Search for packages
| purl | pkg:deb/debian/linux@6.1.129-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1buh-fk6e-r7h1 | kernel: NFSD: fix hang in nfsd4_shutdown_callback |
CVE-2025-21795
|
| VCID-1e2r-rme5-7kbv | kernel: usb: xhci: Fix NULL pointer dereference on certain command aborts |
CVE-2024-57981
|
| VCID-1fzp-8eyv-e7b1 | kernel: net: mana: Fix possible double free in error handling path |
CVE-2024-42069
|
| VCID-1gq3-szyf-rkgv | kernel: ipmi: ipmb: Add check devm_kasprintf() returned value |
CVE-2024-58051
|
| VCID-1kag-8p92-57dv | kernel: NFC: nci: Add bounds checking in nci_hci_create_pipe() |
CVE-2025-21735
|
| VCID-1nfh-f5sm-s7e6 | kernel: smb: client: fix oops due to unset link speed |
CVE-2025-21725
|
| VCID-1ses-vfm3-33bb | kernel: mptcp: consolidate suboption status |
CVE-2025-21707
|
| VCID-1vbv-5m6c-wfac | kernel: nilfs2: fix possible int overflows in nilfs_fiemap() |
CVE-2025-21736
|
| VCID-27tf-w55m-97gh | kernel: net_sched: sch_sfq: don't allow 1 packet limit |
CVE-2024-57996
|
| VCID-2kud-6ebm-dkb2 | kernel: arp: use RCU protection in arp_xmit() |
CVE-2025-21762
|
| VCID-2prt-1t8q-bycy | kernel: media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread |
CVE-2024-57834
|
| VCID-335t-a8rv-6beq | kernel: mptcp: handle fastopen disconnect correctly |
CVE-2025-21705
|
| VCID-49j4-4br3-cyab | kernel: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context |
CVE-2025-21767
|
| VCID-4c8k-9yrr-uub9 | kernel: wifi: brcmfmac: Check the return value of of_property_read_string_index() |
CVE-2025-21750
|
| VCID-4cf1-avkf-hbdg | kernel: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns() |
CVE-2025-21799
|
| VCID-4d15-g5v5-xbat | kernel: ocfs2: handle a symlink read error correctly |
CVE-2024-58001
|
| VCID-4e1v-wjw2-uudw | kernel: safesetid: check size of policy writes |
CVE-2024-58016
|
| VCID-4ecp-rvas-hffw | kernel: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read |
CVE-2024-58069
|
| VCID-63uy-k87j-67bw | kernel: ptp: Ensure info->enable callback is always set |
CVE-2025-21814
|
| VCID-64nd-yud7-wqev | kernel: ndisc: use RCU protection in ndisc_alloc_skb() |
CVE-2025-21764
|
| VCID-6wcw-smmg-tbbd | kernel: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized |
CVE-2024-58068
|
| VCID-6wt5-j8kf-w7ax | kernel: usb: gadget: f_tcm: Don't free command immediately |
CVE-2024-58055
|
| VCID-76f2-7gkv-wkgu | kernel: usb: gadget: f_midi: fix MIDI Streaming descriptor lengths |
CVE-2025-21835
|
| VCID-78uw-vnk9-hugx | kernel: vxlan: Fix uninit-value in vxlan_vnifilter_dump() |
CVE-2025-21716
|
| VCID-7xmv-tq2w-tyhn | kernel: mptcp: pm: only set fullmesh for subflow endp |
CVE-2025-21706
|
| VCID-82kc-vuvj-ffau | kernel: can: ctucanfd: handle skb allocation failure |
CVE-2025-21775
|
| VCID-84q5-3yq6-dubg | kernel: net: davicom: fix UAF in dm9000_drv_remove |
CVE-2025-21715
|
| VCID-8n6c-d6p3-2kad | kernel: wifi: rtlwifi: remove unused check_buddy_priv |
CVE-2024-58072
|
| VCID-8zbq-4cxk-wkej | kernel: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync |
CVE-2024-58013
|
| VCID-8zf2-xe9p-7kb1 | kernel: padata: fix UAF in padata_reorder |
CVE-2025-21727
|
| VCID-9fkj-rjq9-rydn | kernel: f2fs: fix to wait dio completion |
CVE-2024-47726
|
| VCID-9gzx-uqjk-jbcn | kernel: batman-adv: fix panic during interface removal |
CVE-2025-21781
|
| VCID-9mns-bs5c-5ydk | kernel: remoteproc: core: Fix ida_free call while not allocated |
CVE-2024-58056
|
| VCID-9ruf-ttxw-2fa5 | kernel: ipmr: do not call mr_mfc_uses_dev() for unres entries |
CVE-2025-21719
|
| VCID-a5vr-pztj-qyfr | kernel: blk-cgroup: Fix class @block_class's subsystem refcount leakage |
