Search for packages
| purl | pkg:deb/debian/linux@6.9.10-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1bgp-q8sc-qbdz | kernel: filemap: replace pte_offset_map() with pte_offset_map_nolock() |
CVE-2024-42233
|
| VCID-1svg-rnkn-p7e9 | kernel: net: ethernet: lantiq_etop: fix double free in detach |
CVE-2024-41046
|
| VCID-3ccs-8xaf-wfgw | kernel: mm/filemap: skip to create PMD-sized page cache if needed |
CVE-2024-41031
|
| VCID-3pnf-fv4y-57aa | kernel: scsi: ufs: core: Fix ufshcd_abort_one racing issue |
CVE-2024-41053
|
| VCID-4eg9-yh2g-a7gc | kernel: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray |
CVE-2024-42243
|
| VCID-5hrr-xvrw-ebd9 | kernel: mm/shmem: disable PMD-sized page cache if needed |
CVE-2024-42241
|
| VCID-632h-zd5g-g3dd | kernel: firmware: cs_dsp: Validate payload length before processing block |
CVE-2024-42237
|
| VCID-63b1-m3wh-47d8 | kernel: net: ks8851: Fix deadlock with the SPI chip variant |
CVE-2024-41036
|
| VCID-6758-q6cm-m3ey | kernel: wireguard: allowedips: avoid unaligned 64-bit memory accesses |
CVE-2024-42247
|
| VCID-69vu-1hkt-2ydj | kernel: Revert "sched/fair: Make sure to try to detach at least one movable task" |
CVE-2024-42245
|
| VCID-6t6u-3hau-kbg6 | kernel: net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket |
CVE-2024-42246
|
| VCID-7k22-dx9b-xfeg | kernel: cachefiles: wait for ondemand_object_worker to finish when dropping object |
CVE-2024-41051
|
| VCID-7n1s-z92h-b7e9 | kernel: net/sched: Fix UAF when resolving a clash |
CVE-2024-41040
|
| VCID-8w6e-cn99-8yaz | kernel: Fix userfaultfd_api to return EINVAL as expected |
CVE-2024-41027
|
| VCID-8z7g-vrev-9qet | kernel: bpf: Fix too early release of tcx_entry |
CVE-2024-41010
|
| VCID-9njx-vb2u-37dp | kernel: nilfs2: fix kernel bug on rename operation of broken directory |
CVE-2024-41034
|
| VCID-a1dq-27y6-4yfd | kernel: nvmem: core: limit cell sysfs permissions to main attribute ones |
CVE-2024-41029
|
| VCID-ahyy-d19b-cqap | kernel: firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files |
CVE-2024-41056
|
| VCID-ak56-9snm-47h9 | kernel: netfilter: nf_tables: prefer nft_chain_validate |
CVE-2024-41042
|
| VCID-bk1g-xxqb-cffv | kernel: i40e: Fix XDP program unloading while removing the driver |
CVE-2024-41047
|
| VCID-br2u-tw6v-e3f8 | kernel: x86/bhi: Avoid warning in #DB handler due to BHI mitigation |
CVE-2024-42240
|
| VCID-cuxw-x8w1-suaz | kernel: mm: prevent derefencing NULL ptr in pfn_section_valid() |
CVE-2024-41055
|
| VCID-dcd2-wtwh-zueq | kernel: cachefiles: cyclic allocation of msg_id to avoid reuse |
CVE-2024-41050
|
| VCID-dhek-pqx4-ukgj | kernel: usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() |
CVE-2024-42236
|
| VCID-eb7p-a59j-7qaj | kernel: mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length |
CVE-2024-41026
|
| VCID-es6r-hwwv-vqfj | kernel: mmc: sdhci: Fix max_seg_size for 64KiB PAGE_SIZE |
CVE-2024-42242
|
