- linux-5.10.216-1 (debian11)
- 5.10.237-1
- 2025-08-19 08:01:06
- 2025-08-19 13:29:47
- K20250819_01
- CVE-2024-26900, CVSSv2 Score: 5.5
- Description:
md: fix kmemleak of rdev->serial
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26900
- Patch: debian11/5.10.218-1/CVE-2024-26900-md-fix-kmemleak-of-rdev-serial.patch
- From: 5.10.218-1
- CVE-2024-27398, CVSSv2 Score: 5.5
- Description:
Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27398
- Patch: debian11/5.10.218-1/CVE-2024-27398-Bluetooth-Fix-use-after-free-bugs-caused-by-sco_sock_timeout.patch
- From: 5.10.218-1
- CVE-2022-48655, CVSSv2 Score: 7.8
- Description:
firmware: arm_scmi: Harden accesses to the reset domains
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-48655
- Patch: debian11/5.10.218-1/CVE-2022-48655-firmware-arm_scmi-Harden-accesses-to-the-reset-domains.patch
- From: 5.10.218-1
- CVE-2024-35947, CVSSv2 Score: 5.5
- Description:
dyndbg: fix old BUG_ON in >control parser
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-35947
- Patch: debian11/5.10.218-1/CVE-2024-35947-dyndbg-fix-old-BUG_ON-in-control-parser.patch
- From: 5.10.218-1
- CVE-2024-27401, CVSSv2 Score: 5.5
- Description:
firewire: nosy: ensure user_length is taken into account when fetching packet contents
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27401
- Patch: debian11/5.10.218-1/CVE-2024-27401-firewire-nosy-ensure-user_length-is-taken-into-account-when-fetching-packet-contents.patch
- From: 5.10.218-1
- CVE-2024-27399, CVSSv2 Score: 5.5
- Description:
Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27399
- Patch: debian11/5.10.218-1/CVE-2024-27399-Bluetooth-l2cap-fix-null-ptr-deref-in-l2cap_chan_timeout.patch
- From: 5.10.218-1
- CVE-2024-35848, CVSSv2 Score: 5.5
- Description:
eeprom: at24: fix memory corruption race condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-35848
- Patch: debian11/5.10.218-1/CVE-2024-35848-eeprom-at24-fix-memory-corruption-race-condition.patch
- From: 5.10.218-1
- CVE-2023-52585, CVSSv2 Score: 4.4
- Description:
drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52585
- Patch: debian11/5.10.218-1/CVE-2023-52585-drm-amdgpu-Fix-possible-NULL-dereference-in-amdgpu_ras_query_error_status_helper.patch
- From: 5.10.218-1
- CVE-2024-36017, CVSSv2 Score: 5.5
- Description:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36017
- Patch: debian11/5.10.218-1/CVE-2024-36017-rtnetlink-Correct-nested-IFLA_VF_VLAN_LIST-attribute-validation.patch
- From: 5.10.218-1
- CVE-2024-36031, CVSSv2 Score: 5.5
- Description:
keys: Fix overwrite of key expiration on instantiation
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36031
- Patch: debian11/5.10.218-1/CVE-2024-36031-keys-Fix-overwrite-of-key-expiration-on-instantiation.patch
- From: 5.10.218-1
- CVE-2024-36929, CVSSv2 Score: 5.5
- Description:
net: core: reject skb_copy(_expand) for fraglist GSO skbs
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36929
- Patch: debian11/5.10.218-1/CVE-2024-36929-net-core-reject-skb_copy_expand-for-fraglist-GSO-skbs.patch
- From: 5.10.218-1
- CVE-2024-36933, CVSSv2 Score: 5.5
- Description:
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36933
- Patch: debian11/5.10.218-1/CVE-2024-36933-nsh-Restore-skb-protocol-data-mac_header-for-outer-header-in-nsh_gso_segment.patch
- From: 5.10.218-1
- CVE-2024-36939, CVSSv2 Score:
- Description:
Commit d47151b is absent. Original error is in module __init function, it cannot be fixed.
