- linux-5.10.223-1 (debian11)
- 5.10.237-1
- 2025-08-19 08:01:08
- 2025-08-19 13:29:47
- K20250819_01
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42284
- Patch: debian11/5.10.226-1/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.10.226-1
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42301
- Patch: debian11/5.10.226-1/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.10.226-1
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44987
- Patch: debian11/5.10.226-1/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.10.226-1
- CVE-2024-44998, CVSSv2 Score: 7.8
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44998
- Patch: debian11/5.10.226-1/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 5.10.226-1
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46673
- Patch: debian11/5.10.226-1/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.10.226-1
- CVE-2024-46674, CVSSv2 Score: 7.8
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46674
- Patch: debian11/5.10.226-1/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 5.10.226-1
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46744
- Patch: debian11/5.10.226-1/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.10.226-1
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46759
- Patch: debian11/5.10.226-1/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-46844, CVSSv2 Score:
- Description:
Architecture um is not supported
- CVE:
- Patch: skipped/CVE-2024-46844.patch
- From:
- CVE-2024-42280, CVSSv2 Score: 7.8
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42280
- Patch: debian11/5.10.226-1/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.10.226-1
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41011
- Patch: debian11/5.10.226-1/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.10.226-1
- CVE-2024-46818, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46818
- Patch: debian11/5.10.226-1/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.10.226-1
- CVE-2024-46814, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46814
- Patch: debian11/5.10.226-1/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 5.10.226-1
- CVE-2024-46725, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46725
- Patch: debian11/5.10.226-1/CVE-2024-46725-drm-amdgpu-fix-out-of-bounds-write-warning.patch
- From: 5.10.226-1
- CVE-2024-44974, CVSSv2 Score: 7.8
- Description:
mptcp: pm: avoid possible UaF when selecting endp
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44974
- Patch: debian11/5.10.226-1/CVE-2024-44974-mptcp-pm-avoid-possible-uaf-when-selecting-endp.patch
- From: 5.10.226-1
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46757
- Patch: debian11/5.10.226-1/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46756
- Patch: debian11/5.10.226-1/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-43858, CVSSv2 Score: 7.8
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43858
- Patch: debian11/5.10.226-1/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.10.226-1
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46798
- Patch: debian11/5.10.226-1/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.10.226-1
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46758
- Patch: debian11/5.10.226-1/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46738
- Patch: debian11/5.10.226-1/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 5.10.226-1
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46800
- Patch: debian11/5.10.226-1/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.10.226-1
- CVE-2024-42313, CVSSv2 Score: 7.8
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42313
- Patch: debian11/5.10.226-1/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.10.226-1
- CVE-2024-38577, CVSSv2 Score: 7.8
- Description:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38577
- Patch: debian11/5.10.226-1/CVE-2024-38577-rcu-tasks-fix-show-rcu-tasks-trace-gp-kthread-buffer-overflow.patch
- From: 5.10.226-1
- CVE-2024-46700, CVSSv2 Score:
- Description:
Out of scope: Android/binder
- CVE:
- Patch: skipped/CVE-2024-46700.patch
- From:
- CVE-2024-46804, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46804
- Patch: debian11/5.10.226-1/CVE-2024-46804-drm-amd-display-add-array-index-check-for-hdcp-ddc-access.patch
- From: 5.10.226-1
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27397
- Patch: debian11/5.10.226-1/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-set-element-timeout.patch
- From: 5.10.226-1
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27397
- Patch: debian11/5.10.226-1/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch.patch
- From: linux-5.10.226-1
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43854
- Patch: debian11/5.10.226-1/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.10.226-1
- CVE-2024-43860, CVSSv2 Score: 5.5
- Description:
remoteproc: imx_rproc: Skip over memory region when node value is NULL
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43860
- Patch: debian11/5.10.226-1/CVE-2024-43860-remoteproc-imx-rproc-skip-over-memory-region-when-node-value-is-null.patch
- From: 5.10.226-1
- CVE-2024-44952, CVSSv2 Score:
- Description:
Patch introduced a deadlock and was reverted.
