Search for packages
| purl | pkg:deb/debian/linux@6.17.10-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2dsp-hpsn-hycd | kernel: net/mlx5: Clean up only new IRQ glue on request_irq() failure |
CVE-2025-40250
|
| VCID-2h3f-69pj-vugb | kernel: Linux kernel SMB client: Denial of Service due to Use-After-Free |
CVE-2025-68226
|
| VCID-2s7e-4bym-cbe1 | kernel: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() |
CVE-2025-40261
|
| VCID-2xpb-dr5e-5yff | kernel: Linux kernel: Denial of Service in veth due to race condition |
CVE-2025-68232
|
| VCID-3b84-8vp2-suc2 | kernel: ice: fix PTP cleanup on driver removal in error path |
CVE-2025-68215
|
| VCID-3nnk-fzpk-j7cf | kernel: Input: cros_ec_keyb - fix an invalid memory access |
CVE-2025-40263
|
| VCID-43ck-rt2b-1uea | kernel: pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc |
CVE-2025-68222
|
| VCID-4n8k-tam2-eqer | kernel: drm/tegra: Add call to put_pid() |
CVE-2025-68233
|
| VCID-6a3b-1psa-xygp | kernel: LoongArch: BPF: Disable trampoline for kernel module function trace |
CVE-2025-68216
|
| VCID-7a8k-qyf8-pffj | kernel: s390/ctcm: Fix double-kfree |
CVE-2025-40253
|
| VCID-7tue-dt6q-eqau | kernel: scsi: sg: Do not sleep in atomic context |
CVE-2025-40259
|
| VCID-879u-ejfc-xfes | kernel: mm/mempool: fix poisoning order>0 pages with HIGHMEM |
CVE-2025-68231
|
| VCID-8fu6-ufcd-2ybp | kernel: mtdchar: fix integer overflow in read/write ioctls |
CVE-2025-68237
|
| VCID-98mp-5h68-73eg | kernel: Linux kernel: Denial of Service during UFS power down |
CVE-2025-68236
|
| VCID-9nr4-4nrz-uyh6 | kernel: nvme-multipath: fix lockdep WARN due to partition scan work |
CVE-2025-68218
|
| VCID-a9vv-zmfx-7khu | kernel: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() |
CVE-2025-40255
|
| VCID-axpb-mkxb-tfdv | kernel: mtd: rawnand: cadence: fix DMA device NULL pointer dereference |
CVE-2025-68238
|
| VCID-c7v9-9fvg-q7g7 | kernel: io_uring/cmd_net: fix wrong argument types for skb_queue_splice() |
CVE-2025-68234
|
| VCID-dcda-4d74-vudh | kernel: Linux kernel MPTCP: Privilege escalation or denial of service via use-after-free in timer handling |
CVE-2025-40257
|
| VCID-enr2-4j6n-jqf7 | kernel: Linux kernel: vsock vulnerability may lead to memory corruption |
CVE-2025-40248
|
| VCID-fm5b-61xp-mqg7 | kernel: drm/plane: Fix create_in_format_blob() return value |
CVE-2025-68228
|
| VCID-fmsc-fdq9-cbc8 | kernel: Kernel: Use-after-free in GPIO character device allows privilege escalation or denial of service |
CVE-2025-40249
|
| VCID-gsm2-4mrp-nkcg | kernel: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() |
CVE-2025-40252
|
| VCID-kde4-hm6f-b7by | kernel: mptcp: fix address removal logic in mptcp_pm_nl_rm_addr |
CVE-2025-68221
|
| VCID-kw64-qm3a-1fbk | kernel: xfs: fix out of bounds memory read error in symlink repair |
CVE-2025-40246
|
| VCID-m21d-1mj4-3bbn | kernel: drm/msm: Fix pgtable prealloc error path |
CVE-2025-40247
|
| VCID-mkzp-92f7-dkar | kernel: net: ethernet: ti: netcp: Standardize knav_dma_open_channel to return NULL on error |
CVE-2025-68220
|
| VCID-my1h-j8j2-z3fz | kernel: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy |
CVE-2025-40251
|
| VCID-ncy9-wpkk-5qdx | kernel: lib/test_kho: check if KHO is enabled |
CVE-2025-68225
|
| VCID-nehu-781r-eqaa | kernel: drm/amdgpu: fix gpu page fault after hibernation on PF passthrough |
CVE-2025-68230
|
| VCID-padk-1w3h-7bfs | kernel: cifs: fix memory leak in smb3_fs_context_parse_param error path |
CVE-2025-68219
|
| VCID-pe5c-3hjd-8bh2 | kernel: Input: imx_sc_key - fix memory corruption on unload |
CVE-2025-40262
|
| VCID-ppyy-4rvt-gydv | kernel: KVM: arm64: Check the untrusted offset in FF-A memory share |
CVE-2025-40266
|
| VCID-qmp7-favx-muhv | kernel: drm/radeon: delete radeon_fence_process in is_signaled, no deadlock |
CVE-2025-68223
|
| VCID-r7v1-kfpd-s7hr | kernel: idpf: fix possible vport_config NULL pointer deref in remove |
CVE-2025-68213
|
| VCID-rmyf-afy7-8fcx | kernel: scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() |
CVE-2025-68229
|
| VCID-td5v-whqk-tyek | kernel: sched_ext: Fix scx_enable() crash on helper kthread creation failure |
CVE-2025-40260
|
| VCID-tje4-ya54-3uaz | kernel: xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added |
CVE-2025-40256
|
| VCID-vh61-db89-skas | kernel: mptcp: fix race condition in mptcp_schedule_work() |
CVE-2025-40258
|
| VCID-vq1q-27nq-mfh6 | kernel: nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot |
CVE-2025-68235
|
| VCID-xhfc-kb8k-pyet | kernel: Linux kernel: Denial of Service due to NULL function pointer race in timer shutdown |
CVE-2025-68214
|
| VCID-yb55-6g5g-z7fr | kernel: Linux kernel: be2net driver NULL pointer dereference leading to denial of service |
CVE-2025-40264
|
| VCID-ybku-jsxr-kbga | kernel: net: openvswitch: remove never-working support for setting nsh fields |
CVE-2025-40254
|
| VCID-yqma-nz5z-hkfc | kernel: mptcp: Fix proto fallback detection with BPF |
CVE-2025-68227
|
| VCID-ytcp-h7r2-e3h6 | kernel: vfat: fix missing sb_min_blocksize() return value checks |
CVE-2025-40265
|
| VCID-zgg4-1b73-uqb6 | kernel: fs: Fix uninitialized 'offp' in statmount_string() |
CVE-2025-68212
|
| VCID-zzjh-pm9k-4uej | kernel: Input: pegasus-notetaker - fix potential out-of-bounds access |
CVE-2025-68217
|