-5hpv-svx2-4bcz | kernel: net: fec: remove .ndo_poll_controller to avoid deadlocks |
CVE-2024-38553
|
| VCID-5qdm-uk8j-vqaf | kernel: ring-buffer: Fix a race between readers and resize checks |
CVE-2024-38601
|
| VCID-74mv-tu5w-ufay | kernel: ALSA: core: Fix NULL module pointer assignment at card init |
CVE-2024-38605
|
| VCID-7xsp-3dyr-ukgp | kernel: kunit: Fix kthread reference |
CVE-2024-38561
|
| VCID-845t-r1rb-fqbj | kernel: rcu: Fix buffer overflow in print_cpu_stall_info() |
CVE-2024-38576
|
| VCID-86gk-aqa2-43fa | kernel: wifi: ar5523: enable proper endpoint verification |
CVE-2024-38565
|
| VCID-8gsf-9fbu-nuey | kernel: wifi: carl9170: add a proper sanity check for endpoints |
CVE-2024-38567
|
| VCID-8xfy-gjv2-w7hv | kernel: media: i2c: et8ek8: Don't strip remove function when driver is builtin |
CVE-2024-38611
|
| VCID-9wx6-3xb1-m7c9 | kernel: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg |
CVE-2024-38596
|
| VCID-asru-czwx-kybc | kernel: cpufreq: exit() callback is optional |
CVE-2024-38615
|
| VCID-bvw2-zsb7-zybx | kernel: speakup: Fix sizeof() vs ARRAY_SIZE() bug |
CVE-2024-38587
|
| VCID-c31r-c9qm-xuhe | kernel: drm/amdgpu/mes: fix use-after-free issue |
CVE-2024-38581
|
| VCID-c5xz-kk8d-37av | kernel: wifi: mt76: mt7996: fix potential memory leakage when reading chip temperature |
CVE-2024-38563
|
| VCID-c8qb-kbef-8qg8 | kernel: Bluetooth: HCI: Remove HCI_AMP support |
CVE-2024-38620
|
| VCID-cjdt-rytz-r7dy | kernel: net: openvswitch: fix overwriting ct original tuple for ICMPv6 |
CVE-2024-38558
|
| VCID-cmpm-gy15-tqch | kernel: net/mlx5: Discard command completions in internal error |
CVE-2024-38555
|
| VCID-dfnv-4knh-mban | kernel: thermal/drivers/tsens: Fix null pointer dereference |
CVE-2024-38571
|
| VCID-dz4e-s494-rqb3 | kernel: net: bridge: mst: fix vlan use-after-free |
CVE-2024-36979
|
| VCID-e981-6wkh-kfc4 | kernel: crypto: bcm - Fix pointer arithmetic |
CVE-2024-38579
|
| VCID-e9d9-jb9v-jufv | kernel: net/mlx5: Reload only IB representors upon lag disable/enable |
CVE-2024-38557
|
| VCID-ezg3-97r2-zfak | kernel: RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw |
CVE-2024-38539
|
| VCID-f3xn-58q3-5ygj | kernel: bpf: Fix verifier assumptions about socket->sk |
CVE-2024-38566
|
| VCID-f43g-bwp1-yufx | kernel: ecryptfs: Fix buffer size for tag 66 packet |
CVE-2024-38578
|
| VCID-f46y-3euy-q7gg | kernel: RDMA/hns: Fix UAF for cq async event |
CVE-2024-38545
|
| VCID-fgjg-b9mr-23h9 | kernel: r8169: Fix possible ring buffer corruption on fragmented Tx packets. |
CVE-2024-38586
|
| VCID-g3s2-jp9z-j3gd | kernel: wifi: ath12k: fix out-of-bound access of qmi_invoke_handler() |
CVE-2024-38572
|
| VCID-ga26-s8cz-rbau | kernel: openrisc: traps: Don't send signals to kernel mode threads |
CVE-2024-38614
|
| VCID-gz7v-f4bw-zqds | kernel: bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq |
CVE-2024-38540
|
| VCID-hzvq-k2me-cbaa | kernel: net/mlx5: Fix peer devlink set for SF representor devlink port |
CVE-2024-38595
|
| VCID-jupn-4hnq-rfbd | kernel: kunit/fortify: Fix mismatched kvalloc()/vfree() usage |
CVE-2024-38617
|
| VCID-khmq-fsdr-q7bp | kernel: netrom: fix possible dead-lock in nr_rt_ioctl() |
CVE-2024-38589
|
| VCID-kyru-d7tb-hyf3 | kernel: rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow |
CVE-2024-38577
|
| VCID-m1bw-bxha-m7gj | kernel: scsi: qedf: Ensure the copied buf is NUL terminated |
CVE-2024-38559
|
| VCID-mnqb-zv4g-ebd9 | kernel: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group |
CVE-2024-38568
|
