Search for packages
| purl | pkg:deb/debian/linux@6.1.133-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-15hy-7u3s-7yfq | kernel: drm/amd/display: Fix slab-use-after-free on hdcp_work |
CVE-2025-21968
|
| VCID-1rxn-nspd-3kh9 | kernel: drm/mediatek: Fix coverity issue with unintentional integer overflow |
CVE-2023-52857
|
| VCID-1zwy-1ej1-kfft | kernel: net: gso: fix ownership in __udp_gso_segment |
CVE-2025-21926
|
| VCID-225b-kkgg-nfa7 | kernel: drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl |
CVE-2025-21950
|
| VCID-2fck-ppsa-7bbh | kernel: acct: perform last write from workqueue |
CVE-2025-21846
|
| VCID-39fx-hdv6-vqdf | kernel: net/mlx5: Bridge, fix the crash caused by LAG state check |
CVE-2025-21970
|
| VCID-3cuj-d6qv-u7bw | kernel: drm/amd/display: Assign normalized_pix_clk when color depth = 14 |
CVE-2025-21956
|
| VCID-3hbn-g4qy-abea | kernel: soc: qcom: pdr: Fix the potential deadlock |
CVE-2025-22014
|
| VCID-4ahh-jy24-4bax | kernel: rapidio: add check for rio_add_net() in rio_scan_alloc_net() |
CVE-2025-21935
|
| VCID-4eyp-2kg5-fkgp | kernel: usb: typec: ucsi: Fix NULL pointer access |
CVE-2025-21918
|
| VCID-4f85-9h7n-kkby | kernel: wifi: cfg80211: regulatory: improve invalid hints checking |
CVE-2025-21910
|
| VCID-4g19-83u9-2udx | kernel: tracing: Fix bad hist from corrupting named_triggers list |
CVE-2025-21899
|
| VCID-4zpy-1e3e-7ygt | kernel: media: mediatek: vcodec: Handle invalid decoder vsi |
CVE-2024-43831
|
| VCID-55bw-q6vb-bffn | kernel: atm: Fix NULL pointer dereference |
CVE-2025-22018
|
| VCID-57ww-5dxf-y7e2 | kernel: vsock: Keep the binding until socket destruction |
CVE-2025-21756
|
| VCID-5g3u-eaqc-dbew | kernel: wifi: nl80211: reject cooked mode if it is set along with other flags |
CVE-2025-21909
|
| VCID-5m73-axnz-pban | kernel: ipvlan: ensure network headers are in skb linear part |
CVE-2025-21891
|
| VCID-63mk-csq7-kqed | kernel: ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw(). |
CVE-2025-22005
|
| VCID-666u-gbcg-c3h7 | kernel: net: switchdev: Convert blocking notification chain to a raw one |
CVE-2025-21986
|
| VCID-6za1-45fj-g3ej | kernel: media: uvcvideo: Remove dangling pointers |
CVE-2024-58002
|
| VCID-754t-s81c-jbc7 | kernel: HID: appleir: Fix potential NULL dereference at raw event handle |
CVE-2025-21948
|
| VCID-7gjp-jmwv-c3de | kernel: memcg: fix soft lockup in the OOM process |
CVE-2024-57977
|
| VCID-88vg-k7j9-pbdx | kernel: i2c: npcm: disable interrupt enable bit before devm_request_irq |
CVE-2025-21878
|
| VCID-89nx-rxch-97am | kernel: ASoC: ops: Consistently treat platform_max as control value |
CVE-2025-37889
|
| VCID-8juu-fmda-afdh | kernel: tee: optee: Fix supplicant wait loop |
CVE-2025-21871
|
| VCID-8vht-myyn-muaj | kernel: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() |
CVE-2025-21848
|
| VCID-8xfy-gjv2-w7hv | kernel: media: i2c: et8ek8: Don't strip remove function when driver is builtin |
CVE-2024-38611
|
| VCID-9165-q5n1-yycn | kernel: netfilter: allow exp not to be removed in nf_ct_find_expectation |
