Search for packages
| purl | pkg:deb/debian/linux@6.8.9-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-16dz-9bnx-uybv | kernel: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio() |
CVE-2024-36028
|
| VCID-1974-pm1c-n3fc | kernel: wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF |
CVE-2024-35913
|
| VCID-1fz1-3x2y-juab | kernel: fork: defer linking file vma until vma is fully initialized |
CVE-2024-27022
|
| VCID-1hdj-kwry-ckea | kernel: bluetooth: race condition in sniff_{min,max}_interval_set() |
CVE-2024-24859
|
| VCID-1hn9-3ze2-tkbj | kernel: batman-adv: Avoid infinite loop trying to resize local TT |
CVE-2024-35982
|
| VCID-1htu-trsy-y3cn | kernel: net/bluetooth: race condition in {conn,adv}_{min,max}_interval_set() function |
CVE-2024-24858
|
| VCID-1n3b-rbnm-t7by | kernel: smb: client: fix potential UAF in cifs_stats_proc_write() |
CVE-2024-35868
|
| VCID-1nqk-1gvy-rkf7 | kernel: inet: inet_defrag: prevent sk release while still in use |
CVE-2024-26921
|
| VCID-1r9m-mwej-xyhb | kernel: netfilter: nft_set_pipapo: walk over current view on netlink dump |
CVE-2024-27017
|
| VCID-1tb8-t91c-63bp | x86: Native Branch History Injection |
CVE-2024-2201
XSA-456 |
| VCID-1y3t-eb99-kfdq | kernel: ksmbd: validate request buffer size in smb2_allocate_rsp_buf() |
CVE-2024-26936
|
| VCID-238x-pbyv-ykaa | kernel: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() |
CVE-2024-35930
|
| VCID-29rv-78j8-abft | kernel: net: phy: micrel: Fix potential null pointer dereference |
CVE-2024-35891
|
| VCID-2kmm-2mwh-yqb4 | kernel: mlxbf_gige: call request_irq() after NAPI initialized |
CVE-2024-35907
|
| VCID-2m9m-jm5s-hycv | kernel: i2c: smbus: fix NULL function pointer dereference |
CVE-2024-35984
|
| VCID-2peh-t6th-nuev | kernel: KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status |
CVE-2024-26990
|
| VCID-2sec-tfha-4ud5 | kernel: ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf |
CVE-2024-26980
|
| VCID-2uw8-yw3u-bfb9 | kernel: drm/dp: Fix divide-by-zero regression on DP MST unplug with nouveau |
CVE-2024-26941
|
| VCID-2ux4-bxe2-w3h9 | kernel: drm/amdgpu: validate the parameters of bo mapping operations more clearly |
CVE-2024-26922
|
| VCID-33r5-k3qg-4bdy | kernel: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() |
CVE-2024-27019
|
| VCID-39dp-7pf9-qkha | kernel: crypto: iaa - Fix async_disable descriptor leak |
CVE-2024-35926
|
| VCID-3af7-yp4u-tyfe | kernel: smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() |
CVE-2024-35861
|
| VCID-3erj-wg4r-huc9 | kernel: ipv4: check for NULL idev in ip_route_use_hint() |
CVE-2024-36008
|
| VCID-3ghp-qfvw-r3dc | kernel: firmware: qcom: uefisecapp: Fix memory related IO errors and crashes |
CVE-2024-35994
|
| VCID-3jnh-54db-u7dn | kernel: net: phy: qcom: at803x: fix kernel panic with at8031_probe |
CVE-2024-26942
|
| VCID-3ku3-1j9h-pkhc | kernel: tcp: Fix Use-After-Free in tcp_ao_connect_init |
CVE-2024-27394
|
| VCID-3mes-8afk-j7bx | kernel: scsi: sg: Avoid sg device teardown race |
CVE-2024-35954
|
| VCID-3q9d-uabn-fbbq | kernel: userfaultfd: change src_folio after ensuring it's unpinned in UFFDIO_MOVE |
CVE-2024-27007
|
| VCID-3u14-bg73-n7en | kernel: usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd() |
CVE-2024-26932
|