- CVE:
- Patch: skipped/CVE-2024-36939.patch
- From:
- CVE-2024-36946, CVSSv2 Score: 5.5
- Description:
fix rtm_phonet_notify() skb allocation
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36946
- Patch: debian11/5.10.218-1/CVE-2024-36946-fix-rtm_phonet_notify-skb-allocation.patch
- From: 5.10.218-1
- CVE-2024-36971, CVSSv2 Score: 7.8
- Description:
net: fix __dst_negative_advice() race
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36971
- Patch: debian11/5.10.221-1/CVE-2024-36971-net-fix-__dst_negative_advice-race.patch
- From: linux-5.10.221-1
- CVE-2024-39480, CVSSv2 Score: 7.8
- Description:
kdb: Fix buffer overflow during tab-complete
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39480
- Patch: debian11/5.10.221-1/CVE-2024-39480-kdb-Fix-buffer-overflow-during-tab-complete.patch
- From: linux-5.10.221-1
- CVE-2022-43945, CVSSv2 Score: 7.5
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-43945
- Patch: debian11/5.10.221-1/CVE-2022-43945-1-NFSD-Protect-against-send-buffer-overflow-in-NFSv2-R.patch
- From: linux-5.1.221-1
- CVE-2022-43945, CVSSv2 Score: 7.5
- Description:
NFSD: Protect against send buffer overflow in NFSv2 READ
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-43945
- Patch: debian11/5.10.221-1/CVE-2022-43945-2-NFSD-Protect-against-send-buffer-overflow-in-NFSv3-R.patch
- From: linux-5.10.221-1
- CVE-2022-43945, CVSSv2 Score: 7.5
- Description:
SUNRPC: Fix svcxdr_init_encode's buflen calculation
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-43945
- Patch: debian11/5.10.221-1/CVE-2022-43945-3-SUNRPC-Fix-svcxdr_init_encode-s-buflen-calculation.patch
- From: linux-5.1.221-1
- CVE-2022-43945, CVSSv2 Score: 7.5
- Description:
NFSD: Remove "inline" directives on op_rsize_bop helpers
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-43945
- Patch: debian11/5.10.221-1/CVE-2022-43945-4-NFSD-Remove-inline-directives-on-op_rsize_bop-helpers.patch
- From: linux-5.10.221-1
- CVE-2022-43945, CVSSv2 Score: 7.5
- Description:
NFSD: Cap rsize_bop result based on send buffer size
- CVE: https://security-tracker.debian.org/tracker/CVE-2022-43945
- Patch: debian11/5.10.221-1/CVE-2022-43945-5-NFSD-Cap-rsize_bop-result-based-on-send-buffer-size.patch
- From: linux-5.10.221-1
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix gss_free_in_token_pages()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36288
- Patch: debian11/5.10.221-1/CVE-2024-36288-SUNRPC-Fix-gss_free_in_token_pages.patch
- From: linux-5.10.221-1
- CVE-2024-36288, CVSSv2 Score: 5.5
- Description:
SUNRPC: Fix loop termination condition in gss_free_in_token_pages()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36288
- Patch: debian11/5.10.221-1/CVE-2024-36288-SUNRPC-Fix-loop-termination-condition-in-gss_free_in_token_pages.patch
- From: linux-5.10.221-1
- CVE-2024-38612, CVSSv2 Score: 5.5
- Description:
ipv6: sr: fix invalid unregister error path
- CVE: https://cve-tracker.kernelcare.com/CVE-2024-38612/
- Patch: debian11/5.10.221-1/CVE-2024-38612-ipv6-sr-fix-invalid-unregister-error-path.patch
- From: linux-5.10.221-1
- CVE-2024-38633, CVSSv2 Score: 5.5
- Description:
serial: max3100: Update uart_driver_registered on driver removal
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38633
- Patch: debian11/5.10.221-1/CVE-2024-38633-serial-max3100-Update-uart_driver_registered-on-driver-removal.patch
- From: linux-5.10.221-1
- CVE-2024-39505, CVSSv2 Score:
- Description:
ARM related patch
- CVE:
- Patch: skipped/CVE-2024-39505.patch
- From:
- CVE-2024-39506, CVSSv2 Score: 5.5
- Description:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39506
- Patch: debian11/5.10.221-1/CVE-2024-39506-liquidio-adjust-a-NULL-pointer-handling-path-in.patch
- From: 5.10.221-1
- CVE-2024-40912, CVSSv2 Score: 5.5
- Description:
wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40912
- Patch: debian11/5.10.221-1/CVE-2024-40912-wifi-mac80211-fix-deadlock-in-ieee80211_sta_ps_deliver_wakeup.patch
- From: 5.10.221-1
- CVE-2024-40929, CVSSv2 Score: 5.5
- Description:
wifi: iwlwifi: mvm: check n_ssids before accessing the ssids
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40929
- Patch: debian11/5.10.221-1/CVE-2024-40929-wifi-iwlwifi-mvm-check-n_ssids-before-accessing-the-ssids.patch
- From: 5.10.221-1
- CVE-2024-40934, CVSSv2 Score: 5.5
- Description:
HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40934
- Patch: debian11/5.10.221-1/CVE-2024-40934-hid-logitech-dj-fix-memory-leak-in-logi_dj_recv_switch_to_dj_mode.patch
- From: 5.10.221-1
- CVE-2024-40959, CVSSv2 Score: 5.5
- Description:
xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40959
- Patch: debian11/5.10.221-1/CVE-2024-40959-xfrm6-check-ip6_dst_idev-return-value-in-xfrm6_get_saddr.patch
- From: 5.10.221-1
- CVE-2024-40968, CVSSv2 Score:
- Description:
MIPS related CVE.