CVE-2023-52927
|
| VCID-9peq-a2w9-cbh8 | kernel: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected() |
CVE-2025-21936
|
| VCID-9pu9-gqtk-zkdj | kernel: scsi: qla1280: Fix kernel oops when debug level > 2 |
CVE-2025-21957
|
| VCID-a3pz-z3y5-2fcb | kernel: HID: ignore non-functional sensor in HP 5MP Camera |
CVE-2025-21992
|
| VCID-a8hd-q87b-sqej | kernel: caif_virtio: fix wrong pointer check in cfv_probe() |
CVE-2025-21904
|
| VCID-arnq-m294-hygb | kernel: leds: mlxreg: Use devm_mutex_init() for mutex initialization |
CVE-2024-42129
|
| VCID-asyn-jnwj-7uav | kernel: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c |
CVE-2024-50056
|
| VCID-b2zq-g3yx-z7bm | kernel: wifi: iwlwifi: mvm: ensure offloading TID queue exists |
CVE-2024-27056
|
| VCID-b4jp-8epx-sycm | kernel: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). |
CVE-2025-21865
|
| VCID-b5e7-9khv-bfhm | kernel: smb: client: fix potential UAF in cifs_dump_full_key() |
CVE-2024-35866
|
| VCID-b8hc-fdmm-dfex | kernel: ksmbd: fix type confusion via race condition when using ipc_msg_send_request |
CVE-2025-21947
|
| VCID-bbm4-ygwp-w3a1 | kernel: gpio: rcar: Use raw_spinlock to protect register access |
CVE-2025-21912
|
| VCID-c1dm-4vd7-kfb1 | kernel: RDMA/hns: Fix soft lockup during bt pages loop |
CVE-2025-22010
|
| VCID-c3z1-ngn9-eycs | kernel: drm/amdgpu: use-after-free vulnerability |
CVE-2024-26656
|
| VCID-cagg-3chu-vqbj | kernel: vlan: enforce underlying device type |
CVE-2025-21920
|
| VCID-cfh1-gaft-sqbs | kernel: gpio: aggregator: protect driver attr handlers against module unload |
CVE-2025-21943
|
| VCID-chvf-ktmf-pfht | kernel: slimbus: messaging: Free transaction ID in delayed interrupt scenario |
CVE-2025-21914
|
| VCID-d1vr-psec-ykb6 | kernel: drm/amd/display: fixed integer types and null check locations |
CVE-2024-26767
|
| VCID-dfhz-qgef-yyej | kernel: regulator: check that dummy regulator has been probed before using it |
CVE-2025-22008
|
| VCID-dk25-73pj-cqad | kernel: smb: client: Add check for next_buffer in receive_encrypted_standard() |
CVE-2025-21844
|
| VCID-dkn9-37zn-wucm | kernel: Bluetooth: Fix error code in chan_alloc_skb_cb() |
CVE-2025-22007
|
| VCID-dtfh-gzr1-v3eu | kernel: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() |
CVE-2025-21993
|
| VCID-eak7-czh2-vyfj | kernel: mptcp: always handle address removal under msk socket lock |
CVE-2025-21875
|
| VCID-ex22-2qp4-fke8 | kernel: net: atm: fix use after free in lec_send() |
CVE-2025-22004
|
| VCID-f23w-y5ph-d3ex | kernel: Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name() |
CVE-2025-21937
|
| VCID-feu7-9fry-4ubs | kernel: wifi: cfg80211: cancel wiphy_work before freeing wiphy |
CVE-2025-21979
|
| VCID-fs4d-n4e2-j3b5 | kernel: Squashfs: check the inode number is not the invalid value of zero |
CVE-2024-26982
|
| VCID-fuwt-q4d3-mbbw | kernel: x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range() |
CVE-2025-21913
|
| VCID-ghmv-y2s4-7fcp | kernel: drm/amd/display: Check denominator crb_pipes before used |