| VCID-3vh9-c7m1-dubs | kernel: net/mlx5e: Prevent deadlock while disabling aRFS |
CVE-2024-27014
|
| VCID-3wc4-dm3u-syet | kernel: speakup: Avoid crash on very long word |
CVE-2024-26994
|
| VCID-3xew-rc9n-sfg8 | kernel: irqchip/gic-v3-its: Prevent double free on error |
CVE-2024-35847
|
| VCID-3yce-jdjt-tkf8 | kernel: net: openvswitch: Fix Use-After-Free in ovs_ct_exit |
CVE-2024-27395
|
| VCID-434t-av2d-xffn | kernel: powerpc/kasan: Limit KASAN thread size increase to 32KB |
CVE-2024-26710
|
| VCID-441g-m795-kkfz | kernel: smb: client: fix potential UAF in is_valid_oplock_break() |
CVE-2024-35863
|
| VCID-48rh-n8cu-87fr | kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash |
CVE-2024-35854
|
| VCID-4aje-a5cu-ryes | kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash |
CVE-2024-36007
|
| VCID-4e3a-wpq4-vbcr | kernel: Julia Lawall reported this null pointer dereference, this should fix it. |
CVE-2024-36023
|
| VCID-4ecj-pm92-qbgk | kernel: mm: zswap: fix shrinker NULL crash with cgroup_disable=memory |
CVE-2024-35846
|
| VCID-4h85-wkja-n7ca | kernel: pds_core: Fix pdsc_check_pci_health function to use work thread |
CVE-2024-35968
|
| VCID-4mr2-ch1g-vbfh | kernel: xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING |
CVE-2024-35976
|
| VCID-4r1c-et7a-13g9 | kernel: mm/hugetlb: fix missing hugetlb_lock for resv uncharge |
CVE-2024-36000
|
| VCID-4t4h-a2xy-h7bg | kernel: drm/amd/display: Add a dc_state NULL check in dc_state_release |
CVE-2024-26948
|
| VCID-4zhk-rm9j-buhc | kernel: interconnect: Don't access req_list while it's being manipulated |
CVE-2024-27005
|
| VCID-558f-uje7-f7hx | kernel: mlxsw: spectrum_acl_tcam: Fix incorrect list API usage |
CVE-2024-36006
|
| VCID-57cv-hqtm-ykgr | kernel: netfilter: validate user input for expected length |
CVE-2024-35896
|
| VCID-57g6-pfmw-gqbs | kernel: fs: sysfs: Fix reference leak in sysfs_break_active_protection() |
CVE-2024-26993
|
| VCID-5f5a-x78f-pygg | kernel: af_unix: Clear stale u->oob_skb. |
CVE-2024-35970
|
| VCID-5ufz-fgq9-zkct | kernel: efivarfs: Free s_fs_info on unmount |
CVE-2023-52681
|
| VCID-5yp2-meun-zbas | kernel: ax25: fix use-after-free bugs caused by ax25_ds_del_timer |
CVE-2024-35887
|
| VCID-5z54-7skw-p7hm | kernel: smb: client: potential use-after-free in cifs_debug_files_proc_show() |
CVE-2024-26928
|
| VCID-6r7n-bx5b-tkdy | kernel: Integer Overflow in raid5_cache_count |
CVE-2024-23307
|
| VCID-6tb9-nnj3-57gv | kernel: drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() |
CVE-2024-35951
|
| VCID-6v9k-zz25-tkga | kernel: KVM: x86/pmu: Disable support for adaptive PEBS |
CVE-2024-26992
|
| VCID-6wm4-esw1-tyf7 | kernel: wifi: nl80211: reject iftype change with mesh ID change |
CVE-2024-27410
|
| VCID-6y2b-mfwy-6kf2 | kernel: Bluetooth: btusb: mediatek: Fix double free of skb in coredump |
CVE-2024-35856
|
| VCID-74ty-z7jy-hqb4 | kernel: possibility of deadlock in libbpf function sock_hash_delete_elem |
CVE-2023-0160
|
| VCID-76yw-2yt8-ekbc | kernel: netfilter: nft_set_pipapo: do not free live element |
CVE-2024-26924
|
| VCID-7c8r-e2vd-abdm | kernel: net: mana: Fix Rx DMA datasize and skb_over_panic |
CVE-2024-35901
|
| VCID-7ht1-s4up-jkdj | kernel: dma: xilinx_dpdma: Fix locking |
CVE-2024-35990
|
| VCID-7me4-v9ak-w7da | kernel: nouveau: fix instmem race condition around ptr stores |
