Search for packages
| purl | pkg:deb/debian/linux@6.9.11-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2qd3-2vy6-d3hu | kernel: ASoC: topology: Fix references to freed memory |
CVE-2024-41069
|
| VCID-3fp9-tvsa-bqbk | kernel: powerpc/pseries: Whitelist dtl slub object for copying to userspace |
CVE-2024-41065
|
| VCID-478k-p893-9qax | kernel: null_blk: fix validation of block size |
CVE-2024-41077
|
| VCID-4c3z-wbk1-33ca | kernel: btrfs: qgroup: fix quota root leak after quota disable failure |
CVE-2024-41078
|
| VCID-4fr1-uaeq-ekb2 | kernel: s390/sclp: Fix sclp_init() cleanup on failure |
CVE-2024-41068
|
| VCID-4k1h-9cye-kyfu | kernel: io_uring: fix possible deadlock in io_register_iowq_max_workers() |
CVE-2024-41080
|
| VCID-4ywq-vapu-gfcw | kernel: drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport |
CVE-2024-41061
|
| VCID-59p4-3w2h-r3h2 | kernel: NFSv4: Fix memory leak in nfs4_set_security_label |
CVE-2024-41076
|
| VCID-5c7b-8kaf-ubar | kernel: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check |
CVE-2024-41072
|
| VCID-5nx7-5az3-ckcz | kernel: closures: Change BUG_ON() to WARN_ON() |
CVE-2024-42252
|
| VCID-5tnm-u5qj-5bbt | kernel: mm: page_ref: remove folio_try_get_rcu() |
CVE-2024-42251
|
| VCID-8gcb-cqxf-pqck | kernel: nvme: avoid double free special payload |
CVE-2024-41073
|
| VCID-ah66-8q6e-pug8 | kernel: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() |
CVE-2024-41063
|
| VCID-ehxw-6841-r3ha | kernel: cachefiles: Set object to close if ondemand_id < 0 in copen |
CVE-2024-41074
|
| VCID-hw3e-pgkc-qqgs | kernel: ibmvnic: Add tx check to prevent skb leak |
CVE-2024-41066
|
| VCID-j3gr-84pv-eyes | kernel: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() |
CVE-2024-41057
|
| VCID-j5e9-jja8-c3gf | kernel: cachefiles: add consistency check for copen/cread |
CVE-2024-41075
|
| VCID-ka7q-cx4u-rkar | kernel: nvme-fabrics: use reserved tag for reg read/write command |
CVE-2024-41082
|
| VCID-q6jz-c462-skdz | kernel: drm/radeon: check bo_va->bo is non-NULL before using it |
CVE-2024-41060
|
| VCID-q9gy-8zmd-byaq | kernel: btrfs: scrub: handle RST lookup error correctly |
CVE-2024-41067
|
| VCID-reaq-h4pz-8qgq | kernel: powerpc/eeh: avoid possible crash when edev->pdev changes |
CVE-2024-41064
|
| VCID-sjxw-b1nn-z7ck | kernel: nvmet: always initialize cqe.result |
CVE-2024-41079
|
| VCID-tev5-tdet-7qdb | kernel: hfsplus: fix uninit-value in copy_name |
CVE-2024-41059
|
| VCID-tsqh-5xn7-a7e2 | kernel: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() |
CVE-2024-41070
|
| VCID-wfew-h539-c3an | kernel: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() |
CVE-2024-41058
|
| VCID-wjvu-p26y-qbha | kernel: bluetooth/l2cap: sync sock recv cb and release |
CVE-2024-41062
|
| VCID-yq6h-v56s-k7ez | kernel: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race |
CVE-2024-42253
|
| VCID-yxza-a6qn-jye9 | kernel: ila: block BH in ila_output() |
CVE-2024-41081
|