| VCID-ete6-3m1s-t3em | kernel: s390/mm: Add NULL pointer check to crst_table_free() base_crst_free() |
CVE-2024-42235
|
| VCID-f968-vrzv-8ke5 | kernel: bpf: Defer work in bpf_timer_cancel_and_free |
CVE-2024-41045
|
| VCID-gnu4-ku81-2qh5 | kernel: ppp: reject claimed-as-LCP but actually malformed packets |
CVE-2024-41044
|
| VCID-gxhk-7abm-puc6 | kernel: vfio/pci: Init the count variable in collecting hot-reset devices |
CVE-2024-41052
|
| VCID-gxu1-qnrz-dub4 | kernel: mm: fix crashes from deferred split racing folio migration |
CVE-2024-42234
|
| VCID-hv12-tgt6-rub5 | kernel: sched/deadline: Fix task_struct reference leak |
CVE-2024-41023
|
| VCID-hxzx-5p3n-3fh1 | kernel: cachestat: do not flush stats in recency check |
CVE-2024-41033
|
| VCID-jhjy-vmqw-4fem | kernel: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor |
CVE-2024-41035
|
| VCID-jzxn-wgk7-1ken | kernel: cachefiles: add missing lock protection when polling |
CVE-2024-42250
|
| VCID-k95s-h9ww-93d3 | kernel: misc: fastrpc: Fix memory leak in audio daemon attach operation |
CVE-2024-41025
|
| VCID-kpyj-qqha-1udx | kernel: bpf: Fail bpf_timer_cancel when callback is being cancelled |
CVE-2024-42239
|
| VCID-n9k8-pufw-8bd8 | kernel: firmware: cs_dsp: Return error if block header overflows file |
CVE-2024-42238
|
| VCID-ntee-yzq5-1faf | kernel: ASoC: SOF: Intel: hda: fix null deref on system suspend entry |
CVE-2024-41037
|
| VCID-p6g1-5fsy-ebck | kernel: skmsg: Skip zero length skb in sk_msg_recvmsg |
CVE-2024-41048
|
| VCID-pw2c-4aga-m7h1 | kernel: tcp: avoid too many retransmit packets |
CVE-2024-41007
|
| VCID-q6gd-wnkn-p7ed | kernel: mm: vmalloc: check if a hash-index is in cpu_possible_mask |
CVE-2024-41032
|
| VCID-qcta-5753-fkbg | kernel: filelock: fix potential use-after-free in posix_lock_inode |
CVE-2024-41049
|
| VCID-rat1-qknm-6fgv | kernel: spi: don't unoptimize message in spi_async() |
CVE-2024-42249
|
| VCID-t5qm-8dpb-ybe1 | kernel: scsi: ufs: core: Fix ufshcd_clear_cmd racing issue |
CVE-2024-41054
|
| VCID-ub5q-b8yw-93ca | kernel: ksmbd: discard write access to the directory open |
CVE-2024-41030
|
| VCID-uncu-bxh1-6bfp | kernel: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() |
CVE-2024-41041
|
| VCID-w2ha-4p4s-pbba | kernel: firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers |
CVE-2024-41038
|
| VCID-x1j5-aksu-xugg | kernel: libceph: fix race between delayed_work() and ceph_monc_stop() |
CVE-2024-42232
|
| VCID-x96q-mp3g-6bad | kernel: USB: serial: mos7840: fix crash on resume |
CVE-2024-42244
|
| VCID-xdae-ga3x-4qc9 | kernel: platform/x86: toshiba_acpi: Fix array out-of-bounds access |
CVE-2024-41028
|
| VCID-xmbs-gffh-5fbg | kernel: tty: serial: ma35d1: Add a NULL check for of_node |
CVE-2024-42248
|
| VCID-yrut-4a19-cfc5 | kernel: firmware: cs_dsp: Fix overflow checking of wmfw header |
CVE-2024-41039
|
| VCID-zxqg-qg3n-2bbp | kernel: netfilter: nfnetlink_queue: drop bogus WARN_ON |
CVE-2024-41043
|