CVE-2025-21745
|
| VCID-aeed-k74z-67g3 | kernel: net: avoid race between device unregistration and ethnl ops |
CVE-2025-21701
|
| VCID-aqmq-mvvg-uqde | kernel: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition |
CVE-2024-50061
|
| VCID-auub-amxt-43bv | kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array |
CVE-2025-21785
|
| VCID-axqu-5cnr-aqbd | kernel: wifi: wcn36xx: fix channel survey memory allocation size |
CVE-2024-57997
|
| VCID-bad9-4wfn-4ueu | kernel: ndisc: extend RCU protection in ndisc_send_skb() |
CVE-2025-21760
|
| VCID-bfte-3vt5-pfab | kernel: Linux kernel: usb: cdc-acm: Memory corruption due to improper buffer size check |
CVE-2025-21704
|
| VCID-bp5v-gncn-mqfa | kernel: nfsd: clear acl_access/acl_default after releasing them |
CVE-2025-21796
|
| VCID-c4f3-gpea-23dc | kernel: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table |
CVE-2024-58052
|
| VCID-cajd-2gva-7qgu | kernel: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() |
CVE-2025-21744
|
| VCID-cap6-uxkj-93ey | kernel: drm/amd/display: Add NULL pointer check for kzalloc |
CVE-2024-42122
|
| VCID-caxt-hj98-8keb | kernel: io_uring: fix io_req_prep_async with provided buffers |
CVE-2025-40364
|
| VCID-cb6r-zf3v-e7gn | kernel: net: hns3: fix oops when unload drivers paralleling |
CVE-2025-21802
|
| VCID-ckhd-y6cb-e7dp | kernel: wifi: rtlwifi: fix memory leaks and invalid access at probe error path |
CVE-2024-58063
|
| VCID-d5ny-6ttq-1yhx | kernel: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel |
CVE-2025-21779
|
| VCID-edgj-jkju-6bem | kernel: drm/v3d: Stop active perfmon if it is being destroyed |
CVE-2024-58086
|
| VCID-es4u-n31d-wkfm | kernel: pps: Fix a use-after-free |
CVE-2024-57979
|
| VCID-eseh-574w-q7gs | kernel: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() |
CVE-2025-21703
|
| VCID-ezm4-88sz-j3g9 | kernel: team: better TEAM_OPTION_TYPE_STRING validation |
CVE-2025-21787
|
| VCID-ff1r-6u62-qqbu | kernel: Revert "drm/amd/display: Use HW lock mgr for PSR1" |
CVE-2025-21819
|
| VCID-fju4-ff8a-4bbr | kernel: PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() |
CVE-2025-21804
|
| VCID-fkkg-xkz7-kqbs | kernel: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check |
CVE-2024-57993
|
| VCID-g3hp-19dp-xub2 | kernel: wifi: mac80211: prohibit deactivating all links |
CVE-2024-58061
|
| VCID-gfe9-6z46-f7hs | kernel: nilfs2: do not force clear folio if buffer is referenced |
CVE-2025-21722
|
| VCID-ggtv-a2tt-63g6 | kernel: media: imx-jpeg: Fix potential error pointer dereference in detach_pm() |
CVE-2024-57978
|
| VCID-gq9s-2ns7-a7cx | kernel: staging: media: max96712: fix kernel oops when removing module |
CVE-2024-58054
|
| VCID-gybh-2c8v-jygh | kernel: landlock: Handle weird files |
CVE-2025-21830
|
| VCID-h3sy-9k3r-sug4 | kernel: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() |
CVE-2025-21761
|
| VCID-h6dz-5pmy-mqhn | kernel: partitions: mac: fix handling of bogus partition table |
CVE-2025-21772
|
| VCID-ha2q-kr93-e7az | kernel: net: sched: Disallow replacing of child qdisc from one parent to another |
CVE-2025-21700
|
| VCID-hah2-fv7s-s7ay | kernel: ata: libata-sff: Ensure that we cannot write outside the allocated buffer |
CVE-2025-21738
|
| VCID-hjgh-pbhw-d3bm | kernel: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt |
CVE-2025-21792
|
| VCID-hq3g-bdce-uydf | kernel: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() |
CVE-2024-58083
|
| VCID-j8zw-bw5u-tbg4 | kernel: net: mana: Fix RX buf alloc_size alignment and atomic op panic |
CVE-2024-45001
|
| VCID-jdy5-6s2h-d7ad | kernel: neighbour: use RCU protection in __neigh_notify() |