CVE-2024-26984
|
| VCID-7nh7-jczk-jyba | kernel: mm/secretmem: fix GUP-fast succeeding on secretmem folios |
CVE-2024-35872
|
| VCID-7p78-wsqr-tuax | kernel: Bluetooth: btintel: Fix null ptr deref in btintel_read_version |
CVE-2024-35933
|
| VCID-7phh-a2bm-9kee | kernel: cpu: Re-enable CPU mitigations by default for !X86 architectures |
CVE-2024-35996
|
| VCID-817k-d64n-g3ez | kernel: serial: mxs-auart: add spinlock around changing cts state |
CVE-2024-27000
|
| VCID-86ze-vdhf-b3dp | kernel: net: wwan: t7xx: Split 64bit accesses to fix alignment issues |
CVE-2024-35909
|
| VCID-89pa-kzvn-yyck | kernel: tcp: properly terminate timers for kernel sockets |
CVE-2024-35910
|
| VCID-8a4c-4scc-jygc | kernel: idpf: fix kernel panic on unknown packet types |
CVE-2024-35889
|
| VCID-8cmv-scbq-skcy | kernel: aio: Fix null ptr deref in aio_complete() wakeup |
CVE-2024-35874
|
| VCID-8ekn-g2ds-bbh9 | kernel: ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr |
CVE-2024-35969
|
| VCID-8hap-636e-23bt | kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work |
CVE-2024-35852
|
| VCID-8jw8-s1a7-2qgb | kernel: riscv: process: Fix kernel gp leakage |
CVE-2024-35871
|
| VCID-8m35-efdg-1kfe | kernel: nfsd: Fix error cleanup path in nfsd_rename() |
CVE-2024-35914
|
| VCID-8nsp-v995-vbbz | kernel: net: ena: Fix incorrect descriptor free behavior |
CVE-2024-35958
|
| VCID-92x8-1m3a-vfb8 | kernel: mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled |
CVE-2024-26987
|
| VCID-9661-pt2m-2yeh | kernel: x86/coco: Require seeding RNG with RDRAND on CoCo systems |
CVE-2024-35875
|
| VCID-9azr-qrcs-k7by | kernel: netfilter: nf_tables: fix memleak in map from abort path |
CVE-2024-27011
|
| VCID-9f4s-rt9q-byd6 | kernel: btrfs: fix information leak in btrfs_ioctl_logical_to_ino() |
CVE-2024-35849
|
| VCID-9hh7-eef4-vuh2 | kernel: sysv: don't call sb_bread() with pointers_lock held |
CVE-2023-52699
|
| VCID-9tz8-utg1-duex | kernel: bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() |
CVE-2024-35972
|
| VCID-9uwd-c6uc-tkdr | kernel: netfilter: nf_tables: reject new basechain after table flag update |
CVE-2024-35900
|
| VCID-9w3f-zzee-qug6 | kernel: wifi: ath11k: decrease MHI channel buffer length to 8KB |
CVE-2024-35938
|
| VCID-a1mj-at6s-8bh1 | kernel: smb: client: fix potential UAF in smb2_is_valid_oplock_break() |
CVE-2024-35865
|
| VCID-a3h9-m5gg-ukce | kernel: netfilter: nf_tables: discard table flag update with pending basechain deletion |
CVE-2024-35897
|
| VCID-a8cp-9ykt-xbdx | kernel: bpf: support non-r10 register spill/fill to/from stack in precision tracking |
CVE-2023-52920
|
| VCID-a8ja-eegd-yqhk | kernel: net/mlx5: Register devlink first under devlink lock |
CVE-2024-35961
|
| VCID-ab8k-muqg-dkds | kernel: net/sched: act_skbmod: prevent kernel-infoleak |
CVE-2024-35893
|
| VCID-ad93-dryb-nfat | kernel: btrfs: fix race when detecting delalloc ranges during fiemap |
CVE-2024-27080
|
| VCID-awu1-pbuf-zyhb | kernel: KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes |
CVE-2024-26991
|
| VCID-ayru-t6ft-d7er | Linux/xen-netfront: Memory leak due to missing cleanup function |
CVE-2024-27393
|
| VCID-b5e7-9khv-bfhm | kernel: smb: client: fix potential UAF in cifs_dump_full_key() |
CVE-2024-35866
