Search for packages
| purl | pkg:deb/debian/linux@6.9.7-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-17cq-va3x-3yct | kernel: netpoll: Fix race condition in netpoll_owner_active |
CVE-2024-41005
|
| VCID-1gaz-gg4z-9ye2 | kernel: net: kernel: UAF in network route management |
CVE-2024-36971
|
| VCID-1kaf-f6tb-ckdm | kernel: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' |
CVE-2024-36478
|
| VCID-1rj6-fgs9-mbab | kernel: drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails |
CVE-2024-38390
|
| VCID-1w9c-9cpt-2bbk | kernel: mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL |
CVE-2024-39474
|
| VCID-1zpf-h319-43ee | kernel: landlock: Fix d_parent walk |
CVE-2024-40938
|
| VCID-27vm-nwxr-zuec | kernel: io_uring/sqpoll: work around a potential audit memory leak |
CVE-2024-41001
|
| VCID-2b83-3dx3-qydv | kernel: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() |
CVE-2024-40953
|
| VCID-2mft-uhad-63a7 | kernel: mm/huge_memory: don't unpoison huge_zero_folio |
CVE-2024-40914
|
| VCID-2nz8-mxwk-dyfk | kernel: platform/x86: x86-android-tablets: Unregister devices in reverse order |
CVE-2024-40975
|
| VCID-2rma-a7jg-kqg1 | kernel: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() |
CVE-2024-40919
|
| VCID-2s7n-67h2-auda | kernel: s390/ap: Fix crash in AP internal function modify_bitmap() |
CVE-2024-38661
|
| VCID-2sv9-x6sa-8ybh | kernel: Revert "xsk: Support redirect to any socket bound to the same umem" |
CVE-2024-39293
|
| VCID-3mj5-4jsg-93gx | kernel: fs/ntfs3: Use variable length array instead of fixed size |
CVE-2024-38623
|
| VCID-3vu2-gx5x-9ffj | kernel: f2fs: compress: don't allow unaligned truncation on released compress inode |
CVE-2024-33847
|
| VCID-3wu9-tstk-1ycc | kernel: fpga: manager: add owner module and take its refcount |
CVE-2024-37021
|
| VCID-3wzz-mcyx-nybe | kernel: media: ti: j721e-csi2rx: Fix races while restarting DMA |
CVE-2024-32936
|
| VCID-41mw-gnq3-rffg | kernel: bpf: Set run context for rawtp test_run callback |
CVE-2024-40908
|
| VCID-47k1-5vw2-97hy | kernel: drm/msm/dpu: Add callback function pointer check before its call |
CVE-2024-38622
|
| VCID-4cjx-h7da-jqf4 | kernel: btrfs: zoned: allocate dummy checksums for zoned NODATASUM writes |
CVE-2024-40962
|
| VCID-4k3a-jwjk-dkfr | kernel: drm/amdgpu: add error handle to avoid out-of-bounds |
CVE-2024-39471
|
| VCID-4ps5-mvpn-37hz | kernel: cachefiles: remove requests from xarray during flushing requests |
CVE-2024-40900
|
| VCID-51eu-ps2m-jufa | kernel: mips: bmips: BCM6358: make sure CBR is correctly set |
CVE-2024-40963
|
| VCID-5cx6-urnd-ekg7 | kernel: dmaengine: xilinx: xdma: Fix data synchronisation in xdma_channel_isr() |
CVE-2024-40986
|
| VCID-5das-f854-xke9 | kernel: sock_map: avoid race between sock_map_close and sk_psock_put |
CVE-2024-39500
|
| VCID-5dnu-ynqr-gydw | kernel: dmaengine: ti: k3-udma-glue: Fix of_k3_udma_glue_parse_chn_by_id() |
CVE-2024-40991
|
| VCID-5fqz-1xa5-xqd2 | kernel: usb-storage: alauda: Check whether the media is initialized |
CVE-2024-38619
|
| VCID-5gz4-1ysh-2qf7 | kernel: net: ena: Add validation for completion descriptors consistency |
