Search for packages
| purl | pkg:deb/debian/linux@6.9.8-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1fzp-8eyv-e7b1 | kernel: net: mana: Fix possible double free in error handling path |
CVE-2024-42069
|
| VCID-24z7-grpq-ufgj | kernel: drm/xe/xe_devcoredump: Check NULL before assignments |
CVE-2024-42081
|
| VCID-2x3g-844w-wya2 | kernel: ASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link |
CVE-2024-42088
|
| VCID-3xgn-y5x1-v7em | kernel: xdp: Remove WARN() from __xdp_reg_mem_model() |
CVE-2024-42082
|
| VCID-5aqe-ry2y-1kcd | kernel: crypto: ecdh - explicitly zeroize private_key |
CVE-2024-42098
|
| VCID-5wc6-uad4-q7dk | kernel: ASoC: amd: acp: add a null check for chip_pdev structure |
CVE-2024-42074
|
| VCID-64b6-jjdu-rkfg | kernel: usb: atm: cxacru: fix endpoint checking in cxacru_bind() |
CVE-2024-41097
|
| VCID-6981-qvvb-3ue2 | kernel: nfsd: initialise nfsd_info.mutex early. |
CVE-2024-42078
|
| VCID-7m9e-xd2v-yfc4 | kernel: ionic: use dev_consume_skb_any outside of napi |
CVE-2024-42071
|
| VCID-7vj5-mmz9-sqf4 | kernel: bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() |
CVE-2024-42068
|
| VCID-8163-nw9c-tqav | kernel: bpf: Fix overrunning reservations in ringbuf |
CVE-2024-41009
|
| VCID-8a4m-zrzh-xfef | kernel: ocfs2: fix DIO failure due to insufficient transaction credits |
CVE-2024-42077
|
| VCID-8cej-x8zd-r7f5 | kernel: bpf: Fix remap of arena. |
CVE-2024-42075
|
| VCID-98vg-c3eq-jufc | kernel: pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER |
CVE-2024-42090
|
| VCID-aeeg-udzb-3kch | kernel: net: can: j1939: Initialize unused data in j1939_send_one() |
CVE-2024-42076
|
| VCID-afep-jc3n-9kbf | kernel: netfs: Fix netfs_page_mkwrite() to check folio-->mapping is valid |
CVE-2024-41083
|
| VCID-bnhb-84ma-s7es | kernel: net/dpaa2: Avoid explicit cpumask var allocation on stack |
CVE-2024-42093
|
| VCID-brd6-b8j7-43fb | kernel: ionic: fix kernel panic due to multi-buffer handling |
CVE-2024-42083
|
| VCID-c6qs-xpwm-eucz | kernel: drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep |
CVE-2024-42087
|
| VCID-ddw4-7kwf-6faq | kernel: RDMA/restrack: Fix potential invalid address access |
CVE-2024-42080
|
| VCID-dj4e-ngcu-ckf1 | kernel: drm/amd/display: Skip pipe if the pipe idx not set properly |
CVE-2024-42064
|
| VCID-dmwn-nnek-73gg | kernel: drm/i915/gt: Fix potential UAF by revoke of fence registers |
CVE-2024-41092
|
| VCID-dqcg-m3sm-1qca | kernel: net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new |
CVE-2023-52887
|
| VCID-e3qg-mz91-t3c9 | kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes |
CVE-2024-41089
|
| VCID-fecr-zjz9-m7g7 | kernel: gfs2: Fix NULL pointer dereference in gfs2_log_flush |
CVE-2024-42079
|
| VCID-fp7k-kzrv-pybz | kernel: serial: 8250_omap: Implementation of Errata i2310 |
CVE-2024-42095
|
| VCID-fxnd-53ca-1ugh | kernel: bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode |
CVE-2024-42063
|
| VCID-g3q7-91wp-dba4 | kernel: ata: libata-core: Fix double free on error |
CVE-2024-41087
|
| VCID-g6kz-1n1h-kkcp | kernel: bcachefs: Fix sb_field_downgrade validation |
CVE-2024-41086
|
| VCID-gf29-6gu1-7bbz | kernel: gpio: davinci: Validate the obtained number of IRQs |
CVE-2024-42092
|
| VCID-h5uc-rhns-8kfq | kernel: usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock |
CVE-2024-42085
|
| VCID-hwnf-jh75-dbex | kernel: cxl/region: Avoid null pointer dereference in region lookup |
CVE-2024-41084
|
| VCID-jv32-9ewn-ckcm | kernel: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers |
CVE-2024-42070
|
| VCID-ku6a-16yf-wke1 | kernel: net/iucv: Avoid explicit cpumask var allocation on stack |
CVE-2024-42094
|
| VCID-m6hj-5kjw-qbbv | kernel: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling |
CVE-2024-41085
|
| VCID-mw5v-1gp9-fyd7 | kernel: iio: chemical: bme680: Fix overflows in compensate() functions |
CVE-2024-42086
|
| VCID-n6b8-k7at-ebh9 | kernel: PCI/MSI: Fix UAF in msi_capability_init |
CVE-2024-41096
|
| VCID-p34e-8r5r-8ydd | kernel: drm/xe: Fix potential integer overflow in page size calculation |
CVE-2024-42066
|
| VCID-pm4y-dcud-5kcy | kernel: x86: stop playing stack games in profile_pc() |
CVE-2024-42096
|
| VCID-q5ss-1ftd-qqe9 | kernel: drm/xe: Check pat.ops before dumping PAT settings |
CVE-2024-42091
|
| VCID-q5uw-z4sr-9ud3 | kernel: ata: libata-core: Fix null pointer dereference on error |
CVE-2024-41098
|
| VCID-qcb2-n6n4-23dw | kernel: ASoC: fsl-asoc-card: set priv-->pdev before using it |
CVE-2024-42089
|
| VCID-qrpa-kyw4-xbcg | kernel: bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() |
CVE-2024-42067
|
| VCID-s7r7-8sxd-j7gp | kernel: drm/drm_file: Fix pid refcounting race |
CVE-2024-39486
|
| VCID-sn58-e595-j3f7 | kernel: drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init |
CVE-2024-42065
|
| VCID-uvkf-qdzx-wyhu | kernel: ftruncate: pass a signed offset |
CVE-2024-42084
|
| VCID-vffe-tb8s-eucn | kernel: can: mcp251xfd: fix infinite loop when xmit fails |
CVE-2024-41088
|
| VCID-wcqy-8yu3-ubeb | kernel: ALSA: emux: improve patch ioctl data validation |
CVE-2024-42097
|
| VCID-xwtr-zcbv-2fh8 | kernel: drm/fbdev-dma: Only set smem_start is enable per module option |
CVE-2024-41094
|
| VCID-y1qm-vkq5-ekfw | kernel: mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems |
CVE-2024-42073
|
| VCID-y3m6-ud9e-efe1 | kernel: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes |
CVE-2024-41095
|
| VCID-yycj-8x1k-suf3 | kernel: drm/amdgpu: avoid using null object of framebuffer |
CVE-2024-41093
|
| VCID-zejj-e3h6-pqea | kernel: bpf: Fix may_goto with negative offset. |
CVE-2024-42072
|
| VCID-zpg9-nrrx-3bfz | kernel: f_printer: crash leading to denial of service |
CVE-2024-25741
|