CVE-2025-21763
|
| VCID-jfna-rgzb-v3ad | kernel: vxlan: check vxlan_vnigroup_init() return value |
CVE-2025-21790
|
| VCID-jguq-h5se-q3fs | kernel: fbdev: omap: use threaded IRQ for LCD DMA |
CVE-2025-21821
|
| VCID-jme4-kexy-v3fw | kernel: memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() |
CVE-2024-58034
|
| VCID-jwwm-wmzm-wuaz | kernel: net: let net.core.dev_weight always be non-zero |
CVE-2025-21806
|
| VCID-k9j1-f4eq-yufh | kernel: ksmbd: fix integer overflows on 32 bit systems |
CVE-2025-21748
|
| VCID-kc2h-81ye-mfdk | kernel: drm/amd/display: fix double free issue during amdgpu module unload |
CVE-2024-49989
|
| VCID-km8c-x3g5-fkhb | kernel: team: prevent adding a device which is already a team device lower |
CVE-2024-58071
|
| VCID-kx41-d7dc-vqdk | kernel: Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc |
CVE-2024-58009
|
| VCID-kzc2-uaxs-f7an | kernel: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() |
CVE-2025-21780
|
| VCID-mgk4-pwpy-zbhg | kernel: scsi: ufs: bsg: Set bsg_queue to NULL after removal |
CVE-2024-54458
|
| VCID-mmn7-wx55-cybj | kernel: net: rose: lock the socket in rose_bind() |
CVE-2025-21749
|
| VCID-mxk2-r3bg-gkfd | kernel: ax25: rcu protect dev->ax25_ptr |
CVE-2025-21812
|
| VCID-mz34-5n9x-mke4 | kernel: printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX |
CVE-2024-58017
|
| VCID-n1q7-m5wp-2khh | kernel: binfmt_flat: Fix integer overflow bug on 32 bit systems |
CVE-2024-58010
|
| VCID-n5mn-zb6b-h3h8 | kernel: padata: avoid UAF for reorder_work |
CVE-2025-21726
|
| VCID-nx8k-p4wr-nkge | kernel: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections |
CVE-2024-57986
|
| VCID-p4fx-yvs4-37hq | kernel: ipv6: mcast: add RCU protection to mld_newpack() |
CVE-2025-21758
|
| VCID-peam-hpha-p7f2 | kernel: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() |
CVE-2024-58014
|
| VCID-pfjc-p4kx-s3ej | kernel: soc: qcom: socinfo: Avoid out of bounds read of serial number |
CVE-2024-58007
|
| VCID-pwt4-em7t-4qfb | kernel: USB: hub: Ignore non-compliant devices with too many configs or interfaces |
CVE-2025-21776
|
| VCID-qhw2-rvza-tyas | kernel: bpf: Send signals asynchronously if !preemptible |
CVE-2025-21728
|
| VCID-qsks-znaz-bbh7 | kernel: clk: qcom: dispcc-sm6350: Add missing parent_map for a clock |
CVE-2024-58080
|
| VCID-quzd-ynfb-eqcc | kernel: nbd: don't allow reconnect after disconnect |
CVE-2025-21731
|
| VCID-s1s6-ekvg-yuer | kernel: vrf: use RCU protection in l3mdev_l3_out() |
CVE-2025-21791
|
| VCID-s6vz-c2gs-nfax | kernel: net: usb: rtl8150: enable basic endpoint checking |
CVE-2025-21708
|
| VCID-s7t6-1g6a-jkfg | kernel: iommu: Return right value in iommu_sva_bind_device() |
CVE-2024-40945
|
| VCID-sfzt-9fyh-sqgg | kernel: tomoyo: don't emit warning in tomoyo_write_control() |
CVE-2024-58085
|
| VCID-sw22-xvt9-zfev | kernel: HID: multitouch: Add NULL check in mt_input_configured |
CVE-2024-58020
|
| VCID-tjzs-ktu1-kugh | In the Linux kernel, the following vulnerability has been resolved: net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events After the blamed commit, we started doing this dereference for every NETDEV_CHANGEUPPER and NETDEV_PRECHANGEUPPER event in the system. static inline struct dsa_port *dsa_user_to_port(const struct net_device *dev) { struct dsa_user_priv *p = netdev_priv(dev); return p->dp; } Which is obviously bogus, because not all net_devices have a netdev_priv() of type struct dsa_user_priv. But struct dsa_user_priv is fairly small, and p->dp means dereferencing 8 bytes starting with offset 16. Most drivers allocate that much private memory anyway, making our