CVE-2024-40999
|
| VCID-5pn2-e8t9-kucx | kernel: wifi: iwlwifi: mvm: don't read past the mfuart notifcation |
CVE-2024-40941
|
| VCID-5qjx-s9vp-4bbx | kernel: btrfs: fix crash on racing fsync and size-extending write into prealloc |
CVE-2024-37354
|
| VCID-641d-ec1z-w7dx | kernel: powerpc/pseries: Enforce hcall result buffer validity and size |
CVE-2024-40974
|
| VCID-658x-su8w-tyhb | kernel: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() |
CVE-2024-40912
|
| VCID-66rf-ptx7-ukg7 | kernel: drm/lima: mask irqs in timeout path before hard reset |
CVE-2024-40976
|
| VCID-6b1b-mjtq-ffc2 | kernel: bpf: Allow delete from sockmap/sockhash only if update is allowed |
CVE-2024-38662
|
| VCID-6cda-zhpe-ebcb | kernel: ax25: Fix refcount imbalance on inbound connections |
CVE-2024-40910
|
| VCID-6d6c-5dys-ayhh | kernel: nfc: nci: Fix uninit-value in nci_rx_work |
CVE-2024-38381
|
| VCID-6s4n-xfks-37a2 | kernel: ocfs2: fix NULL pointer dereference in ocfs2_journal_dirty() |
CVE-2024-40952
|
| VCID-6yqt-zn3j-7fck | kernel: kdb: Fix buffer overflow during tab-complete |
CVE-2024-39480
|
| VCID-71ta-qwvq-vybt | kernel: ptp: fix integer overflow in max_vclocks_store |
CVE-2024-40994
|
| VCID-72qs-f7hg-k3hy | kernel: PCI: of_property: Return error for int_map allocation failure |
CVE-2024-34030
|
| VCID-74xc-erjn-83ef | kernel: mm: shmem: fix getting incorrect lruvec when replacing a shmem folio |
CVE-2024-40949
|
| VCID-75yg-gdmt-vfg8 | kernel: f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode() |
CVE-2024-39467
|
| VCID-7b78-ws69-uqc7 | kernel: soundwire: cadence: fix invalid PDI offset |
CVE-2024-38635
|
| VCID-7m5u-66hc-nucr | kernel: io_uring/rsrc: don't lock while !TASK_RUNNING |
CVE-2024-40922
|
| VCID-7ufd-q9uj-wbhu | kernel: stm class: Fix a double free in stm_register_device() |
CVE-2024-38627
|
| VCID-87v5-p3qy-akhk | kernel: fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow |
CVE-2024-38624
|
| VCID-88ec-dhuf-yfh8 | kernel: serial: max3100: Lock port->lock when calling uart_handle_cts_change() |
CVE-2024-38634
|
| VCID-8e46-n9s3-jbgd | kernel: media: pci: cx23885: check cx23885_vdev_init() return |
CVE-2023-52918
|
| VCID-8ruu-ubqf-53ah | kernel: net: do not leave a dangling sk pointer, when socket creation fails |
CVE-2024-40954
|
| VCID-92pj-xtkd-ekhx | kernel: clk: bcm: dvp: Assign ->num before accessing ->hws |
CVE-2024-39462
|
| VCID-96nb-wv6r-4qcv | kernel: cpufreq: amd-pstate: fix memory leak on CPU EPP exit |
CVE-2024-40997
|
| VCID-9a27-3tb5-sfa9 | kernel: riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context |
CVE-2024-40915
|
| VCID-9auk-cjtf-8ud6 | kernel: cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd() |
CVE-2024-40899
|
| VCID-9aye-3p6m-efen | kernel: 9p: add missing locking around taking dentry fid list |
CVE-2024-39463
|
| VCID-9ec3-yxds-4kbs | kernel: smb: client: fix deadlock in smb2_find_smb_tcon() |
CVE-2024-39468
|
| VCID-9j1g-5v2d-gqdm | kernel: ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance |
CVE-2024-39491
|
| VCID-9jqv-1jn6-tqbb | kernel: tracing: Build event generation tests only as modules |