CVE-2024-46772
|
| VCID-hdx6-f6kv-s7gf | kernel: bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock |
CVE-2025-21951
|
| VCID-hext-8y1x-hkf3 | kernel: ksmbd: fix bug on trap in smb2_lock |
CVE-2025-21944
|
| VCID-j3a7-nvu5-kqda | kernel: ksmbd: fix use-after-free in smb2_lock |
CVE-2025-21945
|
| VCID-jfhr-2499-83ag | kernel: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC |
CVE-2025-21866
|
| VCID-m74c-j5a5-8ygw | kernel: netfilter: socket: Lookup orig tuple for IPv6 SNAT |
CVE-2025-22021
|
| VCID-majy-fwzb-4uez | kernel: drop_monitor: fix incorrect initialization order |
CVE-2025-21862
|
| VCID-mbg5-35me-pug8 | kernel: eth: bnxt: do not update checksum in bnxt_xdp_build_skb() |
CVE-2025-21960
|
| VCID-mds2-9cem-5fg4 | kernel: proc: fix UAF in proc_get_inode() |
CVE-2025-21999
|
| VCID-meq5-pftb-y3d1 | kernel: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() |
CVE-2025-21867
|
| VCID-merm-72uz-vbgk | kernel: Race condition in lpfc_unregister_fcf_rescan() in scsi/lpfc/lpfc_hbadisc.c |
CVE-2024-24855
|
| VCID-mq6v-tfg7-hben | kernel: nilfs2: handle errors that nilfs_prepare_chunk() may return |
CVE-2025-21721
|
| VCID-mun9-22yj-eqbf | kernel: media: mtk-vcodec: potential null pointer deference in SCP |
CVE-2024-40973
|
| VCID-n2m1-pw4d-sqbz | kernel: tpm: Change to kvalloc() in eventlog/acpi.c |
CVE-2024-58005
|
| VCID-n6zy-gwsy-d3en | kernel: geneve: Fix use-after-free in geneve_find_dev(). |
CVE-2025-21858
|
| VCID-nkgt-d94r-9fb4 | kernel: ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up |
CVE-2025-21887
|
| VCID-p9py-ngdp-3feh | kernel: md/md-bitmap: Synchronize bitmap_get_stats() with bitmap lifetime |
CVE-2025-21712
|
| VCID-pc2d-n2v8-13f4 | kernel: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove |
CVE-2025-22020
|
| VCID-pdgf-mzr7-k3bq | kernel: usb: atm: cxacru: fix a flaw in existing endpoint checks |
CVE-2025-21916
|
| VCID-pfz3-8v4w-zkbx | kernel: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list |
CVE-2025-21919
|
| VCID-pn8n-sdus-57ct | kernel: ftrace: Avoid potential division by zero in function_stat_show() |
CVE-2025-21898
|
| VCID-q4rs-2237-g7gj | kernel: ice: fix memory leak in aRFS after reset |
CVE-2025-21981
|
| VCID-q5s8-uf9p-w7hv | kernel: wifi: iwlwifi: limit printed string from FW file |
CVE-2025-21905
|
| VCID-qfs4-nvav-gye2 | kernel: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes |
CVE-2025-21991
|
| VCID-qnhm-du7g-bqb1 | kernel: xsk: fix an integer overflow in xp_create_and_assign_umem() |
CVE-2025-21997
|
| VCID-qt2g-3cyh-3bbc | kernel: uprobes: Reject the shared zeropage in uprobe_write_opcode() |
CVE-2025-21881
|
| VCID-qwkz-yyh6-zybq | kernel: mptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr |
CVE-2025-21938
|
| VCID-r825-ahke-13cv | kernel: media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning |
CVE-2024-47753
|
| VCID-r8b4-t9fq-hygf | kernel: ksmbd: fix incorrect validation for num_aces field of smb_acl |
CVE-2025-21994
|
| VCID-r8h4-cj9c-r7f4 | kernel: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() |
CVE-2025-21928
|
| VCID-rb9x-wetu-vfgj | kernel: net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error |
CVE-2025-21924
|
| VCID-rm9y-dg1r-53fg | kernel: USB: gadget: f_midi: f_midi_complete to call queue_work |
CVE-2025-21859
|
| VCID-rmbp-bnk7-7ffk | kernel: usb: gadget: core: flush gadget workqueue after device removal |
CVE-2025-21838
|
| VCID-rmed-h9f8-xfe5 | kernel: tcp: drop secpath at the same time as we currently drop dst |
CVE-2025-21864
|
| VCID-rph2-j8pr-qbfj | kernel: ibmvnic: Don't reference skb after sending to VIOS |
CVE-2025-21855
|
| VCID-rwbc-c9p4-77ek | kernel: net/mlx5: handle errors in mlx5_chains_create_table() |
CVE-2025-21975
|
| VCID-s4fw-1c1b-kqcx | kernel: mm/migrate: fix shmem xarray update during migration |
CVE-2025-22015
|
| VCID-s4mb-5w9t-y7e4 | kernel: drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() |
CVE-2025-21996
|
| VCID-sx8c-2btf-d3ag | kernel: sched/core: Prevent rescheduling when interrupts are disabled |
CVE-2024-58090
|
| VCID-t6bd-fphy-7yfg | kernel: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 |
CVE-2025-21702
|
| VCID-tpga-cnnq-syfb | kernel: drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params |
CVE-2025-21941
|
| VCID-tq2a-cuc2-37h4 | kernel: net_sched: Prevent creation of classes with TC_H_ROOT |
CVE-2025-21971
|
| VCID-ty4y-cv6r-fyh6 | kernel: usb: renesas_usbhs: Flush the notify_hotplug_work |
CVE-2025-21917
|
| VCID-unhb-b1bj-2yex | kernel: media: uvcvideo: Fix crash during unbind if gpio unit is in use |
CVE-2024-58079
|
| VCID-v3yq-pmyj-uueb | kernel: usbnet: gl620a: fix endpoint checking in genelink_bind() |
CVE-2025-21877
|
| VCID-vgrw-6by1-zya8 | kernel: llc: do not use skb_get() before dev_queue_xmit() |
CVE-2025-21925
|
| VCID-vu73-rhmm-kbas | kernel: ppp: Fix KMSAN uninit-value warning with bpf |
CVE-2025-21922
|
| VCID-vym6-gaeq-2yau | kernel: netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() |
CVE-2025-21959
|
| VCID-wmaw-wmnn-skga | kernel: drm/hyperv: Fix address space leak when Hyper-V DRM device is removed |
CVE-2025-21978
|
| VCID-wmsh-ubhc-b3hh | kernel: block, bfq: fix bfqq uaf in bfq_limit_depth() |
CVE-2024-53166
|
| VCID-wtzx-3r1f-r3e4 | kernel: fs/ntfs3: Add rough attr alloc_size check |
CVE-2024-50246
|
| VCID-xaj7-9xgc-5fex | kernel: rapidio: fix an API misues when rio_add_net() fails |
CVE-2025-21934
|
| VCID-xdqq-axjf-eya1 | kernel: cifs: Fix integer overflow while processing closetimeo mount option |
CVE-2025-21962
|
| VCID-xs34-gdke-87es | kernel: sched: address a potential NULL pointer dereference in the GRED scheduler. |
CVE-2025-21980
|
| VCID-ynvw-rxsc-u7b9 | kernel: media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning |
CVE-2024-47754
|
| VCID-yta5-xtpu-t3g7 | kernel: cifs: Fix integer overflow while processing acregmax mount option |
CVE-2025-21964
|
| VCID-zkrz-hqkm-5fe3 | kernel: cifs: Fix integer overflow while processing acdirmax mount option |
CVE-2025-21963
|