- CVE:
- Patch: skipped/CVE-2024-40968.patch
- From:
- CVE-2024-40988, CVSSv2 Score: 5.5
- Description:
drm/radeon: fix UBSAN warning in kv_dpm.c
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40988
- Patch: debian11/5.10.221-1/CVE-2024-40988-drm-radeon-fix-UBSAN-warning-in-kv_dpm.patch
- From: 5.10.221-1
- CVE-2024-41000, CVSSv2 Score: 5.5
- Description:
block/ioctl: prefer different overflow check
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41000
- Patch: debian11/5.10.221-1/CVE-2024-41000-block-ioctl-prefer-different-overflow-check.patch
- From: 5.10.221-1
- CVE-2024-40916, CVSSv2 Score: 5.5
- Description:
drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40916
- Patch: debian11/5.10.221-1/CVE-2024-40916-drm-exynos-hdmi-report-safe-640x480-mode-as-a-fallback.patch
- From: 5.10.221-1
- CVE-2024-26629, CVSSv2 Score: 5.5
- Description:
nfsd: fix RELEASE_LOCKOWNER
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26629
- Patch: debian11/5.10.221-1/CVE-2024-26629-nfsd-fix-RELEASE_LOCKOWNER.patch
- From: 5.10.221-1
- CVE-2024-26629, CVSSv2 Score: 5.5
- Description:
nfsd: don't take fi_lock in nfsd_break_deleg_cb()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26629
- Patch: debian11/5.10.221-1/CVE-2024-26629-nfsd-dont-take-fi_lock-in-nfsd_break_deleg_cb.patch
- From: 5.10.221-1
- CVE-2024-36015, CVSSv2 Score: 5.5
- Description:
ppdev: Add an error check in register_device
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36015
- Patch: debian11/5.10.221-1/CVE-2024-36015-ppdev-Add-an-error-check-in-register_device.patch
- From: 5.10.221-1
- CVE-2024-36270, CVSSv2 Score: 5.5
- Description:
netfilter: tproxy: bail out if IP has been disabled on the device
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36270
- Patch: debian11/5.10.221-1/CVE-2024-36270-netfilter-tproxy-bail-out-if-IP-has-been-disabled-on-the-device.patch
- From: 5.10.221-1
- CVE-2024-38381, CVSSv2 Score:
- Description:
Out of scope as the patch is for NFC/Android
- CVE:
- Patch: skipped/CVE-2024-38381.patch
- From:
- CVE-2024-38589, CVSSv2 Score: 5.5
- Description:
netrom: fix possible dead-lock in nr_rt_ioctl()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38589
- Patch: debian11/5.10.221-1/CVE-2024-38589-netrom-fix-possible-dead-lock-in-nr_rt_ioctl.patch
- From: 5.10.221-1
- CVE-2024-38599, CVSSv2 Score: 5.5
- Description:
jffs2: prevent xattr node from overflowing the eraseblock
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38599
- Patch: debian11/5.10.221-1/CVE-2024-38599-jffs2-prevent-xattr-node-from-overflowing-the-eraseblock.patch
- From: 5.10.221-1
- CVE-2024-38605, CVSSv2 Score: 5.5
- Description:
ALSA: core: Fix NULL module pointer assignment at card init
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38605
- Patch: debian11/5.10.221-1/CVE-2024-38605-ALSA-core-fix-NULL-module-pointer-assignment-at-card-init.patch
- From: 5.10.221-1
- CVE-2024-39292, CVSSv2 Score:
- Description:
Out of scope: User-mode Linux isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2024-39292.patch
- From:
- CVE-2024-39499, CVSSv2 Score: 5.5
- Description:
vmci: prevent speculation leaks by sanitizing event in event_deliver()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39499
- Patch: debian11/5.10.221-1/CVE-2024-39499-vmci-prevent-speculation-leaks-by-sanitizing-event-in-event_deliver.patch
- From: 5.10.221-1
- CVE-2024-38578, CVSSv2 Score: 5.5
- Description:
ecryptfs: Fix buffer size for tag 66 packet
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38578
- Patch: debian11/5.10.221-1/CVE-2024-38578-ecryptfs-fix-buffer-size-for-tag-66-packet.patch
- From: 5.10.221-1
- CVE-2024-38559, CVSSv2 Score: 5.5
- Description:
scsi: qedf: Ensure the copied buf is NUL terminated
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38559
- Patch: debian11/5.10.221-1/CVE-2024-38559-scsi-qedf-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.10.221-1
- CVE-2024-38597, CVSSv2 Score: 5.5
- Description:
eth: sungem: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38597
- Patch: debian11/5.10.221-1/CVE-2024-38597-eth-sungem-remove-ndo-poll-controller-to-avoid-deadlocks.patch
- From: 5.10.221-1
- CVE-2024-38597, CVSSv2 Score: 5.5
- Description:
eth: sungem: remove .ndo_poll_controller to avoid deadlocks
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38597
- Patch: debian11/5.10.221-1/CVE-2024-38597-eth-sungem-remove-ndo-poll-controller-to-avoid-deadlocks-kpatch.patch
- From: 5.10.221-1
- CVE-2024-38596, CVSSv2 Score: 5.5
- Description:
af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38596
- Patch: debian11/5.10.221-1/CVE-2024-38596-af-unix-fix-data-races-in-unix-release-sock-unix-stream-sendmsg.patch
- From: 5.10.221-1
- CVE-2024-36489, CVSSv2 Score: 5.5
- Description:
tls: fix missing memory barrier in tls_init
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36489
- Patch: debian11/5.10.221-1/CVE-2024-36489-tls-fix-missing-memory-barrier-in-tls-init.patch
- From: 5.10.221-1