- CVE:
- Patch: skipped/CVE-2024-44952.patch
- From:
- CVE-2024-46685, CVSSv2 Score: 5.5
- Description:
pinctrl: single: fix potential NULL dereference in pcs_get_function()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46685
- Patch: debian11/5.10.226-1/CVE-2024-46685-pinctrl-single-fix-potential-null-dereference-in-pcs-get-function.patch
- From: 5.10.226-1
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41042
- Patch: debian11/5.10.226-1/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.10.226-1
- CVE-2024-46780, CVSSv2 Score: 5.5
- Description:
nilfs2: replace snprintf in show functions with sysfs_emit
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46780
- Patch: debian11/5.10.226-1/CVE-2024-46780-nilfs2-replace-snprintf-in-show-functions-with-sysfs-emit.patch
- From: 5.10.226-1
- CVE-2024-46780, CVSSv2 Score: 5.5
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46780
- Patch: debian11/5.10.226-1/CVE-2024-46780-nilfs2-protect-references-to-superblock-parameters-exposed-in-sysfs.patch
- From: 5.10.226-1
- CVE-2024-45025, CVSSv2 Score: 5.5
- Description:
fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
- CVE: https://linux.oracle.com/cve/CVE-2024-45025.html
- Patch: debian11/5.10.226-1/CVE-2024-45025-fix-bitmap-corruption-on-close-range-with-close-range-unshare.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46679, CVSSv2 Score: 5.5
- Description:
ethtool: check device is present when getting link settings
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46679
- Patch: debian11/5.10.226-1/CVE-2024-46679-ethtool-check-device-is-present-when-getting-link-settings.patch
- From: 5.10.226-1
- CVE-2024-42310, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42310
- Patch: debian11/5.10.226-1/CVE-2024-42310-drm-gma500-fix-null-pointer-dereference-in-cdv-intel-lvds-get-modes.patch
- From: 5.10.226-1
- CVE-2024-42305, CVSSv2 Score: 5.5
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42305
- Patch: debian11/5.10.226-1/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.10.226-1
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46723
- Patch: debian11/5.10.226-1/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.10.226-1
- CVE-2024-46724, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46724
- Patch: debian11/5.10.226-1//CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.10.226-1
- CVE-2024-46731, CVSSv2 Score: 7.1
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46731
- Patch: debian11/5.10.226-1/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 5.10.226-1
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46747
- Patch: debian11/5.10.226-1/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.10.226-1
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46743
- Patch: debian11/5.10.226-1/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.10.226-1
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46722
- Patch: debian11/5.10.226-1/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.10.226-1
- CVE-2024-44999, CVSSv2 Score: 7.1
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44999
- Patch: debian11/5.10.226-1/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.10.226-1
- CVE-2024-43882, CVSSv2 Score: 7.0
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43882
- Patch: debian11/5.10.226-1/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.10.226-1
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42228
- Patch: debian11/5.10.226-1/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 5.10.226-1
- CVE-2024-46849, CVSSv2 Score: 7.8
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46849
- Patch: debian11/5.10.234-1/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.10.234-1
- CVE-2024-47670, CVSSv2 Score: 7.8
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-47670
- Patch: debian11/5.10.234-1/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.10.234-1
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-47685
- Patch: debian11/5.10.234-1/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.10.234-1
- CVE-2024-49883, CVSSv2 Score: 7.8
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49883
- Patch: debian11/5.10.234-1/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.10.234-1
- CVE-2024-49966, CVSSv2 Score: 7.8
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49966
- Patch: debian11/5.10.234-1/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.10.234-1
- CVE-2024-50151, CVSSv2 Score: 7.8
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50151
- Patch: debian11/5.10.234-1/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.10.234-1
- CVE-2024-53061, CVSSv2 Score: 7.8
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53061
- Patch: debian11/5.10.234-1/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.10.234-1
- CVE-2024-49996, CVSSv2 Score: 7.8
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49996
- Patch: debian11/5.10.234-1/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.10.234-1
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53237
- Patch: debian11/5.10.234-1/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.10.234-1
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53237
- Patch: debian11/5.10.234-1/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child-kpatch.patch
- From: 5.10.234-1
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56596
- Patch: debian11/5.10.234-1/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.10.234-1
- CVE-2024-49894, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49894
- Patch: debian11/5.10.234-1/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.10.234-1
- CVE-2024-49884, CVSSv2 Score: 7.8
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49884
- Patch: debian11/5.10.234-1/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.10.234-1
- CVE-2024-53057, CVSSv2 Score: 7.8
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53057
- Patch: debian11/5.10.234-1/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.10.234-1
- CVE-2024-53173, CVSSv2 Score: 7.8
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53173
- Patch: debian11/5.10.234-1/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.10.234-1
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56642
- Patch: debian11/5.10.234-1/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.10.234-1
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56602
- Patch: debian11/5.10.234-1/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.10.234-1
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56600
- Patch: debian11/5.10.234-1/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.10.234-1
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-57951