CVE-2024-41004
|
| VCID-9ky7-xpjg-myct | kernel: clk: bcm: rpi: Assign ->num before accessing ->hws |
CVE-2024-39461
|
| VCID-9u57-1u3u-nkef | kernel: mptcp: ensure snd_una is properly initialized on connect |
CVE-2024-40931
|
| VCID-a25q-rqfn-8fhz | kernel: net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool() |
CVE-2024-40928
|
| VCID-a6wt-wpx5-ckc3 | kernel: jfs: xattr: fix buffer overflow for invalid xattr |
CVE-2024-40902
|
| VCID-a9be-xp8z-13fv | kernel: memblock: make memblock_set_node() also warn about use of MAX_NUMNODES |
CVE-2024-40917
|
| VCID-adeh-ppnk-gbck | kernel: mmc: davinci: Don't strip remove function when driver is builtin |
CVE-2024-39484
|
| VCID-ah3k-5g1s-kbbn | kernel: KVM: arm64: Disassociate vcpus from redistributor region on teardown |
CVE-2024-40989
|
| VCID-ary4-fza6-tybg | kernel: enic: Validate length of nl attributes in enic_set_vf_port |
CVE-2024-38659
|
| VCID-axts-gawd-kkdv | kernel: cachefiles: defer exposing anon_fd until after copy_to_user() succeeds |
CVE-2024-40913
|
| VCID-b3ne-u3g4-uuf2 | kernel: cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() |
CVE-2024-39510
|
| VCID-b5nq-jbbw-8kfe | kernel: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) |
CVE-2024-39497
|
| VCID-b6sg-6xy9-uydp | kernel: Avoid hw_desc array overrun in dw-axi-dmac |
CVE-2024-40970
|
| VCID-b6yd-s1sc-m3br | kernel: riscv: prevent pt_regs corruption for secondary idle threads |
CVE-2024-38667
|
| VCID-ba6k-mvxj-8udm | hw: amd: Instruction raise #VC exception at exit |
CVE-2024-25742
|
| VCID-bbbm-vxn4-9fgs | kernel: HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() |
CVE-2024-40934
|
| VCID-bbzc-v282-7qgd | kernel: vmxnet3: disable rx data ring on dma allocation failure |
CVE-2024-40923
|
| VCID-bh2d-qp9s-b7b7 | kernel: btrfs: zoned: fix use-after-free due to race with dev replace |
CVE-2024-39496
|
| VCID-bhga-smcp-3bd5 | kernel: ocfs2: fix races between hole punching and AIO+DIO |
CVE-2024-40943
|
| VCID-bkw8-bzn1-6kdd | kernel: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory |
CVE-2024-40901
|
| VCID-c2jn-vp68-qybu | kernel: drm/komeda: check for error-valued pointer |
CVE-2024-39505
|
| VCID-c2zm-jbmh-yqbq | kernel: bcachefs: Check for journal entries overruning end of sb clean section |
CVE-2024-35948
|
| VCID-c3nf-jvu3-pyg3 | kernel: tcp: Fix shift-out-of-bounds in dctcp_update_alpha(). |
CVE-2024-37356
|
| VCID-c73y-emra-gbch | kernel: io_uring: check for non-NULL file pointer in io_file_can_poll() |
CVE-2024-39371
|
| VCID-c9xy-v5tb-puc8 | kernel: vfio/pci: fix potential memory leak in vfio_intx_enable() |
CVE-2024-38632
|
| VCID-cax1-umsu-dbhh | kernel: net/tcp_ao: Don't leak ao_info on error-path |
CVE-2024-40985
|
| VCID-cd1k-pz2p-fqgy | kernel: drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode() |
CVE-2024-39291
|
| VCID-cef6-t3fj-tfap | kernel: ALSA: timer: Set lower bound of start tick time |
CVE-2024-38618
|
| VCID-cg39-mea5-xugm | kernel: media: stk1160: fix bounds checking in stk1160_copy_video() |
CVE-2024-38621
|
| VCID-chyr-3wq7-yqgx | kernel: drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found |