|
| VCID-bha1-btf5-dfhf | kernel: usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error |
CVE-2024-26996
|
| VCID-bhhr-zefe-13ca | kernel: ipv6: Fix infinite recursion in fib6_dump_done(). |
CVE-2024-35886
|
| VCID-bj4v-jkbc-jfej | kernel: r8169: fix LED-related deadlock on module removal |
CVE-2024-27021
|
| VCID-bk34-68fb-sfaw | kernel: net/mlx5: Properly link new fs rules into the tree |
CVE-2024-35960
|
| VCID-btwy-qv13-tkfm | kernel: octeontx2-pf: Fix transmit scheduler resource leak |
CVE-2024-35975
|
| VCID-c8h3-knsg-6ugh | kernel: x86/bpf: Fix IP after emitting call depth accounting |
CVE-2024-35903
|
| VCID-cah9-wdc8-73b1 | kernel: s390/cio: fix race condition during online processing |
CVE-2024-27009
|
| VCID-cbd1-5snc-37bs | kernel: smb3: fix lock ordering potential deadlock in cifs_sync_mid_result |
CVE-2024-35998
|
| VCID-cbh2-m1hn-t7hc | kernel: mlxbf_gige: stop interface during shutdown |
CVE-2024-35885
|
| VCID-cbrz-vaxe-b3dt | kernel: iommu/vt-d: Fix NULL domain on device release |
CVE-2024-27079
|
| VCID-cr8m-k8mj-wbf3 | kernel: netfs: Fix the pre-flush when appending to a file in writethrough mode |
CVE-2024-36001
|
| VCID-cs71-k59a-eybd | kernel: erspan: make sure erspan_base_hdr is present in skb->head |
CVE-2024-35888
|
| VCID-d2xf-68nr-rqe2 | kernel: drm/amdgpu: Skip do PCI error slot reset during RAS recovery |
CVE-2024-35931
|
| VCID-d4e1-3wew-sbcc | kernel: drm/vc4: don't check if plane->state->fb == state->fb |
CVE-2024-35932
|
| VCID-d4yk-stc7-zfcc | kernel: of: dynamic: Synchronize of_changeset_destroy() with the devlink removals |
CVE-2024-35879
|
| VCID-d7gj-bb73-dfhg | kernel: fbmon: prevent division by zero in fb_videomode_from_videomode() |
CVE-2024-35922
|
| VCID-e5at-pn1k-bydz | kernel: riscv: Fix vector state restore in rt_sigreturn() |
CVE-2024-35873
|
| VCID-ecjq-qx5x-f7h6 | kernel: raid1: fix use-after-free for original bio in raid1_write_request() |
CVE-2024-35979
|
| VCID-eeen-rmnw-wudw | kernel: drm/client: Fully protect modes[] with dev->mode_config.mutex |
CVE-2024-35950
|
| VCID-ep87-x6sb-gyb5 | kernel: af_unix: Fix garbage collector racing against connect() |
CVE-2024-26923
|
| VCID-evne-w3ey-kud2 | kernel: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS |
CVE-2024-35983
|
| VCID-ez5y-6dbg-bfh8 | kernel: iommu/vt-d: Fix WARN_ON in iommu probe path |
CVE-2024-35957
|
| VCID-f22d-h1n1-83fy | kernel: btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() |
CVE-2024-35936
|
| VCID-f6aj-ntyk-a7b9 | kernel: igb: Fix string truncation warnings in igb_set_fw_version |
CVE-2024-36010
|
| VCID-f824-y1m9-xfd8 | kernel: serial: core: Clearing the circular buffer before NULLifying it |
CVE-2024-26998
|
| VCID-fguw-527b-h3de | kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue |
CVE-2024-36004
|
| VCID-fppa-urd9-wbfr | kernel: ice: fix memory corruption bug with suspend and rebuild |
CVE-2024-35911
|
| VCID-fqzh-sckm-a3ff | kernel: bpf: support deferring bpf_link dealloc to after RCU grace period |
CVE-2024-35860
|
| VCID-fs4d-n4e2-j3b5 | kernel: Squashfs: check the inode number is not the invalid value of zero |
CVE-2024-26982
|
| VCID-fue2-teap-zqa5 | kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow |
CVE-2024-35959
|
