Search for packages
| purl | pkg:deb/debian/linux@6.12.17-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1e5t-sjtw-kuh4 | kernel: mtd: spi-nor: sst: Fix SST write failure |
CVE-2025-21845
|
| VCID-1nmj-4frz-dqgw | kernel: net: Add rx_skb of kfree_skb to raw_tp_null_args[]. |
CVE-2025-21852
|
| VCID-2fck-ppsa-7bbh | kernel: acct: perform last write from workqueue |
CVE-2025-21846
|
| VCID-84zb-1k55-s7cf | kernel: net/sched: cls_api: fix error handling causing NULL dereference |
CVE-2025-21857
|
| VCID-8juu-fmda-afdh | kernel: tee: optee: Fix supplicant wait loop |
CVE-2025-21871
|
| VCID-8vht-myyn-muaj | kernel: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() |
CVE-2025-21848
|
| VCID-93ay-73z5-h7er | kernel: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers |
CVE-2025-21870
|
| VCID-b4jp-8epx-sycm | kernel: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). |
CVE-2025-21865
|
| VCID-b951-pqw3-j7ax | kernel: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() |
CVE-2025-21847
|
| VCID-dk25-73pj-cqad | kernel: smb: client: Add check for next_buffer in receive_encrypted_standard() |
CVE-2025-21844
|
| VCID-dp4y-ary7-cbcm | kernel: powerpc/code-patching: Disable KASAN report during patching via temporary mm |
CVE-2025-21869
|
| VCID-emgx-njsv-fbce | kernel: drm/i915/gt: Use spin_lock_irqsave() in interruptible context |
CVE-2025-21849
|
| VCID-g74b-2azg-mfdw | kernel: bpf: avoid holding freeze_mutex during mmap operation |
CVE-2025-21853
|
| VCID-hfq2-r9mw-p3cp | kernel: btrfs: fix double accounting race when btrfs_run_delalloc_range() failed |
CVE-2024-58089
|
| VCID-jfhr-2499-83ag | kernel: powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC |
CVE-2025-21866
|
| VCID-k6b5-6xca-v7b5 | kernel: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize() |
CVE-2025-21861
|
| VCID-majy-fwzb-4uez | kernel: drop_monitor: fix incorrect initialization order |
CVE-2025-21862
|
| VCID-meq5-pftb-y3d1 | kernel: bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() |
CVE-2025-21867
|
| VCID-n2zs-jhfv-uyah | kernel: Input: synaptics - fix crash when enabling pass-through port |
CVE-2025-21746
|
| VCID-n6zy-gwsy-d3en | kernel: geneve: Fix use-after-free in geneve_find_dev(). |
CVE-2025-21858
|
| VCID-q2xq-b4qj-mfa1 | kernel: bpf: Fix softlockup in arena_map_free on 64k page kernel |
CVE-2025-21851
|
| VCID-qu4h-qk7x-8fe5 | kernel: net: allow small head cache usage with large MAX_SKB_FRAGS values |
CVE-2025-21868
|
| VCID-rm9y-dg1r-53fg | kernel: USB: gadget: f_midi: f_midi_complete to call queue_work |
CVE-2025-21859
|
| VCID-rmed-h9f8-xfe5 | kernel: tcp: drop secpath at the same time as we currently drop dst |
CVE-2025-21864
|
| VCID-rph2-j8pr-qbfj | kernel: ibmvnic: Don't reference skb after sending to VIOS |
CVE-2025-21855
|
| VCID-tz46-c5xb-mkem | kernel: sockmap, vsock: For connectible sockets allow only connected |
CVE-2025-21854
|
| VCID-upba-5u18-j3cr | kernel: bpf: Fix deadlock when freeing cgroup storage |
CVE-2024-58088
|
| VCID-vt6c-ywbs-j7bj | kernel: s390/ism: add release function for struct device |
CVE-2025-21856
|
| VCID-w8r5-decj-vkem | kernel: io_uring: prevent opcode speculation |
CVE-2025-21863
|