CVE-2024-40916
|
| VCID-cjp6-jxsx-mffx | kernel: net/9p: fix uninit-value in p9_client_rpc() |
CVE-2024-39301
|
| VCID-cpub-yx9n-2kdx | kernel: serial: max3100: Update uart_driver_registered on driver removal |
CVE-2024-38633
|
| VCID-csw6-gmns-hkas | kernel: ipv6: fix possible race in __fib6_drop_pcpu_from() |
CVE-2024-40905
|
| VCID-csz7-gang-p3du | kernel: USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages |
CVE-2024-40904
|
| VCID-d2y4-mrbc-7kg9 | kernel: drm: zynqmp_dpsub: Always register bridge |
CVE-2024-38664
|
| VCID-d5r3-pcas-9yd7 | kernel: gve: Clear napi->skb before dev_kfree_skb_any() |
CVE-2024-40937
|
| VCID-d64r-68wp-kbc5 | kernel: bonding: fix oops during rmmod |
CVE-2024-39296
|
| VCID-d89j-ckxt-cyf2 | kernel: crypto: hisilicon/sec - Fix memory leak for sec resource release |
CVE-2024-41002
|
| VCID-daby-uwhk-sfc8 | kernel: netfilter: nft_inner: validate mandatory meta and payload |
CVE-2024-39504
|
| VCID-dbmb-ccjh-1fcj | kernel: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery |
CVE-2024-40977
|
| VCID-ddm7-5p27-3khg | kernel: io_uring/io-wq: Use set_bit() and test_bit() at worker->flags |
CVE-2024-39508
|
| VCID-dkuv-uajy-z7hh | kernel: net: relax socket state check at accept time. |
CVE-2024-36484
|
| VCID-dsts-dkjs-6uar | kernel: cachefiles: flush all requests after setting CACHEFILES_DEAD |
CVE-2024-40935
|
| VCID-dzjt-y2m1-yucm | kernel: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail |
CVE-2024-40940
|
| VCID-e1hs-5x8z-1fh3 | kernel: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type |
CVE-2024-39503
|
| VCID-e4jw-y3k8-r7ec | kernel: net/mlx5e: Fix netif state handling |
CVE-2024-38608
|
| VCID-e6by-z2hh-8qe9 | kernel: dma-mapping: benchmark: fix node id validation |
CVE-2024-34777
|
| VCID-e6pq-2v3a-rybk | kernel: wifi: cfg80211: Lock wiphy in cfg80211_get_station |
CVE-2024-40911
|
| VCID-e88z-rxbc-1yfz | kernel: media: lgdt3306a: Add a check against null-pointer-def |
CVE-2022-48772
|
| VCID-ecdp-2gcz-57aq | kernel: ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger() |
CVE-2024-40951
|
| VCID-ehax-156z-z3du | kernel: f2fs: multidev: fix to recognize valid zero block address |
CVE-2024-38636
|
| VCID-enez-chde-vyaq | kernel: seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors |
CVE-2024-40957
|
| VCID-eq1t-p8xt-1kcb | kernel: efi: libstub: only free priv.runtime_map when allocated |
CVE-2024-33619
|
| VCID-ezwk-8s3n-5ygu | kernel: Input: cyapa - add missing input core locking to suspend/resume functions |
CVE-2023-52884
|
| VCID-g44r-cmk6-h7cu | kernel: drm/nouveau: don't attempt to schedule hpd_work on headless cards |
CVE-2024-40926
|
| VCID-g6cc-235e-27ch | kernel: ipv6: prevent possible NULL deref in fib6_nh_init() |
CVE-2024-40961
|
| VCID-ghve-wwwa-bqg4 | kernel: tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer |
CVE-2024-36477
|
| VCID-gtd6-f298-uubw | kernel: serial: imx: Introduce timeout when waiting on transmitter empty |
CVE-2024-40967
|
| VCID-gz41-s9d7-3yfx | kernel: tls: fix missing memory barrier in tls_init |
CVE-2024-36489
