Search for packages
| purl | pkg:deb/debian/linux@6.9.9-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1kb4-1196-ukcy | kernel: vhost_task: Handle SIGKILL by flushing work and exiting |
CVE-2024-42135
|
| VCID-1ssz-xkut-wyfb | kernel: s390/dasd: Fix invalid dereferencing of indirect CCW data pointer |
CVE-2024-42099
|
| VCID-28p4-6smr-v3er | kernel: bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable |
CVE-2024-42151
|
| VCID-2fsz-wcjz-9yer | kernel: ice: Don't process extts if PTP is disabled |
CVE-2024-42107
|
| VCID-3xmh-yxeg-uyab | kernel: net/mlx5: E-switch, Create ingress ACL when needed |
CVE-2024-42142
|
| VCID-41ur-7cwy-tyf1 | kernel: wifi: mt76: replace skb_put with skb_put_zero |
CVE-2024-42225
|
| VCID-4fhy-bbaj-9yan | kernel: scsi: qedf: Make qedf_execute_tmf() non-preemptible |
CVE-2024-42124
|
| VCID-4xre-66st-mqhj | kernel: crypto: aead,cipher - zeroize key buffer after use |
CVE-2024-42229
|
| VCID-52q3-gkq8-jqgs | kernel: IB/core: Implement a limit on UMAD receive List |
CVE-2024-42145
|
| VCID-58nw-zyh2-kud6 | kernel: virtio-pci: Check if is_avq is NULL |
CVE-2024-42134
|
| VCID-59fk-ysn2-43ew | kernel: mm: avoid overflows in dirty throttling logic |
CVE-2024-42131
|
| VCID-6q6c-286k-5kd1 | kernel: nilfs2: fix inode number range checks |
CVE-2024-42105
|
| VCID-73j6-r2dm-kqg1 | kernel: btrfs: always do the basic checks for btrfs_qgroup_inherit structure |
CVE-2024-42111
|
| VCID-7d95-dwep-wkaf | kernel: btrfs: zoned: fix calc_available_free_space() for zoned mode |
CVE-2024-42231
|
| VCID-7j6n-nqwg-qycj | kernel: powerpc/pseries: Fix scv instruction crash with kexec |
CVE-2024-42230
|
| VCID-7quz-kzpx-fqfb | kernel: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD |
CVE-2024-42161
|
| VCID-8437-vey1-x7cn | kernel: cdrom: rearrange last_media_change check to avoid unintentional overflow |
CVE-2024-42136
|
| VCID-8nee-wq2j-4kfq | kernel: nvmet: fix a possible leak when destroy a ctrl during qp establishment |
CVE-2024-42152
|
| VCID-8ud8-f75a-jyew | kernel: ice: Fix improper extts handling |
CVE-2024-42139
|
| VCID-9ccp-38u2-5ud1 | kernel: filelock: Remove locks reliably when fcntl/close race is detected |
CVE-2024-41012
|
| VCID-a2es-a93m-6bhe | kernel: inet_diag: Initialize pad field in struct inet_diag_req_v2 |
CVE-2024-42106
|
| VCID-a4aq-ymqp-6yb1 | kernel: btrfs: fix adding block group to a reclaim list and the unused list during reclaim |
CVE-2024-42103
|
| VCID-a6fe-z15w-vfa7 | kernel: drm/amd/display: Check pipe offset before setting vblank |
CVE-2024-42120
|
| VCID-arnq-m294-hygb | kernel: leds: mlxreg: Use devm_mutex_init() for mutex initialization |
CVE-2024-42129
|
| VCID-b4xw-xqea-fbcd | kernel: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file |
CVE-2024-42138
|
| VCID-ba86-3gkx-x7cd | kernel: wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband |
CVE-2024-42125
|
| VCID-c2ct-3xyu-vfca | kernel: Bluetooth: ISO: Check socket flag instead of hcon |
CVE-2024-42141
|
| VCID-c9h3-3nm5-jqcq | kernel: s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings |
CVE-2024-42158
|
| VCID-cap6-uxkj-93ey | kernel: drm/amd/display: Add NULL pointer check for kzalloc |
CVE-2024-42122
|
| VCID-ceuf-nzmb-q3bg | kernel: drm/amd/display: Fix overlapping copy within dml_core_mode_programming |
CVE-2024-42227
|
| VCID-cjeb-4tju-mqfg | kernel: drm/amd/display: Skip finding free audio for unknown engine_id |
CVE-2024-42119
|
| VCID-cxgg-768q-53dv | kernel: scsi: mpi3mr: Sanitise num_phys |
CVE-2024-42159
|
| VCID-d131-p16m-jqhd | kernel: drm/amdgpu: fix double free err_addr pointer warnings |
CVE-2024-42123
|
| VCID-d83g-5tdr-7fd5 | kernel: gve: Account for stopped queues when reading NIC stats |
CVE-2024-42162
|
| VCID-dd4s-xxtr-vqds | kernel: net: txgbe: initialize num_q_vectors for MSI/INTx interrupts |
CVE-2024-42113
|
| VCID-dj5v-aaqq-z3c8 | kernel: drm/amd/display: ASSERT when failing to find index by plane/stream id |