- CVE-2024-38662, CVSSv2 Score: 5.5
- Description:
bpf: Allow delete from sockmap/sockhash only if update is allowed
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38662
- Patch: debian11/5.10.221-1/CVE-2024-38662-bpf-allow-delete-from-sockmap-sockhash-only-if-update-is-allowed.patch
- From: 5.10.221-1
- CVE-2024-39467, CVSSv2 Score: 5.5
- Description:
f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39467
- Patch: debian11/5.10.221-1/CVE-2024-39467-f2fs-fix-to-do-sanity-check-on-i-xattr-nid-in-sanity-check-inode.patch
- From: 5.10.221-1
- CVE-2024-39469, CVSSv2 Score: 5.5
- Description:
nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39469
- Patch: debian11/5.10.221-1/CVE-2024-39469-nilfs2-fix-nilfs-empty-dir-misjudgment-and-long-loop-on-i-o-errors.patch
- From: 5.10.221-1
- CVE-2024-39501, CVSSv2 Score: 5.5
- Description:
drivers: core: synchronize really_probe() and dev_uevent()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39501
- Patch: debian11/5.10.221-1/CVE-2024-39501-drivers-core-synchronize-really-probe-and-dev-uevent.patch
- From: 5.10.221-1
- CVE-2024-38615, CVSSv2 Score: 5.5
- Description:
cpufreq: exit() callback is optional
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38615
- Patch: debian11/5.10.221-1/CVE-2024-38615-cpufreq-exit-callback-is-optional.patch
- From: 5.10.221-1
- CVE-2024-38560, CVSSv2 Score: 7.1
- Description:
scsi: bfa: Ensure the copied buf is NUL terminated
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38560
- Patch: debian11/5.10.221-1/CVE-2024-38560-scsi-bfa-ensure-the-copied-buf-is-nul-terminated.patch
- From: 5.10.221-1
- CVE-2024-38634, CVSSv2 Score: 5.5
- Description:
serial: max3100: Lock port->lock when calling uart_handle_cts_change()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38634
- Patch: debian11/5.10.221-1/CVE-2024-38634-serial-max3100-lock-port-lock-when-calling-uart-handle-cts-change.patch
- From: 5.10.221-1
- CVE-2024-38627, CVSSv2 Score: 7.8
- Description:
stm class: Fix a double free in stm_register_device()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38627
- Patch: debian11/5.10.221-1/CVE-2024-38627-stm-class-fix-a-double-free-in-stm-register-device.patch
- From: 5.10.221-1
- CVE-2024-33847, CVSSv2 Score:
- Description:
Not affected
- CVE:
- Patch: skipped/CVE-2024-33847.patch
- From:
- CVE-2024-36286, CVSSv2 Score: 5.5
- Description:
netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36286
- Patch: debian11/5.10.221-1/CVE-2024-36286-netfilter-nfnetlink-queue-acquire-rcu-read-lock-in-instance-destroy-rcu.patch
- From: 5.10.221-1
- CVE-2024-39493, CVSSv2 Score: 5.5
- Description:
crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39493
- Patch: debian11/5.10.221-1/CVE-2024-39493-crypto-qat-fix-adf-dev-reset-sync-memory-leak.patch
- From: 5.10.221-1
- CVE-2024-40902, CVSSv2 Score: 7.8
- Description:
jfs: xattr: fix buffer overflow for invalid xattr
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40902
- Patch: debian11/5.10.221-1/CVE-2024-40902-jfs-xattr-fix-buffer-overflow-for-invalid-xattr.patch
- From: 5.10.221-1
- CVE-2024-39503, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39503
- Patch: debian11/5.10.221-1/CVE-2024-39503-netfilter-ipset-fix-race-between-namespace-cleanup-and-gc-in-the-list-set-type.patch
- From: 5.10.221-1
- CVE-2024-39503, CVSSv2 Score: 5.5
- Description:
netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39503
- Patch: debian11/5.10.221-1/CVE-2024-39503-netfilter-ipset-fix-race-between-namespace-cleanup-and-gc-in-the-list-set-type-kpatch.patch
- From: 5.10.221-1
- CVE-2024-39502, CVSSv2 Score: 5.5
- Description:
ionic: fix use after netif_napi_del()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39502
- Patch: debian11/5.10.221-1/CVE-2024-39502-ionic-fix-use-after-netif-napi-del.patch
- From: 5.10.221-1
- CVE-2024-39475, CVSSv2 Score: 5.5
- Description:
fbdev: savage: Handle err return when savagefb_check_var failed
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-39475
- Patch: debian11/5.10.221-1/CVE-2024-39475-fbdev-savage-handle-err-return-when-savagefb-check-var-failed.patch
- From: 5.10.221-1
- CVE-2024-37353, CVSSv2 Score: 5.5
- Description:
virtio: delete vq in vp_find_vqs_msix() when request_irq() fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-37353
- Patch: debian11/5.10.221-1/CVE-2024-37353-virtio-delete-vq-in-vp-find-vqs-msix-when-request-irq-fails.patch
- From: 5.10.221-1
- CVE-2024-38590, CVSSv2 Score: 5.5
- Description:
RDMA/hns: Modify the print level of CQE error
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38590
- Patch: debian11/5.10.221-1/CVE-2024-38590-rdma-hns-modify-the-print-level-of-cqe-error.patch
- From: 5.10.221-1
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-37356
- Patch: debian11/5.10.221-1/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha.patch
- From: 5.10.221-1
- CVE-2024-37356, CVSSv2 Score: 5.5
- Description:
tcp: Fix shift-out-of-bounds in dctcp_update_alpha().