access not fault, and we discard the bogus data quickly afterwards, so this wasn't caught. But the dummy interface is somewhat special in that it calls alloc_netdev() with a priv size of 0. So every netdev_priv() dereference is invalid, and we get this when we emit a NETDEV_PRECHANGEUPPER event with a VLAN as its new upper: $ ip link add dummy1 type dummy $ ip link add link dummy1 name dummy1.100 type vlan id 100 [ 43.309174] ================================================================== [ 43.316456] BUG: KASAN: slab-out-of-bounds in dsa_user_prechangeupper+0x30/0xe8 [ 43.323835] Read of size 8 at addr ffff3f86481d2990 by task ip/374 [ 43.330058] [ 43.342436] Call trace: [ 43.366542] dsa_user_prechangeupper+0x30/0xe8 [ 43.371024] dsa_user_netdevice_event+0xb38/0xee8 [ 43.375768] notifier_call_chain+0xa4/0x210 [ 43.379985] raw_notifier_call_chain+0x24/0x38 [ 43.384464] __netdev_upper_dev_link+0x3ec/0x5d8 [ 43.389120] netdev_upper_dev_link+0x70/0xa8 [ 43.393424] register_vlan_dev+0x1bc/0x310 [ 43.397554] vlan_newlink+0x210/0x248 [ 43.401247] rtnl_newlink+0x9fc/0xe30 [ 43.404942] rtnetlink_rcv_msg+0x378/0x580 Avoid the kernel oops by dereferencing after the type check, as customary. |
CVE-2024-26596
|
| VCID-txxg-66tt-tqeb | kernel: batman-adv: Drop unmanaged ELP metric worker |
CVE-2025-21823
|
| VCID-v5j9-r143-y7ad | kernel: orangefs: fix a oob in orangefs_debug_write |
CVE-2025-21782
|
| VCID-vhzm-pckx-57hd | kernel: clk: qcom: gcc-sm6350: Add missing parent_map for two clocks |
CVE-2024-58076
|
| VCID-vk6y-53us-13gy | kernel: net: rose: fix timer races against user threads |
CVE-2025-21718
|
| VCID-vmq8-67gh-cuds | kernel: ubifs: skip dumping tnc tree when zroot is null |
CVE-2024-58058
|
| VCID-w49v-mffu-3kfa | kernel: tty: xilinx_uartps: split sysrq handling |
CVE-2025-21820
|
| VCID-wewh-148s-6uhf | kernel: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" |
CVE-2025-21829
|
| VCID-wndk-9krb-yqcb | kernel: media: uvcvideo: Fix double free in error path |
CVE-2024-57980
|
| VCID-wwn8-zp2y-ykep | kernel: rdma/cxgb4: Prevent potential integer overflow on 32bit |
CVE-2024-57973
|
| VCID-x1bj-cdaa-t7e4 | kernel: platform/x86: int3472: Check for adev == NULL |
CVE-2024-58011
|
| VCID-xfue-w5hk-xuf3 | kernel: gpio: xilinx: Convert gpio_lock to raw spinlock |
CVE-2025-21684
|
| VCID-xs1y-xj8y-bkce | kernel: nilfs2: protect access to buffers with no active references |
CVE-2025-21811
|
| VCID-xvp8-qbsn-wuh5 | kernel: btrfs: fix use-after-free when attempting to join an aborted transaction |
CVE-2025-21753
|
| VCID-y57x-bth8-qbfd | kernel: net/rose: prevent integer overflows in rose_setsockopt() |
CVE-2025-21711
|
| VCID-y5eg-tvca-vkgu | kernel: ipv6: use RCU protection in ip6_default_advmss() |
CVE-2025-21765
|
| VCID-yxk4-r73z-x3a9 | kernel: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() |
CVE-2025-21794
|
| VCID-z15u-5t11-3ybu | kernel: cachefiles: Fix NULL pointer dereference in object->file |
CVE-2024-56549
|
| VCID-z2vb-4xtt-w7f1 | kernel: ipv4: use RCU protection in __ip_rt_update_pmtu() |
CVE-2025-21766
|
| VCID-z82r-7nhr-tqds | kernel: block: don't revert iter for -EIOCBQUEUED |
CVE-2025-21832
|
| VCID-zn65-b5y7-j7ez | kernel: OPP: add index check to assert to avoid buffer overflow in _read_freq() |
CVE-2024-57998
|
| VCID-zvgb-kf4f-gye2 | kernel: Linux kernel: iommufd/iova_bitmap shift-out-of-bounds vulnerability |
CVE-2025-21724
|
| VCID-zvze-vhq4-rfdu | kernel: misc: fastrpc: Fix copy buffer page size |
CVE-2025-21734
|
| VCID-zzcb-yr5v-efg7 | kernel: netfilter: nf_tables: reject mismatching sum of field_len with set key length |
CVE-2025-21826
|