Search for packages
| purl | pkg:deb/debian/linux@6.12.74-2?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1adp-h2dm-7kex | kernel: apparmor: fix unprivileged local user can do privileged policy management |
CVE-2026-23268
|
| VCID-4fhj-v5ut-eubv | kernel: mm/hugetlb: fix hugetlb_pmd_shared() |
CVE-2026-23100
|
| VCID-55w5-y7yj-syea | kernel: f2fs: fix to avoid UAF in f2fs_write_end_io() |
CVE-2026-23234
|
| VCID-5cfu-w12q-sfgm |
CVE-2026-23411
|
|
| VCID-5tyb-11p1-hqhx | kernel: apparmor: validate DFA start states are in bounds in unpack_pdb |
CVE-2026-23269
|
| VCID-5zkg-escv-gfa3 |
CVE-2026-23405
|
|
| VCID-8fy6-bzh4-4fhq | kernel: bus: fsl-mc: fix use-after-free in driver_override_show() |
CVE-2026-23221
|
| VCID-an4t-6q1u-jbbq | kernel: romfs: check sb_set_blocksize() return value |
CVE-2026-23238
|
| VCID-h3hf-6hcr-vkcg | kernel: platform/x86: classmate-laptop: Add missing NULL pointer checks |
CVE-2026-23237
|
| VCID-hh8n-gr5m-zqhd |
CVE-2026-23410
|
|
| VCID-jp27-uba5-mkfu |
CVE-2026-23403
|
|
| VCID-mq4s-tr48-4ffe | kernel: f2fs: fix to avoid mapping wrong physical block for swapfile |
CVE-2026-23233
|
| VCID-nrh4-hbmw-mbf1 |
CVE-2026-23406
|
|
| VCID-pzx9-1ck1-kygq | kernel: f2fs: fix out-of-bounds access in sysfs attribute read/write |
CVE-2026-23235
|
| VCID-q48f-2umw-e7at |
CVE-2026-23407
|
|
| VCID-sct2-rhk9-v7dj | kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. |
CVE-2025-71238
|
| VCID-t4ja-urqj-1ycy | kernel: fbdev: smscufx: properly copy ioctl memory to kernelspace |
CVE-2026-23236
|
| VCID-trc2-xkcv-dqe3 |
CVE-2026-23404
|
|
| VCID-w6cy-vhp9-kkbr |
CVE-2026-23408
|
|
| VCID-wgwf-u8hc-yuag |
CVE-2026-23409
|