| VCID-fvhu-1xqw-fkbk | kernel: netfilter: nf_tables: restore set elements when delete set fails |
CVE-2024-27012
|
| VCID-fw9k-a5nm-wke7 | kernel: ax25: Fix netdev refcount issue |
CVE-2024-36009
|
| VCID-fz9m-axm1-4kcb | kernel: wifi: rtw89: fix null pointer access when abort scan |
CVE-2024-35946
|
| VCID-g12g-j38e-dyag | kernel: phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered |
CVE-2024-35986
|
| VCID-g21e-w385-y7g6 | kernel: bootconfig: use memblock_free_late to free xbc memory to buddy |
CVE-2024-26983
|
| VCID-g2ge-t77f-8fdk | kernel: net: ks8851: Handle softirqs at the end of IRQ thread to fix hang |
CVE-2024-35971
|
| VCID-g6vp-7pee-2qa1 | kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update |
CVE-2024-35855
|
| VCID-gd5p-d6v2-3kae | kernel: Bluetooth: hci_sock: Fix not validating setsockopt user input |
CVE-2024-35963
|
| VCID-ghkf-f8r8-pygj | kernel: ACPI: CPPC: Use access_width over bit_width for system memory accesses |
CVE-2024-35995
|
| VCID-gnfv-gh2u-jbdy | kernel: tls: get psock ref after taking rxlock to avoid leak |
CVE-2024-35908
|
| VCID-gtt3-dfpq-bfhc | kernel: nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet |
CVE-2024-35915
|
| VCID-gu1a-2yra-e7hk | kernel: accel/ivpu: Fix deadlock in context_xa |
CVE-2024-35953
|
| VCID-gxwt-u1ck-8qd6 | kernel: netfilter: flowtable: incorrect pppoe tuple |
CVE-2024-27015
|
| VCID-h2bw-kppn-g7e5 | kernel: Bluetooth: ISO: Fix not validating setsockopt user input |
CVE-2024-35964
|
| VCID-h3qa-bbjk-fubq | kernel: netfilter: flowtable: validate pppoe header |
CVE-2024-27016
|
| VCID-hdcd-jdjt-aua7 | kernel: udp: do not accept non-tunnel GSO skbs landing in a tunnel |
CVE-2024-35884
|
| VCID-hhr1-6u2f-4qdw | kernel: SUNRPC: Fix a slow server-side memory leak with RPC-over-TCP |
CVE-2024-35882
|
| VCID-hpnx-u1bj-6fcu | kernel: mm: turn folio_test_hugetlb into a PageType |
CVE-2024-35993
|
| VCID-hqgr-ehp3-hubn | kernel: binder: check offset alignment in binder_get_object() |
CVE-2024-26926
|
| VCID-j9ta-1dy4-sycw | kernel: clk: qcom: camcc-sc8280xp: fix terminating of frequency table arrays |
CVE-2024-26967
|
| VCID-jcag-qbxr-gues | kernel: dmaengine: idxd: Fix oops during rmmod on single-CPU platforms |
CVE-2024-35989
|
| VCID-jg6r-xypv-73au | kernel: spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe |
CVE-2024-35883
|
| VCID-jm2j-kgpv-x7bq | kernel: comedi: vmk80xx: fix incomplete endpoint checking |
CVE-2024-27001
|
| VCID-jpmz-hms3-q3c7 | kernel: amdkfd: use calloc instead of kzalloc to avoid integer overflow |
CVE-2024-26817
|
| VCID-jsmv-a8gz-1bfn | kernel: smb: client: fix potential UAF in smb2_is_valid_lease_break() |
CVE-2024-35864
|
| VCID-k3y2-f4wc-ybf1 | kernel: sched/eevdf: Prevent vlag from going out of bounds in reweight_eevdf() |
CVE-2024-35985
|
| VCID-k9c7-2h2y-zken | kernel: drm/amdkfd: Fix memory leak in create_process failure |
CVE-2024-26986
|
| VCID-kdan-86sn-73br | kernel: io_uring/kbuf: hold io_buffer_list reference over mmap |
CVE-2024-35880
|
| VCID-kefg-mwdx-eueg | kernel: thermal/debugfs: Add missing count increment to thermal_debug_tz_trip_up() |
CVE-2024-27006
|
| VCID-kjn8-9h7n-dfab | kernel: net: phy: phy_device: Prevent nullptr exceptions on ISR |
CVE-2024-35945
|
| VCID-krtf-1qas-67dv | kernel: scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() |