|
| VCID-h1rh-gykh-27d4 | kernel: netrom: Fix a memory leak in nr_heartbeat_expiry() |
CVE-2024-41006
|
| VCID-h5ks-h7t7-rqcz | kernel: fs/ntfs3: Check 'folio' pointer for NULL |
CVE-2024-38625
|
| VCID-h794-tfsu-63f9 | kernel: ipv6: prevent possible NULL dereference in rt6_probe() |
CVE-2024-40960
|
| VCID-h7ar-zxzy-afc4 | kernel: nilfs2: fix potential kernel bug due to lack of writeback flag waiting |
CVE-2024-37078
|
| VCID-hcj1-medk-xfgn | kernel: SUNRPC: Fix loop termination condition in gss_free_in_token_pages() |
CVE-2024-36288
|
| VCID-hkq4-sqv1-r3df | kernel: greybus: lights: check return of get_channel_from_mode |
CVE-2024-38637
|
| VCID-hksu-xdp6-nfbt | kernel: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY |
CVE-2024-39488
|
| VCID-hucp-gu2u-97e1 | hw: amd: Instruction raise #VC exception at exit |
CVE-2024-25743
|
| VCID-hwgj-auch-vbb7 | kernel: ima: Fix use-after-free on a dentry's dname.name |
CVE-2024-39494
|
| VCID-hx3v-7u4a-pye2 | kernel: batman-adv: bypass empty buckets in batadv_purge_orig_ref() |
CVE-2024-40981
|
| VCID-hy7f-qgus-nfgq | kernel: genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after() |
CVE-2024-38385
|
| VCID-j5t1-meck-n7g5 | kernel: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail |
CVE-2024-40939
|
| VCID-j5vf-zzky-yfgy | kernel: RDMA/mlx5: Add check for srq max_sge attribute |
CVE-2024-40990
|
| VCID-jecd-ars7-nqdq | kernel: ipv6: sr: fix memleak in seg6_hmac_init_algo |
CVE-2024-39489
|
| VCID-jp67-mtvm-83ch | kernel: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP |
CVE-2024-36974
|
| VCID-jqyc-4ecb-wuhn | kernel: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet |
CVE-2024-39506
|
| VCID-jtu7-x8t6-vbg6 | kernel: crypto: starfive - Do not free stack buffer |
CVE-2024-39478
|
| VCID-jtvm-agk1-87am | kernel: af_unix: Update unix_sk(sk)->oob_skb under sk_receive_queue lock |
CVE-2024-36972
|
| VCID-jynv-zvxk-c3fd | kernel: bpf: Fix a potential use-after-free in bpf_link_free() |
CVE-2024-40909
|
| VCID-jz37-ztab-fbem | kernel: drm/i915/hwmon: Get rid of devm |
CVE-2024-39479
|
| VCID-k27q-9kcv-3fgh | kernel: f2fs: don't set RO when shutting down f2fs |
CVE-2024-40969
|
| VCID-kdf1-9mq7-2ue6 | kernel: i2c: lpi2c: Avoid calling clk_get_rate during transfer |
CVE-2024-40965
|
| VCID-kh4c-tsv9-9ue5 | kernel: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps |
CVE-2024-40903
|
| VCID-khtx-8347-63c1 | kernel: ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension |
CVE-2024-39473
|
| VCID-ktc8-mnq7-53eh | kernel: drm/xe: Only use reserved BCS instances for usm migrate exec queue |
CVE-2024-37026
|
| VCID-kxj4-h5xy-a7bp | kernel: ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine." |
CVE-2024-40984
|
| VCID-kyz7-3nqm-5fcf | kernel: bcache: fix variable length array abuse in btree_iter |
CVE-2024-39482
|
| VCID-m3tm-er2s-8kex | kernel: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak |
CVE-2024-39493
|
| VCID-m5sg-ney3-8kb5 | kernel: dma-buf/sw-sync: don't enable IRQ from sync_print_obj() |
CVE-2024-38780
|
| VCID-m65m-h6rt-cua3 | kernel: mailbox: mtk-cmdq: Fix pm_runtime_get_sync() warning in mbox shutdown |