| VCID-mpyx-hk8u-13d1 | kernel: drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group |
CVE-2024-38569
|
| VCID-njb4-r13n-m3cs | kernel: ASoC: mediatek: Assign dummy when codec not specified for a DAI link |
CVE-2024-38551
|
| VCID-nzw9-bpe2-cfg8 | kernel: drm/mediatek: Add 0 size check to mtk_drm_gem_obj |
CVE-2024-38549
|
| VCID-pk9z-gu4q-qbbu | kernel: nilfs2: fix potential hang in nilfs_detach_log_writer() |
CVE-2024-38582
|
| VCID-pp9m-z7ym-g7br | kernel: drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference |
CVE-2024-38548
|
| VCID-pqps-j285-pucb | kernel: wifi: nl80211: Avoid address calculations via out of bounds array indexing |
CVE-2024-38562
|
| VCID-qd52-fc7u-skaf | kernel: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt |
CVE-2024-38544
|
| VCID-qje4-3svy-5kg8 | kernel: net: stmmac: move the EST lock to struct stmmac_priv |
CVE-2024-38594
|
| VCID-r7pe-jdr1-kbf8 | kernel: wifi: brcmfmac: pcie: handle randbuf allocation failure |
CVE-2024-38575
|
| VCID-rfqf-b6gf-7qb6 | kernel: libbpf: Prevent null-pointer dereference when prog to load has no BTF |
CVE-2024-38574
|
| VCID-rm5n-5bud-yyff | kernel: scsi: bfa: Ensure the copied buf is NUL terminated |
CVE-2024-38560
|
| VCID-rqnp-r6y9-4qb6 | kernel: RDMA/hns: Modify the print level of CQE error |
CVE-2024-38590
|
| VCID-rxa8-4b3f-e7hx | kernel: ALSA: Fix deadlocks with kctl removals at disconnection |
CVE-2024-38600
|
| VCID-s157-59hk-97bq | kernel: md: fix resync softlockup when bitmap size is less than array size |
CVE-2024-38598
|
| VCID-s47u-ka1p-sqcz | kernel: macintosh/via-macii: Fix "BUG: sleeping function called from invalid context" |
CVE-2024-38607
|
| VCID-sc6z-cvjh-fbg3 | kernel: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() |
CVE-2024-36016
|
| VCID-t8d9-76jq-vqdc | kernel: of: module: add buffer overflow check in of_modalias() |
CVE-2024-38541
|
| VCID-tqfj-k95q-f7e5 | kernel: epoll: be better about file lifetimes |
CVE-2024-38580
|
| VCID-u8c8-7x2e-fqgd | kernel: drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() |
CVE-2024-38610
|
| VCID-u9js-a69a-hbau | kernel: ASoC: kirkwood: Fix potential NULL dereference |
CVE-2024-38550
|
| VCID-v67a-9d1m-zbbr | kernel: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() |
CVE-2024-38603
|
| VCID-vdnt-dzsy-zuab | kernel: ipv6: sr: fix invalid unregister error path |
CVE-2024-38612
|
| VCID-vgzc-k8ue-5fh6 | kernel: ax25: Fix reference count leak issue of net_device |
CVE-2024-38554
|
| VCID-vmts-4etq-hqh7 | kernel: gfs2: Fix potential glock use-after-free on unmount |
CVE-2024-38570
|
| VCID-vus3-xrdc-qkep | kernel: net: micrel: Fix receiving the timestamp in the frame for lan8841 |
CVE-2024-38593
|
| VCID-wewu-zq4r-f7au | kernel: RDMA/mana_ib: boundary check before installing cq callbacks |
CVE-2024-38542
|
| VCID-x8js-rwzq-r7fk | kernel: media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries |
CVE-2024-38547
|
| VCID-xgje-4fmc-pydz | kernel: ax25: Fix reference count leak issues of ax25_dev |
CVE-2024-38602
|
| VCID-xp6n-zuk6-pbbw | kernel: ftrace: Fix possible use-after-free issue in ftrace_location() |
CVE-2024-38588
|
| VCID-yfa4-ncak-zycy | kernel: drm: vc4: Fix possible null pointer dereference |
CVE-2024-38546
|
| VCID-yuyy-u84g-1ufb | kernel: net: bridge: xmit: make sure we have at least eth header len bytes |
CVE-2024-38538
|
| VCID-z37y-9nvm-v7a2 | kernel: net: ti: icssg_prueth: Fix NULL pointer dereference in prueth_probe() |
CVE-2024-38584
|
| VCID-z84t-ze3e-wqdb | kernel: crypto: qat - validate slices count returned by FW |
CVE-2024-38606
|