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-37356
- Patch: debian11/5.10.221-1/CVE-2024-37356-tcp-fix-shift-out-of-bounds-in-dctcp-update-alpha-kpatch.patch
- From: 5.10.221-1
- CVE-2024-39488, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture issue
- CVE:
- Patch: skipped/CVE-2024-39488.patch
- From:
- CVE-2024-38618, CVSSv2 Score: 5.5
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38618
- Patch: debian11/5.10.221-1/CVE-2024-38618-alsa-timer-set-lower-bound-of-start-tick-time.patch
- From: 5.10.221-1
- CVE-2024-38618, CVSSv2 Score: 5.5
- Description:
ALSA: timer: Set lower bound of start tick time
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38618
- Patch: debian11/5.10.221-1/CVE-2024-38618-ALSA-timer-Relax-start-tick-time-check-for-slave-timer-elements.patch
- From: 5.10.221-1
- CVE-2024-36974, CVSSv2 Score: 5.5
- Description:
net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-36974
- Patch: debian11/5.10.221-1/CVE-2024-36974-net-sched-taprio-always-validate-tca-taprio-attr-priomap.patch
- From: 5.10.221-1
- CVE-2024-40901, CVSSv2 Score: 7.8
- Description:
scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-40901
- Patch: debian11/5.10.221-1/CVE-2024-40901-scsi-mpt3sas-avoid-test-set-bit-operating-in-non-allocated-memory.patch
- From: 5.10.221-1
- CVE-2024-37078, CVSSv2 Score: 5.5
- Description:
nilfs2: fix potential kernel bug due to lack of writeback flag waiting
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-37078
- Patch: debian11/5.10.221-1/CVE-2024-37078-nilfs2-fix-potential-kernel-bug-due-to-lack-of-writeback-flag-waiting.patch
- From: 5.10.221-1
- CVE-2024-25741, CVSSv2 Score: 5.5
- Description:
usb: gadget: printer: fix races against disable
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-25741
- Patch: debian11/5.10.221-1/CVE-2024-25741-usb-gadget-printer-fix-races-against-disable.patch
- From: 5.10.221-1
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42154
- Patch: debian11/5.10.223-1/CVE-2024-42154-tcp-metrics-validate-source-addr-length.patch
- From: 5.10.223-1
- CVE-2024-42154, CVSSv2 Score: 9.8
- Description:
tcp_metrics: validate source addr length
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42154
- Patch: debian11/5.10.223-1/CVE-2024-42154-tcp-metrics-validate-source-addr-length-kpatch.patch
- From: 5.10.223-1
- CVE-2024-42161, CVSSv2 Score: 7.8
- Description:
bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42161
- Patch: debian11/5.10.223-1/CVE-2024-42161-bpf-avoid-uninitialized-value-in-bpf-core-read-bitfield.patch
- From: 5.10.223-1
- CVE-2024-42224, CVSSv2 Score: 7.8
- Description:
net: dsa: mv88e6xxx: Correct check for empty list
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42224
- Patch: debian11/5.10.223-1/CVE-2024-42224-net-dsa-mv88e6xxx-correct-check-for-empty-list.patch
- From: 5.10.223-1
- CVE-2024-41090, CVSSv2 Score: 7.1
- Description:
tap: add missing verification for short frame
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41090
- Patch: debian11/5.10.223-1/CVE-2024-41090-tap-add-missing-verification-for-short-frame.patch
- From: 5.10.223-1
- CVE-2024-41091, CVSSv2 Score: 7.1
- Description:
tun: add missing verification for short frame
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41091
- Patch: debian11/5.10.223-1/CVE-2024-41091-tun-add-missing-verification-for-short-frame.patch
- From: 5.10.223-1
- CVE-2024-42284, CVSSv2 Score: 7.8
- Description:
tipc: Return non-zero value from tipc_udp_addr2str() on error
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42284
- Patch: debian11/5.10.226-1/CVE-2024-42284-tipc-return-non-zero-value-from-tipc-udp-addr2str-on-error.patch
- From: 5.10.226-1
- CVE-2024-42301, CVSSv2 Score: 7.8
- Description:
dev/parport: fix the array out-of-bounds risk
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42301
- Patch: debian11/5.10.226-1/CVE-2024-42301-dev-parport-fix-the-array-out-of-bounds-risk.patch