CVE-2024-42117
|
| VCID-ert1-ccux-83b1 | kernel: net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() |
CVE-2024-42110
|
| VCID-ewcb-ardv-m7e6 | kernel: net: txgbe: remove separate irq request for MSI and INTx |
CVE-2024-42150
|
| VCID-fbd2-ztfa-r7fr | kernel: clk: sunxi-ng: common: Don't call hw_to_ccu_common on hw without common |
CVE-2024-42100
|
| VCID-fp7e-5d7y-fbcr | kernel: powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt. |
CVE-2024-42126
|
| VCID-gmuq-a3t3-d7gt | kernel: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() |
CVE-2024-39487
|
| VCID-htvr-qyw2-4ubs | kernel: Bluetooth: Ignore too large handle values in BIG |
CVE-2024-42133
|
| VCID-jwck-jfv1-c7ec | kernel: Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot |
CVE-2024-42137
|
| VCID-ke4m-d5qb-d3h8 | kernel: bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX |
CVE-2024-42132
|
| VCID-kn6a-kb3h-e7bx | kernel: nilfs2: add missing check for inode numbers on directory entries |
CVE-2024-42104
|
| VCID-kzsr-8hjr-gkf1 | kernel: drm/amd/display: Do not return negative stream id for array |
CVE-2024-42118
|
| VCID-nrjs-e64f-hqgv | kernel: net: txgbe: free isb resources at the right time |
CVE-2024-42112
|
| VCID-p73q-3qux-qke5 | kernel: drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes |
CVE-2024-42101
|
| VCID-p9xt-2zv1-b3ff | kernel: drm/amd/display: Check index msg_id before read or write |
CVE-2024-42121
|
| VCID-phsn-sd8v-cbd4 | kernel: fs: don't misleadingly warn during thaw operations |
CVE-2024-42149
|
| VCID-qdje-kdeu-63ct | kernel: net: rswitch: Avoid use-after-free in rswitch_poll() |
CVE-2024-42108
|
| VCID-qk2m-qzes-qfhu | kernel: leds: an30259a: Use devm_mutex_init() for mutex initialization |
CVE-2024-42128
|
| VCID-qxth-4ftd-s3ac | kernel: media: mediatek: vcodec: Only free buffer VA that is not NULL |
CVE-2023-52888
|
| VCID-sabj-cszg-yqg6 | kernel: jffs2: Fix potential illegal address access in jffs2_free_inode |
CVE-2024-42115
|
| VCID-spaf-z2nd-jkcw | kernel: crypto: hisilicon/debugfs - Fix debugfs uninit process issue |
CVE-2024-42147
|
| VCID-stma-rnkr-c3ef | kernel: s390/pkey: Wipe copies of protected- and secure-keys |
CVE-2024-42155
|
| VCID-t88w-bjuz-5qc9 | kernel: net: dsa: mv88e6xxx: Correct check for empty list |
CVE-2024-42224
|
| VCID-tj5a-2jkt-tkde | kernel: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc |
CVE-2024-42228
|
| VCID-tp4y-rw9k-tyf7 | kernel: drm/lima: fix shared irq handling on driver remove |
CVE-2024-42127
|
| VCID-u9he-smjk-mfe4 | kernel: s390/pkey: Wipe sensitive data on failure |
CVE-2024-42157
|
| VCID-uq1v-xtyk-8kc8 | kernel: media: dvb-frontends: tda10048: Fix integer overflow |
CVE-2024-42223
|
| VCID-uvmf-963f-bkag | kernel: netfilter: nf_tables: unconditionally flush pending work before notifier |
CVE-2024-42109
|
| VCID-uxdh-8f6a-ayhp | kernel: thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data |
CVE-2024-42144
|
| VCID-vng1-dbwe-t3ep | kernel: Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again" |
CVE-2024-42102
|
| VCID-w6px-a9a1-1uh2 | kernel: tcp_metrics: validate source addr length |
CVE-2024-42154
|
| VCID-wbpu-dbk1-2bep | kernel: wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values |
CVE-2024-42114
|
| VCID-x2m2-25vm-h3c3 | kernel: i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr |
CVE-2024-42153
|
| VCID-yqyp-u4tu-ryca | kernel: drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf |
CVE-2024-42146
|
| VCID-z2v1-qy5j-q7ga | kernel: bnx2x: Fix multiple UBSAN array-index-out-of-bounds |
CVE-2024-42148
|
| VCID-z3qs-q6ce-aqbc | kernel: s390/pkey: Wipe copies of clear-key structures on failure |
CVE-2024-42156
|
| VCID-zdgm-ab2g-nkhc | kernel: riscv: kexec: Avoid deadlock in kexec crash path |
CVE-2024-42140
|
| VCID-zq46-ub7q-6faw | kernel: f2fs: check validation of fault attrs in f2fs_build_fault_attr() |
CVE-2024-42160
|