Search for packages
| purl | pkg:deb/debian/linux@6.1.128-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-39d9-jmr4-cbfz | kernel: block: fix integer overflow in BLKSECDISCARD |
CVE-2024-49994
|
| VCID-3aek-a993-fyfj | kernel: exfat: fix the infinite loop in exfat_readdir() |
CVE-2024-57940
|
| VCID-3g8h-ez8d-f7c1 | kernel: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' |
CVE-2024-56608
|
| VCID-4eh7-3sd5-d7fk | kernel: net/mlx5: Fix variable not being completed when function returns |
CVE-2025-21662
|
| VCID-4k1b-g64y-43eg | kernel: smb: client: fix UAF in async decryption |
CVE-2024-50047
|
| VCID-4rmz-83um-xuhw | kernel: misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling |
CVE-2024-57916
|
| VCID-5cqt-xrmh-e7ep | kernel: ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked |
CVE-2025-21660
|
| VCID-5xru-w7m9-6ydz | kernel: iio: adc: at91: call input_free_device() on allocated iio_dev |
CVE-2024-57904
|
| VCID-63hp-7jta-2kaq | kernel: bpf: Fix bpf_sk_select_reuseport() memory leak |
CVE-2025-21683
|
| VCID-64aj-2prh-vbc3 | kernel: hrtimers: Handle CPU state correctly on hotplug |
CVE-2024-57951
|
| VCID-7hfz-23v7-tbbg | kernel: iomap: avoid avoid truncating 64-bit offset to 32 bits |
CVE-2025-21667
|
| VCID-7je3-ux9n-5uhu | kernel: pktgen: Avoid out-of-bounds access in get_imix_entries |
CVE-2025-21680
|
| VCID-7pt1-8s9n-k3dh | kernel: openvswitch: fix lockup on tx to unregistering netdev with carrier |
CVE-2025-21681
|
| VCID-7v4d-mrh9-hfah | kernel: ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find() |
CVE-2024-50304
|
| VCID-886c-effz-qfcu | kernel: iio: pressure: zpa2326: fix information leak in triggered buffer |
CVE-2024-57912
|
| VCID-9f2m-pngc-jyf1 | kernel: erofs: handle NONHEAD !delta[1] lclusters gracefully |
CVE-2024-53234
|
| VCID-9f8v-t81g-s3g2 | kernel: net/mlx5: Clear port select structure when fail to create |
CVE-2025-21675
|
| VCID-9wrj-4ar3-6qh7 | kernel: iio: adc: rockchip_saradc: fix information leak in triggered buffer |
CVE-2024-57907
|
| VCID-a4cg-mjqd-qqcs | kernel: USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb() |
CVE-2025-21689
|
| VCID-apkv-yj4f-yubb | kernel: drm/amdgpu: fix usage slab after free |
CVE-2024-56551
|
| VCID-avpg-jad9-7uhy | kernel: netfilter: conntrack: clamp maximum hashtable size to INT_MAX |
CVE-2025-21648
|
| VCID-ayd4-2n7n-kkcc | kernel: ceph: give up on paths longer than PATH_MAX |
CVE-2024-53685
|
| VCID-bbdg-m16m-nubu | kernel: dm array: fix releasing a faulty array block twice in dm_array_cursor_end |
CVE-2024-57929
|
| VCID-bbnt-p8e4-63c7 | kernel: drm/v3d: Ensure job pointer is set to NULL after job completion |
CVE-2025-21697
|
| VCID-bpsp-ef22-c7c3 | kernel: ipv6: Fix soft lockups in fib6_select_path under high next hop churn |
CVE-2024-56703
|
| VCID-d2zp-q8zz-u3b2 | kernel: sched: sch_cake: add bounds checks to host bulk flow fairness counts |
CVE-2025-21647
|
| VCID-djgy-muty-mygk | kernel: gpiolib: cdev: Fix use after free in lineinfo_changed_notify |
CVE-2024-36899
|
| VCID-dq4x-ybg5-53fh | kernel: net: fix data-races around sk->sk_forward_alloc |
CVE-2024-53124
|
| VCID-e6vj-e821-s7ba | kernel: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period |
CVE-2025-21655
|
| VCID-em4y-ggvw-6bc3 | kernel: RDMA/rxe: Fix the qp flush warnings in req |
CVE-2024-53229
|
| VCID-femt-rtxa-e7e3 | kernel: dm thin: make get_first_thin use rcu-safe list first function |
CVE-2025-21664
|
| VCID-fnzx-7hvu-eybh | kernel: sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers |
CVE-2024-53128
|
| VCID-gb9d-fjxt-z7ht | kernel: fs/proc: fix softlockup in __read_vmcore (part 2) |
CVE-2025-21694
|
| VCID-gqe8-fs68-9ygb | kernel: drm/v3d: Assign job pointer to NULL before signaling the fence |
CVE-2025-21688
|
| VCID-hjfx-vv5v-ykgu | kernel: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer |
CVE-2024-57911
|
| VCID-hrfs-afba-23d3 | kernel: afs: Fix the maximum cell name length |
CVE-2025-21646
|
| VCID-ht4h-61mg-f3h8 | In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, but that would increase the size of this fix, while 'sctp.ctl_sock' still needs to be retrieved from 'net' structure. |
CVE-2025-21637
|
| VCID-ht91-mhhg-63e1 | kernel: ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv |
CVE-2024-57892
|
| VCID-j7k2-2c5y-gkgt | kernel: topology: Keep the cpumask unchanged when printing cpumap |
CVE-2024-57917
|
| VCID-jta8-3kg4-8yce | kernel: mac802154: check local interfaces before deleting sdata list |
CVE-2024-57948
|
| VCID-keev-3t7r-dkh6 | kernel: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() |
CVE-2025-21631
|
| VCID-kmmf-ztaw-bkay | kernel: sctp: sysctl: rto_min/max: avoid using current->nsproxy |
CVE-2025-21639
|
| VCID-mnrs-3agf-kbbr | kernel: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind |
CVE-2024-57913
|
| VCID-mya7-e979-qbf4 | kernel: block: fix uaf for flush rq while iterating tags |
CVE-2024-53170
|
| VCID-n6b8-zfkd-efbc | kernel: ksmbd: fix a missing return value check bug |
CVE-2024-57925
|
| VCID-nama-uedh-b3fg | kernel: sctp: sysctl: auth_enable: avoid using current->nsproxy |
CVE-2025-21638
|
| VCID-p5hd-8v22-rkfb | kernel: zram: fix potential UAF of zram table |
CVE-2025-21671
|
| VCID-pzrw-u1qz-f3fz | kernel: bpf: Fix overloading of MEM_UNINIT's meaning |
CVE-2024-50164
|
| VCID-q682-t17w-kyhz | kernel: iio: imu: kmx61: fix information leak in triggered buffer |
CVE-2024-57908
|
| VCID-qqpd-3f4k-yyes | kernel: vsock/virtio: discard packets if the transport changes |
CVE-2025-21669
|
| VCID-rdyx-hae6-vbbn | kernel: gtp: Destroy device along with udp socket's netns dismantle. |
CVE-2025-21678
|
| VCID-rsgj-h179-h3cp | kernel: pmdomain: imx8mp-blk-ctrl: add missing loop break condition |
CVE-2025-21668
|
| VCID-sn9p-gz99-afhz | kernel: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag |
CVE-2025-21699
|
| VCID-ssqx-mgpz-97cd | kernel: drm/amd/display: Add check for granularity in dml ceil/floor helpers |
CVE-2024-57922
|
| VCID-t8m1-asz6-syde | kernel: scsi: sg: Fix slab-use-after-free read in sg_release() |
CVE-2024-56631
|
| VCID-tazf-mdxg-bfc2 | kernel: filemap: avoid truncating 64-bit offset to 32 bits |
CVE-2025-21665
|
| VCID-ut94-aj7k-mbbp | kernel: irqchip/gic-v3-its: Don't enable interrupts in its_irq_set_vcpu_affinity() |
CVE-2024-57949
|
| VCID-vtud-2g7y-p7gt | kernel: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy |
CVE-2025-21640
|
| VCID-w32w-1p9x-77dk | kernel: wifi: ath10k: avoid NULL pointer error during sdio remove |
CVE-2024-56599
|
| VCID-w6e2-1eqn-s3f7 | kernel: iio: light: vcnl4035: fix information leak in triggered buffer |
CVE-2024-57910
|
| VCID-x2wa-qayz-d7h9 | kernel: vfio/platform: check the bounds of read/write syscalls |
CVE-2025-21687
|
| VCID-x9st-jeqc-7ucj | kernel: net: sched: fix ets qdisc OOB Indexing |
CVE-2025-21692
|
| VCID-xc2d-up5t-23eh | kernel: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy |
CVE-2025-21636
|
| VCID-xd5n-h33h-xfa5 | kernel: riscv: Fix sleeping in invalid context in die() |
CVE-2024-57939
|
| VCID-yh4d-1zzw-u7dc | kernel: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service |
CVE-2025-21690
|
| VCID-ykfs-a9uu-mkaw | kernel: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() |
CVE-2024-57887
|
| VCID-yymx-am61-b3h9 | kernel: bpf, sockmap: Fix race between element replace and close() |
CVE-2024-56664
|
| VCID-z449-wes7-mbfp | kernel: vsock: prevent null-ptr-deref in vsock_*[has_data|has_space] |
CVE-2025-21666
|
| VCID-zmch-s95m-gua2 | kernel: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute |
CVE-2025-21653
|
| VCID-zyeq-zp8w-zfba | kernel: iio: adc: ti-ads8688: fix information leak in triggered buffer |
CVE-2024-57906
|