CVE-2024-39492
|
| VCID-m6cv-w35d-sye1 | kernel: ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup |
CVE-2024-38388
|
| VCID-mebe-7ptu-nuh2 | kernel: eventfs: Fix a possible null pointer dereference in eventfs_find_events() |
CVE-2024-39470
|
| VCID-mun9-22yj-eqbf | kernel: media: mtk-vcodec: potential null pointer deference in SCP |
CVE-2024-40973
|
| VCID-njxj-z6pv-r7h9 | kernel: netns: Make get_net_ns() handle zero refcount net |
CVE-2024-40958
|
| VCID-nrbm-wxvb-4ffj | kernel: media: v4l: async: Fix notifier list entry init |
CVE-2024-39464
|
| VCID-nskj-fknc-g3gn | kernel: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects |
CVE-2024-40942
|
| VCID-nt3u-cqq6-kfek | kernel: block/ioctl: prefer different overflow check |
CVE-2024-41000
|
| VCID-nwn5-d5f1-rkbr | kernel: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() |
CVE-2024-40998
|
| VCID-nywh-bpaa-bybb | kernel: fbdev: savage: Handle err return when savagefb_check_var failed |
CVE-2024-39475
|
| VCID-pafa-8kts-bkgu | kernel: thermal/drivers/qcom/lmh: Check for SCM availability at probe |
CVE-2024-39466
|
| VCID-pgsa-kx7f-33cf | kernel: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() |
CVE-2024-39276
|
| VCID-pk74-dafk-e3gj | kernel: drm/amdgpu: change vm->task_info handling |
CVE-2024-41008
|
| VCID-pur8-2bh5-a3f3 | kernel: greybus: Fix use-after-free bug in gb_interface_release due to race condition |
CVE-2024-39495
|
| VCID-qg26-whr6-t7cj | kernel: bpf: Fix reg_set_min_max corruption of fake_reg |
CVE-2024-41003
|
| VCID-qxzk-k6qv-mbdk | kernel: drm/i915/dpt: Make DPT object unshrinkable |
CVE-2024-40924
|
| VCID-rbq3-mb3k-ubcs | kernel: x86/kexec: Fix bug with call depth tracking |
CVE-2024-40944
|
| VCID-s4mn-hkcf-g3g2 | kernel: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list |
CVE-2024-40956
|
| VCID-s7t6-1g6a-jkfg | kernel: iommu: Return right value in iommu_sva_bind_device() |
CVE-2024-40945
|
| VCID-s97c-udpg-3yd7 | kernel: f2fs: remove clear SB_INLINECRYPT flag in default_options |
CVE-2024-40971
|
| VCID-sb39-czx4-b7eu | kernel: drm/exynos/vidi: fix memory leak in .get_modes() |
CVE-2024-40932
|
| VCID-sbaf-swwe-u7ee | kernel: Bluetooth: btnxpuart: Resolve TX timeout error in power save stress test |
CVE-2024-58238
|
| VCID-sd5z-ryk2-3ker | kernel: drop_monitor: replace spin_lock by raw_spin_lock |
CVE-2024-40980
|
| VCID-sgzp-fgfe-efhk | kernel: net/mlx5: Always stop health timer during driver removal |
CVE-2024-40906
|
| VCID-sm13-afqw-2qcs | kernel: vmci: prevent speculation leaks by sanitizing event in event_deliver() |
CVE-2024-39499
|
| VCID-t67j-sjwx-z3bd | kernel: net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state |
CVE-2024-40921
|
| VCID-t9e2-9f4f-6yed | kernel: tty: add the option to have a tty reject a new ldisc |
CVE-2024-40966
|
| VCID-t9gm-7jmh-zqh1 | kernel: tracing/probes: fix error check in parse_btf_field() |
CVE-2024-36481
|
| VCID-tb5s-dnk4-5bcm | kernel: KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked |
CVE-2024-39483
|
| VCID-tbyx-zh99-4qfj | kernel: media: mc: Fix graph walk in media_pipeline_start |