CVE-2024-36025
|
| VCID-ks4p-gtea-cqgx | kernel: regmap: maple: Fix cache corruption in regcache_maple_drop() |
CVE-2024-36019
|
| VCID-kysr-qgch-v7d9 | kernel: drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 |
CVE-2024-36026
|
| VCID-m17d-mcs6-xqcz | kernel: geneve: fix header validation in geneve[6]_xmit_skb |
CVE-2024-35973
|
| VCID-m1fx-2hzp-8kca | kernel: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() |
CVE-2024-27020
|
| VCID-m227-ndat-z3ey | kernel: kprobes: Fix possible use-after-free issue on kprobe registration |
CVE-2024-35955
|
| VCID-m2kf-p3us-w3a1 | kernel: i40e: fix vf may be used uninitialized in this function warning |
CVE-2024-36020
|
| VCID-m789-2w4h-n7ap | kernel: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() |
CVE-2024-35944
|
| VCID-mf5m-m7ac-h3g2 | kernel: crypto: iaa - Fix nr_cpus < nr_iaa case |
CVE-2024-26945
|
| VCID-mfpg-yb8m-zugn | kernel: netfilter: br_netfilter: skip conntrack input hook for promisc packets |
CVE-2024-27018
|
| VCID-mm9r-t275-tfb3 | kernel: arm64: hibernate: Fix level3 translation fault in swsusp_save() |
CVE-2024-26989
|
| VCID-myb4-d1cy-qbdb | kernel: icmp: prevent possible NULL dereferences from icmp_build_probe() |
CVE-2024-35857
|
| VCID-myfj-kc8x-zubv | kernel: platform/chrome: cros_ec_uart: properly fix race condition |
CVE-2024-35977
|
| VCID-mzn6-8yck-rbcn | kernel: dma-buf: Fix NULL pointer dereference in sanitycheck() |
CVE-2024-35916
|
| VCID-nc7y-q3d6-pud7 | kernel: clk: Get runtime PM before walking tree during disable_unused |
CVE-2024-27004
|
| VCID-ndhf-fz4e-s3ef | kernel: btrfs: send: handle path ref underflow in header iterate_inode_ref() |
CVE-2024-35935
|
| VCID-nefr-3ncm-5fba | kernel: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() |
CVE-2024-35934
|
| VCID-np3t-m158-k7he | kernel: usb: typec: ucsi: Limit read size on v1.2 |
CVE-2024-35924
|
| VCID-p323-br2d-4fcq | kernel: dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue |
CVE-2024-35991
|
| VCID-p7mg-arke-wyaj | kernel: s390/bpf: Fix bpf_plt pointer arithmetic |
CVE-2024-35917
|
| VCID-p8fa-6gv2-5kfa | kernel: usb: dwc2: host: Fix dereference issue in DDMA completion flow. |
CVE-2024-26997
|
| VCID-pc3b-6b14-c3f6 | kernel: ksmbd: validate payload size in ipc response |
CVE-2024-26811
|
| VCID-pkpq-wtc2-gugm | kernel: netfilter: nf_tables: flush pending destroy work before exit_net release |
CVE-2024-35899
|
| VCID-ptnp-r9em-akfw | kernel: init/main.c: Fix potential static_command_line memory overflow |
CVE-2024-26988
|
| VCID-q936-ehn3-cygu | kernel: mptcp: prevent BPF accessing lowat from a subflow socket. |
CVE-2024-35894
|
| VCID-qfxj-zqq9-r7ag | kernel: Bluetooth: L2CAP: Fix not validating setsockopt user input |
CVE-2024-35965
|
| VCID-qmdu-a2qh-fkd6 | kernel: serial/pmac_zilog: Remove flawed mitigation for rx irq flood |
CVE-2024-26999
|
| VCID-qr5f-1t12-aucr | kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash |
CVE-2024-35853
|
| VCID-qucs-qaj4-q7cf | kernel: btrfs: zoned: fix use-after-free in do_zone_finish() |
CVE-2024-26944
|
| VCID-qz95-a8e8-sff9 | kernel: usb: typec: tcpm: Correct the PDO counting in pd_set |
CVE-2024-26995
|
| VCID-r4gu-5894-5kbb | kernel: drm: nv04: Fix out of bounds access |
CVE-2024-27008
|