- From: 5.10.226-1
- CVE-2024-44987, CVSSv2 Score: 7.8
- Description:
ipv6: prevent UAF in ip6_send_skb()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44987
- Patch: debian11/5.10.226-1/CVE-2024-44987-ipv6-prevent-uaf-in-ip6-send-skb.patch
- From: 5.10.226-1
- CVE-2024-44998, CVSSv2 Score: 7.8
- Description:
atm: idt77252: prevent use after free in dequeue_rx()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44998
- Patch: debian11/5.10.226-1/CVE-2024-44998-atm-idt77252-prevent-use-after-free-in-dequeue-rx.patch
- From: 5.10.226-1
- CVE-2024-46673, CVSSv2 Score: 7.8
- Description:
scsi: aacraid: Fix double-free on probe failure
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46673
- Patch: debian11/5.10.226-1/CVE-2024-46673-scsi-aacraid-fix-double-free-on-probe-failure.patch
- From: 5.10.226-1
- CVE-2024-46674, CVSSv2 Score: 7.8
- Description:
usb: dwc3: st: fix probed platform device ref count on probe error path
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46674
- Patch: debian11/5.10.226-1/CVE-2024-46674-usb-dwc3-st-fix-probed-platform-device-ref-count-on-probe-error-path.patch
- From: 5.10.226-1
- CVE-2024-46744, CVSSv2 Score: 7.8
- Description:
Squashfs: sanity check symbolic link size
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46744
- Patch: debian11/5.10.226-1/CVE-2024-46744-squashfs-sanity-check-symbolic-link-size.patch
- From: 5.10.226-1
- CVE-2024-46759, CVSSv2 Score: 7.8
- Description:
hwmon: (adc128d818) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46759
- Patch: debian11/5.10.226-1/CVE-2024-46759-hwmon-adc128d818-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-46844, CVSSv2 Score:
- Description:
Architecture um is not supported
- CVE:
- Patch: skipped/CVE-2024-46844.patch
- From:
- CVE-2024-42280, CVSSv2 Score: 7.8
- Description:
mISDN: Fix a use after free in hfcmulti_tx()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42280
- Patch: debian11/5.10.226-1/CVE-2024-42280-misdn-fix-a-use-after-free-in-hfcmulti-tx.patch
- From: 5.10.226-1
- CVE-2024-41011, CVSSv2 Score: 7.8
- Description:
drm/amdkfd: don't allow mapping the MMIO HDP page with large pages
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41011
- Patch: debian11/5.10.226-1/CVE-2024-41011-drm-amdkfd-don-t-allow-mapping-the-mmio-hdp-page-with-large-pages.patch
- From: 5.10.226-1
- CVE-2024-46818, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check gpio_id before used as array index
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46818
- Patch: debian11/5.10.226-1/CVE-2024-46818-drm-amd-display-check-gpio-id-before-used-as-array-index.patch
- From: 5.10.226-1
- CVE-2024-46814, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check msg_id before processing transcation
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46814
- Patch: debian11/5.10.226-1/CVE-2024-46814-drm-amd-display-check-msg-id-before-processing-transcation.patch
- From: 5.10.226-1
- CVE-2024-46725, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix out-of-bounds write warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46725
- Patch: debian11/5.10.226-1/CVE-2024-46725-drm-amdgpu-fix-out-of-bounds-write-warning.patch
- From: 5.10.226-1
- CVE-2024-44974, CVSSv2 Score: 7.8
- Description:
mptcp: pm: avoid possible UaF when selecting endp
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44974
- Patch: debian11/5.10.226-1/CVE-2024-44974-mptcp-pm-avoid-possible-uaf-when-selecting-endp.patch
- From: 5.10.226-1
- CVE-2024-46757, CVSSv2 Score: 7.8
- Description:
hwmon: (nct6775-core) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46757
- Patch: debian11/5.10.226-1/CVE-2024-46757-hwmon-nct6775-core-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-46756, CVSSv2 Score: 7.8
- Description:
hwmon: (w83627ehf) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46756
- Patch: debian11/5.10.226-1/CVE-2024-46756-hwmon-w83627ehf-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-43858, CVSSv2 Score: 7.8
- Description:
jfs: Fix array-index-out-of-bounds in diFree
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43858
- Patch: debian11/5.10.226-1/CVE-2024-43858-jfs-fix-array-index-out-of-bounds-in-difree.patch
- From: 5.10.226-1
- CVE-2024-46798, CVSSv2 Score: 7.8
- Description:
ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46798
- Patch: debian11/5.10.226-1/CVE-2024-46798-asoc-dapm-fix-uaf-for-snd-soc-pcm-runtime-object.patch
- From: 5.10.226-1
- CVE-2024-46758, CVSSv2 Score: 7.8
- Description:
hwmon: (lm95234) Fix underflows seen when writing limit attributes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46758
- Patch: debian11/5.10.226-1/CVE-2024-46758-hwmon-lm95234-fix-underflows-seen-when-writing-limit-attributes.patch
- From: 5.10.226-1
- CVE-2024-46738, CVSSv2 Score: 7.8
- Description:
VMCI: Fix use-after-free when removing resource in vmci_resource_remove()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46738
- Patch: debian11/5.10.226-1/CVE-2024-46738-vmci-fix-use-after-free-when-removing-resource-in-vmci-resource-remove.patch
- From: 5.10.226-1
- CVE-2024-46800, CVSSv2 Score: 7.8
- Description:
sch/netem: fix use after free in netem_dequeue
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46800
- Patch: debian11/5.10.226-1/CVE-2024-46800-sch-netem-fix-use-after-free-in-netem-dequeue.patch
- From: 5.10.226-1
- CVE-2024-42313, CVSSv2 Score: 7.8
- Description:
media: venus: fix use after free in vdec_close
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42313
- Patch: debian11/5.10.226-1/CVE-2024-42313-media-venus-fix-use-after-free-in-vdec-close.patch
- From: 5.10.226-1
- CVE-2024-38577, CVSSv2 Score: 7.8
- Description:
rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-38577
- Patch: debian11/5.10.226-1/CVE-2024-38577-rcu-tasks-fix-show-rcu-tasks-trace-gp-kthread-buffer-overflow.patch
- From: 5.10.226-1
- CVE-2024-46700, CVSSv2 Score:
- Description:
Out of scope: Android/binder
- CVE:
- Patch: skipped/CVE-2024-46700.patch
- From:
- CVE-2024-46804, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Check index msg_id before read or write (dependency)
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46804
- Patch: debian11/5.10.226-1/CVE-2024-46804-drm-amd-display-Check-index-msg_id-before-read-or-write.patch
- From: 5.10.226-1
- CVE-2024-46804, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Add array index check for hdcp ddc access
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46804
- Patch: debian11/5.10.226-1/CVE-2024-46804-drm-amd-display-add-array-index-check-for-hdcp-ddc-access.patch
- From: 5.10.226-1
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27397
- Patch: debian11/5.10.226-1/CVE-2024-27397-netfilter-nf-tables-use-timestamp-to-check-for-set-element-timeout.patch
- From: 5.10.226-1
- CVE-2024-27397, CVSSv2 Score: 7.0
- Description:
netfilter: nf_tables: use timestamp to check for set element timeout
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-27397
- Patch: debian11/5.10.226-1/CVE-2024-27397-netfilter-nf_tables-use-timestamp-to-check-for-set-element-timeout-kpatch.patch
- From: linux-5.10.226-1
- CVE-2024-43854, CVSSv2 Score: 5.5
- Description:
block: initialize integrity buffer to zero before writing it to media
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43854
- Patch: debian11/5.10.226-1/CVE-2024-43854-block-initialize-integrity-buffer-to-zero-before-writing-it-to-media.patch
- From: 5.10.226-1
- CVE-2024-43860, CVSSv2 Score: 5.5
- Description:
remoteproc: imx_rproc: Skip over memory region when node value is NULL
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43860
- Patch: debian11/5.10.226-1/CVE-2024-43860-remoteproc-imx-rproc-skip-over-memory-region-when-node-value-is-null.patch
- From: 5.10.226-1
- CVE-2024-44952, CVSSv2 Score:
- Description:
Patch introduced a deadlock and was reverted.