CVE-2024-39481
|
| VCID-tc1c-bce8-6ygq | kernel: double free in the error handling of gp_aux_bus_probe() |
CVE-2024-36973
|
| VCID-tmsz-zge9-1yct | kernel: tipc: force a dst refcount before doing decryption |
CVE-2024-40983
|
| VCID-tq3a-g5u3-vufq | kernel: fpga: region: add owner module and take its refcount |
CVE-2024-35247
|
| VCID-tx8v-h7xc-2ugu | kernel: ionic: fix use after netif_napi_del() |
CVE-2024-39502
|
| VCID-txd9-vj2z-27g8 | kernel: ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists() |
CVE-2024-40955
|
| VCID-tz4z-btx7-vbez | kernel: mm/page_table_check: fix crash on ZONE_DEVICE |
CVE-2024-40948
|
| VCID-u3qk-8ejb-ekba | kernel: ppdev: Add an error check in register_device |
CVE-2024-36015
|
| VCID-u59n-5bvw-kker | kernel: netfilter: tproxy: bail out if IP has been disabled on the device |
CVE-2024-36270
|
| VCID-u66e-wk6p-93bd | kernel: ima: Avoid blocking in RCU read-side critical section |
CVE-2024-40947
|
| VCID-ub7v-5u16-xqau | kernel: genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline |
CVE-2024-31076
|
| VCID-ud3z-sd6f-rkhn | kernel: bpf: Avoid splat in pskb_pull_reason |
CVE-2024-40996
|
| VCID-uej8-rjx2-8ufe | kernel: dma-mapping: benchmark: handle NUMA_NO_NODE correctly |
CVE-2024-39277
|
| VCID-uh94-5nuu-w7fd | kernel: parisc: Try to fix random segmentation faults in package builds |
CVE-2024-40918
|
| VCID-ujer-arz9-wkg7 | kernel: xhci: Handle TD clearing for multiple streams case |
CVE-2024-40927
|
| VCID-uk7t-y16v-j3cj | kernel: btrfs: protect folio::private when attaching extent buffer folios |
CVE-2024-38306
|
| VCID-ut94-h9un-f3c3 | kernel: block: fix request.queuelist usage in flush |
CVE-2024-40925
|
| VCID-uusw-w8rh-qqbj | kernel: wifi: cfg80211: validate HE operation element parsing |
CVE-2024-40930
|
| VCID-uxgx-dga8-pfbp | kernel: media: mgb4: Fix double debugfs remove |
CVE-2024-39465
|
| VCID-uykq-n8rm-yfce | kernel: net: hns3: fix kernel crash problem in concurrent scenario |
CVE-2024-39507
|
| VCID-uz33-zmzc-cbb4 | kernel: dmaengine: idxd: Avoid unnecessary destruction of file_ida |
CVE-2024-38629
|
| VCID-v3fj-aas6-wqac | kernel: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors |
CVE-2024-39469
|
| VCID-vavh-7yb6-rbg9 | kernel: ext4: do not create EA inode under buffer lock |
CVE-2024-40972
|
| VCID-vck1-emav-93gc | kernel: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger |
CVE-2024-38630
|
| VCID-vcta-a52f-kugq | kernel: drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2 |
CVE-2024-39498
|
| VCID-vg8w-542a-6kgd | kernel: mm/hugetlb: do not call vma_add_reservation upon ENOMEM |
CVE-2024-39477
|
| VCID-vh5a-v2nr-qug4 | kernel: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() |
CVE-2024-40959
|
| VCID-vmry-w4aj-1qdt | kernel: ionic: fix kernel panic in XDP_TX action |
CVE-2024-40907
|
| VCID-vzpm-bd9y-x7h5 | kernel: ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind() |
CVE-2024-40964
|
| VCID-w57y-kq47-xkbe | kernel: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING |
CVE-2024-39476
|
| VCID-w5ef-xstu-budt | kernel: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids |
CVE-2024-40929
|
| VCID-wgcf-sukj-9kax | kernel: use-after-free in cec_queue_msg_fh |
CVE-2024-23848
|
| VCID-wgrx-8e8c-aqav | kernel: media: v4l: async: Properly re-initialise notifier entry in unregister |
CVE-2024-39485
|
| VCID-wn4x-uf4w-9ucy | kernel: MIPS: Octeon: Add PCIe link status check |
CVE-2024-40968
|
| VCID-wsb9-n7as-nuhm | kernel: net: sched: sch_multiq: fix possible OOB write in multiq_tune() |
CVE-2024-36978
|
| VCID-wwck-93dd-mqge | kernel: scsi: qedi: Fix crash while reading debugfs attribute |
CVE-2024-40978
|
| VCID-x17b-gsrg-s7cu | kernel: mm: huge_memory: fix misused mapping_large_folio_support() for anon folios |
CVE-2024-40950
|
| VCID-xadt-1wgc-zbga | kernel: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state |
CVE-2024-40920
|
| VCID-xkzk-v8pm-vubj | kernel: ipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound |
CVE-2024-33621
|
| VCID-xqzg-b9zt-dydp | kernel: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu() |
CVE-2024-36286
|
| VCID-xu4v-fzvu-tbfd | kernel: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() |
CVE-2024-40995
|
| VCID-xuj7-veq8-g3f2 | kernel: f2fs: compress: fix to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock |
CVE-2024-34027
|
| VCID-xy9x-u7e9-3bgk | kernel: drm/radeon: fix UBSAN warning in kv_dpm.c |
CVE-2024-40988
|
| VCID-xzga-4u2n-mkhg | kernel: RDMA/rxe: Fix responder length checking for UD request packets |
CVE-2024-40992
|
| VCID-xzn8-21ns-xyga | kernel: HID: core: remove unnecessary WARN_ON() in implement() |
CVE-2024-39509
|
| VCID-y4jx-j1bj-qqhu | kernel: fpga: bridge: add owner module and take its refcount |
CVE-2024-36479
|
| VCID-yc7f-ajqn-2udb | kernel: mm/memory-failure: fix handling of dissolved but not taken off from buddy pages |
CVE-2024-39298
|
| VCID-ygu9-cxjv-tqey | kernel: net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules |
CVE-2024-36281
|
| VCID-yhkz-trfw-rkev | kernel: drm/amdgpu: fix UBSAN warning in kv_dpm.c |
CVE-2024-40987
|
| VCID-yj72-sp6m-n3f8 | kernel: blk-cgroup: fix list corruption from reorder of WRITE ->lqueued |
CVE-2024-38384
|
| VCID-yjc3-k4fv-9fay | kernel: um: Add winch to winch_handlers before registering winch IRQ |
CVE-2024-39292
|
| VCID-yv9k-53e3-fqbw | kernel: iio: temperature: mlx90635: Fix ERR_PTR dereference in mlx90635_probe() |
CVE-2024-40933
|
| VCID-z4q9-t4h9-kubj | kernel: wifi: ath12k: fix kernel crash during resume |
CVE-2024-40979
|
| VCID-z4ry-5wgu-akgj | kernel: blk-cgroup: fix list corruption from resetting io stat |
CVE-2024-38663
|
| VCID-z4vk-6hpp-9ug4 | kernel: ipv6: sr: fix missing sk_buff release in seg6_input_core |
CVE-2024-39490
|
| VCID-za6m-wtx8-pufj | kernel: netfilter: ipset: Fix suspicious rcu_dereference_protected() |
CVE-2024-40993
|
| VCID-zc1m-3jd9-yqg6 | kernel: cxl/region: Fix memregion leaks in devm_cxl_add_region() |
CVE-2024-40936
|
| VCID-zfrz-jeew-tyea | kernel: net/sched: taprio: extend minimum interval restriction to entire cycle too |
CVE-2024-36244
|
| VCID-zs1j-jkav-byb3 | kernel: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. |
CVE-2024-38628
|