- Patch: debian11/5.10.234-1/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug.patch
- From: 5.10.234-1
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-57951
- Patch: debian11/5.10.234-1/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug-kpatch.patch
- From: 5.10.234-1
- CVE-2024-56672, CVSSv2 Score: 7.8
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56672
- Patch: debian11/5.10.234-1/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.10.234-1
- CVE-2024-56766, CVSSv2 Score: 7.8
- Description:
mtd: rawnand: fix double free in atmel_pmecc_create_user()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56766
- Patch: debian11/5.10.234-1/CVE-2024-56766-mtd-rawnand-fix-double-free-in-atmel-pmecc-create-user.patch
- From: 5.10.234-1
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53104
- Patch: debian11/5.10.230-1/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UN.patch
- From: 5.10.230
- CVE-2024-58069, CVSSv2 Score: 7.8
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-58069
- Patch: debian11/5.10.237-1/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.10.237-1
- CVE-2025-21715, CVSSv2 Score: 7.8
- Description:
net: davicom: fix UAF in dm9000_drv_remove
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21715
- Patch: debian11/5.10.237-1/CVE-2025-21715-net-davicom-fix-uaf-in-dm9000-drv-remove.patch
- From: 5.10.237-1
- CVE-2025-21735, CVSSv2 Score: 7.8
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21735
- Patch: debian11/5.10.237-1/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 5.10.237-1
- CVE-2025-21785, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2025-22056, CVSSv2 Score:
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22056.patch
- From:
- CVE-2024-46812, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46812
- Patch: debian11/5.10.237-1/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 5.10.237-1
- CVE-2025-37838, CVSSv2 Score: 7.8
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-37838
- Patch: debian11/5.10.237-1/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.10.237-1
- CVE-2024-50154, CVSSv2 Score: 7.8
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50154
- Patch: debian11/5.10.237-1/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink.patch
- From: 5.10.237-1
- CVE-2021-47247, CVSSv2 Score: 7.8
- Description:
net/mlx5e: Fix use-after-free of encap entry in neigh update handler
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-47247
- Patch: debian11/5.10.237-1/CVE-2021-47247-net-mlx5e-fix-use-after-free-of-encap-entry-in-neigh-update-handler.patch
- From: 5.10.237-1
- CVE-2021-47489, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix even more out of bound writes from debugfs
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-47489
- Patch: debian11/5.10.237-1/CVE-2021-47489-drm-amdgpu-fix-even-more-out-of-bound-writes-from-debugfs.patch
- From: 5.10.237-1
- CVE-2023-52752, CVSSv2 Score: 8.4
- Description:
smb: client: fix use-after-free bug in cifs_debug_data_proc_show()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52752
- Patch: debian11/5.10.237-1/CVE-2023-52752-smb-client-fix-use-after-free-bug-in-cifs-debug-data-proc-show.patch
- From: 5.10.237-1
- CVE-2024-50280, CVSSv2 Score: 7.8
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50280
- Patch: debian11/5.10.237-1/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.10.237-1
- CVE-2025-21858, CVSSv2 Score: 7.8
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21858
- Patch: debian11/5.10.237-1/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 5.10.237-1
- CVE-2025-21858, CVSSv2 Score: 7.8
- Description:
geneve: Suppress list corruption splat in geneve_destroy_tunnels().
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21858
- Patch: debian11/5.10.237-1/CVE-2025-21858-geneve-Suppress-list-corruption-splat-in-geneve_destroy_tunnels.patch
- From: 5.10.237-1
- CVE-2024-57980, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-57980
- Patch: debian11/5.10.237-1/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.10.237-1
- CVE-2025-21811, CVSSv2 Score: 7.8
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21811
- Patch: debian11/5.10.237-1/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 5.10.237-1
- CVE-2024-50047, CVSSv2 Score: 7.8
- Description:
smb: client: fix UAF in async decryption
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50047
- Patch: debian11/5.10.237-1/CVE-2024-50047-smb-client-fix-UAF-in-async-decryption.patch
- From: 5.10.237-1
- CVE-2024-50047, CVSSv2 Score: 7.8
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50047
- Patch: debian11/5.10.237-1/CVE-2024-50047-smb-client-fix-NULL-ptr-deref-in-crypto_aead_setkey.patch
- From: 5.10.237-1
- CVE-2025-21731, CVSSv2 Score: 7.8
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21731
- Patch: debian11/5.10.237-1/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 5.10.237-1
- CVE-2025-21700, CVSSv2 Score: 7.8
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21700
- Patch: debian11/5.10.237-1/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.10.237-1
- CVE-2025-21727, CVSSv2 Score: 7.8
- Description:
padata: fix UAF in padata_reorder
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21727
- Patch: debian11/5.10.237-1/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: 5.10.237-1
- CVE-2025-21934, CVSSv2 Score: 7.8
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21934
- Patch: debian11/5.10.237-1/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 5.10.237-1
- CVE-2025-22020, CVSSv2 Score: 7.8
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-22020
- Patch: debian11/5.10.237-1/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.10.237-1
- CVE-2024-46821, CVSSv2 Score: 7.8
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46821
- Patch: debian11/5.10.237-1/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 5.10.237-1
- CVE-2025-22035, CVSSv2 Score: 7.8
- Description:
tracing: Fix use-after-free in print_graph_function_flags during tracer switching
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-22035
- Patch: debian11/5.10.237-1/CVE-2025-22035-tracing-fix-use-after-free-in-print-graph-function-flags-during-tracer-switching.patch
- From: 5.10.237-1
- CVE-2024-56608, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56608
- Patch: debian11/5.10.237-1/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 5.10.237-1
- CVE-2024-26928, CVSSv2 Score: 7.8
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26928
- Patch: debian11/5.10.237-1/CVE-2024-26928-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show.patch
- From: 5.10.237-1
- N/A, CVSSv2 Score:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 5.10.0/proc-restrict-pagemap-access.patch
- From: