Search for packages
| purl | pkg:deb/debian/linux@6.12.10-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-11na-sssg-fqbj | kernel: exfat: fix the new buffer was not zeroed before writing |
CVE-2024-57943
|
| VCID-3aek-a993-fyfj | kernel: exfat: fix the infinite loop in exfat_readdir() |
CVE-2024-57940
|
| VCID-3x54-1ua8-muam | kernel: drm/amd/display: fix page fault due to max surface definition mismatch |
CVE-2024-57918
|
| VCID-4eh7-3sd5-d7fk | kernel: net/mlx5: Fix variable not being completed when function returns |
CVE-2025-21662
|
| VCID-4k6c-ft16-5uaw | kernel: nfs: Fix oops in nfs_netfs_init_request() when copying to cache |
CVE-2024-57927
|
| VCID-4rmz-83um-xuhw | kernel: misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling |
CVE-2024-57916
|
| VCID-5cqt-xrmh-e7ep | kernel: ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked |
CVE-2025-21660
|
| VCID-5xru-w7m9-6ydz | kernel: iio: adc: at91: call input_free_device() on allocated iio_dev |
CVE-2024-57904
|
| VCID-5znz-86rb-j7h5 | kernel: mptcp: sysctl: blackhole timeout: avoid using current->nsproxy |
CVE-2025-21641
|
| VCID-666e-j59y-4kes | kernel: drm/amd/display: fix divide error in DM plane scale calcs |
CVE-2024-57919
|
| VCID-87n9-7qc9-k3g5 | kernel: net: stmmac: dwmac-tegra: Read iommu stream id from device tree |
CVE-2025-21663
|
| VCID-886c-effz-qfcu | kernel: iio: pressure: zpa2326: fix information leak in triggered buffer |
CVE-2024-57912
|
| VCID-8ftg-ncyk-wbg5 | kernel: iio: light: bh1745: fix information leak in triggered buffer |
CVE-2024-57909
|
| VCID-8q5e-qfej-wubt | kernel: riscv: mm: Fix the out of bound issue of vmemmap address |
CVE-2024-57945
|
| VCID-9wrj-4ar3-6qh7 | kernel: iio: adc: rockchip_saradc: fix information leak in triggered buffer |
CVE-2024-57907
|
| VCID-avpg-jad9-7uhy | kernel: netfilter: conntrack: clamp maximum hashtable size to INT_MAX |
CVE-2025-21648
|
| VCID-bbdg-m16m-nubu | kernel: dm array: fix releasing a faulty array block twice in dm_array_cursor_end |
CVE-2024-57929
|
| VCID-bens-aw9k-xka2 | kernel: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy |
CVE-2025-21635
|
| VCID-c8xs-q7hr-uua8 | kernel: hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur |
CVE-2025-21656
|
| VCID-d2zp-q8zz-u3b2 | kernel: sched: sch_cake: add bounds checks to host bulk flow fairness counts |
CVE-2025-21647
|
| VCID-dn7f-k223-jbf4 | kernel: btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path |
CVE-2024-57923
|
| VCID-e4kc-nd41-ukaq | kernel: fs: relax assertions on failure to encode file handles |
CVE-2024-57924
|
| VCID-e6vj-e821-s7ba | kernel: io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period |
CVE-2025-21655
|
| VCID-ez5d-wdcg-j7gr | kernel: drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err |
CVE-2024-57926
|
| VCID-femt-rtxa-e7e3 | kernel: dm thin: make get_first_thin use rcu-safe list first function |
CVE-2025-21664
|
| VCID-g4qj-az94-83c6 | kernel: btrfs: avoid NULL pointer dereference if no valid extent tree |
CVE-2025-21658
|
| VCID-g75p-x4da-efdt | kernel: net: hns3: fix kernel crash when 1588 is sent on HIP08 devices |
CVE-2025-21649
|
| VCID-ghhe-6xse-t7eg | kernel: iio: adc: ti-ads1298: Add NULL check in ads1298_init |
CVE-2024-57944
|
| VCID-gw5x-vqgm-hyat | kernel: netfs: Fix enomem handling in buffered reads |
CVE-2024-57928
|
| VCID-gwn2-4mea-3bcc | kernel: ipvlan: Fix use-after-free in ipvlan_get_iflink(). |
CVE-2025-21652
|
| VCID-hebd-1a3u-7bba | kernel: netfs: Fix ceph copy to cache on write-begin |
CVE-2024-57942
|
| VCID-hgap-34cj-tqek | kernel: drm/amdgpu: Add a lock when accessing the buddy trim function |
CVE-2024-57921
|
| VCID-hjfx-vv5v-ykgu | kernel: iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer |
CVE-2024-57911
|
| VCID-hrfs-afba-23d3 | kernel: afs: Fix the maximum cell name length |
CVE-2025-21646
|
| VCID-ht4h-61mg-f3h8 | In the Linux kernel, the following vulnerability has been resolved: sctp: sysctl: udp_port: avoid using current->nsproxy As mentioned in a previous commit of this series, using the 'net' structure via 'current' is not recommended for different reasons: - Inconsistency: getting info from the reader's/writer's netns vs only from the opener's netns. - current->nsproxy can be NULL in some cases, resulting in an 'Oops' (null-ptr-deref), e.g. when the current task is exiting, as spotted by syzbot [1] using acct(2). The 'net' structure can be obtained from the table->data using container_of(). Note that table->data could also be used directly, but that would increase the size of this fix, while 'sctp.ctl_sock' still needs to be retrieved from 'net' structure. |
CVE-2025-21637
|
| VCID-hxj2-cvvc-tqec | kernel: cgroup/cpuset: remove kernfs active break |
CVE-2025-21634
|
| VCID-j7k2-2c5y-gkgt | kernel: topology: Keep the cpumask unchanged when printing cpumap |
CVE-2024-57917
|
| VCID-keev-3t7r-dkh6 | kernel: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() |
CVE-2025-21631
|
| VCID-kmmf-ztaw-bkay | kernel: sctp: sysctl: rto_min/max: avoid using current->nsproxy |
CVE-2025-21639
|
| VCID-mnrs-3agf-kbbr | kernel: usb: gadget: f_fs: Remove WARN_ON in functionfs_bind |
CVE-2024-57913
|
| VCID-mu3y-rdt2-x3g1 | kernel: net: hns3: don't auto enable misc vector |
CVE-2025-21651
|
| VCID-mvq7-knq8-n7hj | kernel: netdev: prevent accessing NAPI instances from another namespace |
CVE-2025-21659
|
| VCID-n6b8-zfkd-efbc | kernel: ksmbd: fix a missing return value check bug |
CVE-2024-57925
|
| VCID-nama-uedh-b3fg | kernel: sctp: sysctl: auth_enable: avoid using current->nsproxy |
CVE-2025-21638
|
| VCID-nmvt-a8he-j3ae | kernel: sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass() |
CVE-2025-21657
|
| VCID-nxvd-a4yz-n3gr | kernel: gpio: virtuser: fix missing lookup table cleanups |
CVE-2025-21661
|
| VCID-p5un-aend-z7fb | kernel: drm/xe: Fix tlb invalidation when wedging |
CVE-2025-21644
|
| VCID-pm9v-yc8g-a7dq | kernel: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it |
CVE-2025-21645
|
| VCID-q682-t17w-kyhz | kernel: iio: imu: kmx61: fix information leak in triggered buffer |
CVE-2024-57908
|
| VCID-ssqx-mgpz-97cd | kernel: drm/amd/display: Add check for granularity in dml ceil/floor helpers |
CVE-2024-57922
|
| VCID-te9d-jkjh-eyh9 | kernel: ovl: support encoding fid from inode with no alias |
CVE-2025-21654
|
| VCID-tjwk-b5c5-j3ak | kernel: usb: typec: tcpci: fix NULL pointer issue on shared irq case |
CVE-2024-57914
|
| VCID-tpwe-14hx-sbeu | kernel: netfs: Fix kernel async DIO |
CVE-2025-21643
|
| VCID-vtud-2g7y-p7gt | kernel: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy |
CVE-2025-21640
|
| VCID-w6e2-1eqn-s3f7 | kernel: iio: light: vcnl4035: fix information leak in triggered buffer |
CVE-2024-57910
|
| VCID-x2a4-7ds7-mbca | kernel: mptcp: sysctl: sched: avoid using current->nsproxy |
CVE-2025-21642
|
| VCID-xc2d-up5t-23eh | kernel: sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy |
CVE-2025-21636
|
| VCID-xd5n-h33h-xfa5 | kernel: riscv: Fix sleeping in invalid context in die() |
CVE-2024-57939
|
| VCID-xeq4-nmmt-6qft | kernel: x86/fpu: Ensure shadow stack is active before "getting" registers |
CVE-2025-21632
|
| VCID-xgx8-dqt9-xugb | kernel: netfs: Fix the (non-)cancellation of copy when cache is temporarily disabled |
CVE-2024-57941
|
| VCID-zf2y-nzvb-s3e5 | kernel: net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue |
CVE-2025-21650
|
| VCID-zmch-s95m-gua2 | kernel: net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute |
CVE-2025-21653
|
| VCID-zwy7-8h5s-9ugb | kernel: iio: adc: ti-ads1119: fix information leak in triggered buffer |
CVE-2024-57905
|
| VCID-zyeq-zp8w-zfba | kernel: iio: adc: ti-ads8688: fix information leak in triggered buffer |
CVE-2024-57906
|