| VCID-r5eu-kusm-eub1 | kernel: ice: fix LAG and VF lock dependency in ice_reset_vf() |
CVE-2024-36003
|
| VCID-rdtx-9as2-jqak | kernel: arm64: tlb: Fix TLBI RANGE operand |
CVE-2024-35980
|
| VCID-rw5g-k4kj-6yhd | kernel: media: mediatek: vcodec: Fix oops when HEVC init fails |
CVE-2024-35921
|
| VCID-s1k5-hnrc-yffd | kernel: media: usbtv: Remove useless locks in usbtv_video_free() |
CVE-2024-27072
|
| VCID-s6y3-ryu7-e3cb | kernel: riscv: Fix TASK_SIZE on 64-bit NOMMU |
CVE-2024-35988
|
| VCID-s8jw-2t7q-pug8 | kernel: drm: Check output polling initialized before disabling |
CVE-2024-35927
|
| VCID-sjs6-tcdf-9fdh | kernel: rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock() |
CVE-2024-35929
|
| VCID-sjz9-ucsc-8kcr | kernel: block: fix module reference leakage from bdev_open_by_dev error path |
CVE-2024-35859
|
| VCID-spkh-8zw6-gkcp | kernel: bpf: Protect against int overflow for stack access size |
CVE-2024-35905
|
| VCID-sspu-bv8z-f7bx | kernel: smb: client: fix potential UAF in cifs_stats_proc_show() |
CVE-2024-35867
|
| VCID-t5nr-dn7j-xub3 | kernel: clk: mediatek: Do a runtime PM get on controllers during probe |
CVE-2024-27002
|
| VCID-t64g-hp4n-63ds | kernel: Bluetooth: Fix memory leak in hci_req_sync_complete() |
CVE-2024-35978
|
| VCID-te3f-pzk3-4ybg | kernel: Bluetooth: SCO: Fix not validating setsockopt user input |
CVE-2024-35967
|
| VCID-tgq4-vnwq-17aj | kernel: net: gtp: Fix Use-After-Free in gtp_dellink |
CVE-2024-27396
|
| VCID-tn7p-t4zq-eqem | kernel: net/rds: fix possible cp null dereference |
CVE-2024-35902
|
| VCID-trvr-15bm-7fcj | kernel: drm/xe: Fix bo leak in intel_fb_bo_framebuffer_init |
CVE-2024-26985
|
| VCID-tspb-2q9s-u3d6 | kernel: iommu/vt-d: Use device rbtree in iopf reporting path |
CVE-2024-35843
|
| VCID-tth5-cn44-7ff9 | kernel: net/bluetooth: race condition in conn_info_{min,max}_age_set() |
CVE-2024-24857
|
| VCID-tyw9-5j4r-wkfa | kernel: net: hns3: fix kernel crash when devlink reload during pf initialization |
CVE-2024-36021
|
| VCID-tzbb-3q6d-6fgt | kernel: eeprom: at24: fix memory corruption race condition |
CVE-2024-35848
|
| VCID-u2g6-a1vr-7yhu | kernel: net: bcmasp: fix memory leak when bringing down interface |
CVE-2024-35858
|
| VCID-u666-tga8-2yhk | kernel: dma-direct: Leak pages on dma_set_decrypted() failure |
CVE-2024-35939
|
| VCID-u6ws-1725-xya6 | kernel: nilfs2: fix OOB in nilfs_set_de_type |
CVE-2024-26981
|
| VCID-u6z7-mqv5-8fdy | kernel: netfilter: nf_tables: honor table dormant flag from netdev release event path |
CVE-2024-36005
|
| VCID-uahw-nmpf-rfg4 | kernel: drm/ast: Fix soft lockup |
CVE-2024-35952
|
| VCID-uaq7-ycpr-3qes | kernel: of: module: prevent NULL pointer dereference in vsnprintf() |
CVE-2024-35878
|
| VCID-ub98-wzaq-vqf2 | kernel: drm/i915/vma: Fix UAF on destroy against retire race |
CVE-2024-26939
|
| VCID-ubyx-g9qc-x7dk | kernel: net/sched: Fix mirred deadlock on device recursion |
CVE-2024-27010
|
| VCID-ugc9-637k-n3h1 | kernel: HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up |
CVE-2024-35997
|
| VCID-uk33-eafe-zya6 | kernel: netfilter: complete validation of user input |
CVE-2024-35962
|
| VCID-uv1r-bvqe-kfd2 | kernel: clk: Get runtime PM before walking tree for clk_summary |
CVE-2024-27003
|
| VCID-uyj7-p28x-47ec | kernel: media: mediatek: vcodec: adding lock to protect decoder context list |
CVE-2024-35920
|
| VCID-vx4r-v2fc-nqa4 | kernel: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path |
CVE-2024-26925
|
| VCID-vyzk-3662-uqbh | kernel: mmc: sdhci-msm: pervent access to suspended controller |
CVE-2024-36029
|
| VCID-w4ks-e4ng-yyan | kernel: bpf, sockmap: Prevent lock inversion deadlock in map delete elem |
CVE-2024-35895
|
| VCID-w6sh-c859-47h6 | kernel: x86/mm/pat: fix VM_PAT handling in COW mappings |
CVE-2024-35877
|
| VCID-w75k-uv9m-kuhm | kernel: smb: client: fix UAF in smb2_reconnect_server() |
CVE-2024-35870
|
| VCID-w7dg-89r9-1udk | kernel: nouveau/uvmm: fix addr/range calcs for remap operations |
CVE-2024-36018
|
| VCID-wr7j-r4t5-1bgu | kernel: wifi: cfg80211: check A-MSDU format more carefully |
CVE-2024-35937
|
| VCID-ww17-8hne-xkhj | kernel: gro: fix ownership transfer |
CVE-2024-35890
|
| VCID-wxwj-v7eh-fyd6 | kernel: net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() |
CVE-2024-35892
|
| VCID-x226-2yqa-uuhv | kernel: pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain |
CVE-2024-35942
|
| VCID-x3pg-2y6m-xbd8 | kernel: dpll: fix dpll_pin_on_pin_register() for multiple parent pins |
CVE-2024-36002
|
| VCID-x82q-fm6k-6kda | kernel: smb3: missing lock when picking channel |
CVE-2024-35999
|
| VCID-xaye-wwt2-fkb2 | kernel: Bluetooth: RFCOMM: Fix not validating setsockopt user input |
CVE-2024-35966
|
| VCID-xbt4-2vaa-s3ck | kernel: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() |
CVE-2024-35898
|
| VCID-xd1r-w4r5-6uay | kernel: Bluetooth: qca: fix NULL-deref on non-serdev setup |
CVE-2024-35850
|
| VCID-xhhf-day1-5ues | kernel: pstore/zone: Add a null pointer check to the psz_kmsg_read |
CVE-2024-35940
|
| VCID-xtpb-6aqb-nyhn | kernel: block: prevent division by zero in blk_rq_stat_sum() |
CVE-2024-35925
|
| VCID-xx33-z963-87dg | kernel: phy: marvell: a3700-comphy: Fix out of bounds read |
CVE-2024-35992
|
| VCID-xznx-y7z2-53dd | kernel: riscv: Fix loading 64-bit NOMMU kernels past the start of RAM |
CVE-2024-35987
|
| VCID-y4ef-tngp-63gz | kernel: smb: client: fix potential UAF in smb2_is_network_name_deleted() |
CVE-2024-35862
|
| VCID-yg9a-u6pj-tkce | kernel: virtio_net: Do not send RSS key if it is not supported |
CVE-2024-35981
|
| VCID-yq9b-dpsh-cuhy | kernel: drm/amd/display: Disable idle reallow as part of command/gpint execution |
CVE-2024-36024
|
| VCID-yr9n-sx72-9ucd | kernel: btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations |
CVE-2024-35956
|
| VCID-ytav-9e9r-47eb | kernel: smb: client: guarantee refcounted children from parent session |
CVE-2024-35869
|
| VCID-ytcn-fxjj-efhj | kernel: selinux: avoid dereference of garbage after mount failure |
CVE-2024-35904
|
| VCID-z3cd-cps8-5khf | kernel: tun: limit printing rate when illegal packet received by tun dev |
CVE-2024-27013
|
| VCID-z9zh-be3a-k3dn | kernel: wifi: iwlwifi: mvm: rfi: fix potential response leaks |
CVE-2024-35912
|
| VCID-zdgf-yw92-rfa2 | kernel: pmdomain: ti: Add a null pointer check to the omap_prm_domain_init |
CVE-2024-35943
|
| VCID-zmxr-19j7-27hb | kernel: media: mediatek: vcodec: adding lock to protect encoder context list |
CVE-2024-35919
|
| VCID-zptt-ueds-qkcf | kernel: Bluetooth: qca: fix NULL-deref on non-serdev suspend |
CVE-2024-35851
|