- CVE:
- Patch: skipped/CVE-2024-44952.patch
- From:
- CVE-2024-46685, CVSSv2 Score: 5.5
- Description:
pinctrl: single: fix potential NULL dereference in pcs_get_function()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46685
- Patch: debian11/5.10.226-1/CVE-2024-46685-pinctrl-single-fix-potential-null-dereference-in-pcs-get-function.patch
- From: 5.10.226-1
- CVE-2024-41042, CVSSv2 Score: 5.5
- Description:
netfilter: nf_tables: prefer nft_chain_validate
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-41042
- Patch: debian11/5.10.226-1/CVE-2024-41042-netfilter-nf-tables-prefer-nft-chain-validate.patch
- From: 5.10.226-1
- CVE-2024-46780, CVSSv2 Score: 5.5
- Description:
nilfs2: replace snprintf in show functions with sysfs_emit
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46780
- Patch: debian11/5.10.226-1/CVE-2024-46780-nilfs2-replace-snprintf-in-show-functions-with-sysfs-emit.patch
- From: 5.10.226-1
- CVE-2024-46780, CVSSv2 Score: 5.5
- Description:
nilfs2: protect references to superblock parameters exposed in sysfs
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46780
- Patch: debian11/5.10.226-1/CVE-2024-46780-nilfs2-protect-references-to-superblock-parameters-exposed-in-sysfs.patch
- From: 5.10.226-1
- CVE-2024-45025, CVSSv2 Score: 5.5
- Description:
fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE
- CVE: https://linux.oracle.com/cve/CVE-2024-45025.html
- Patch: debian11/5.10.226-1/CVE-2024-45025-fix-bitmap-corruption-on-close-range-with-close-range-unshare.patch
- From: 5.4.17-2136.337.5.el8uek
- CVE-2024-46679, CVSSv2 Score: 5.5
- Description:
ethtool: check device is present when getting link settings
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46679
- Patch: debian11/5.10.226-1/CVE-2024-46679-ethtool-check-device-is-present-when-getting-link-settings.patch
- From: 5.10.226-1
- CVE-2024-42310, CVSSv2 Score: 5.5
- Description:
drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42310
- Patch: debian11/5.10.226-1/CVE-2024-42310-drm-gma500-fix-null-pointer-dereference-in-cdv-intel-lvds-get-modes.patch
- From: 5.10.226-1
- CVE-2024-42305, CVSSv2 Score: 5.5
- Description:
ext4: check dot and dotdot of dx_root before making dir indexed
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42305
- Patch: debian11/5.10.226-1/CVE-2024-42305-ext4-check-dot-and-dotdot-of-dx-root-before-making-dir-indexed.patch
- From: 5.10.226-1
- CVE-2024-46723, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix ucode out-of-bounds read warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46723
- Patch: debian11/5.10.226-1/CVE-2024-46723-drm-amdgpu-fix-ucode-out-of-bounds-read-warning.patch
- From: 5.10.226-1
- CVE-2024-46724, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46724
- Patch: debian11/5.10.226-1//CVE-2024-46724-drm-amdgpu-fix-out-of-bounds-read-of-df-v1-7-channel-number.patch
- From: 5.10.226-1
- CVE-2024-46731, CVSSv2 Score: 7.1
- Description:
drm/amd/pm: fix the Out-of-bounds read warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46731
- Patch: debian11/5.10.226-1/CVE-2024-46731-drm-amd-pm-fix-the-out-of-bounds-read-warning.patch
- From: 5.10.226-1
- CVE-2024-46747, CVSSv2 Score: 7.1
- Description:
HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46747
- Patch: debian11/5.10.226-1/CVE-2024-46747-hid-cougar-fix-slab-out-of-bounds-read-in-cougar-report-fixup.patch
- From: 5.10.226-1
- CVE-2024-46743, CVSSv2 Score: 7.1
- Description:
of/irq: Prevent device address out-of-bounds read in interrupt map walk
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46743
- Patch: debian11/5.10.226-1/CVE-2024-46743-of-irq-prevent-device-address-out-of-bounds-read-in-interrupt-map-walk.patch
- From: 5.10.226-1
- CVE-2024-46722, CVSSv2 Score: 7.1
- Description:
drm/amdgpu: fix mc_data out-of-bounds read warning
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46722
- Patch: debian11/5.10.226-1/CVE-2024-46722-drm-amdgpu-fix-mc-data-out-of-bounds-read-warning.patch
- From: 5.10.226-1
- CVE-2024-44999, CVSSv2 Score: 7.1
- Description:
gtp: pull network headers in gtp_dev_xmit()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-44999
- Patch: debian11/5.10.226-1/CVE-2024-44999-gtp-pull-network-headers-in-gtp-dev-xmit.patch
- From: 5.10.226-1
- CVE-2024-43882, CVSSv2 Score: 7.0
- Description:
exec: Fix ToCToU between perm check and set-uid/gid usage
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-43882
- Patch: debian11/5.10.226-1/CVE-2024-43882-exec-fix-toctou-between-perm-check-and-set-uid-gid-usage.patch
- From: 5.10.226-1
- CVE-2024-42228, CVSSv2 Score: 7.0
- Description:
drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-42228
- Patch: debian11/5.10.226-1/CVE-2024-42228-drm-amdgpu-using-uninitialized-value-size-when-calling-amdgpu-vce-cs-reloc.patch
- From: 5.10.226-1
- CVE-2024-46849, CVSSv2 Score: 7.8
- Description:
ASoC: meson: axg-card: fix 'use-after-free'
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46849
- Patch: debian11/5.10.234-1/CVE-2024-46849-asoc-meson-axg-card-fix-use-after-free.patch
- From: 5.10.234-1
- CVE-2024-47670, CVSSv2 Score: 7.8
- Description:
ocfs2: add bounds checking to ocfs2_xattr_find_entry()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-47670
- Patch: debian11/5.10.234-1/CVE-2024-47670-ocfs2-add-bounds-checking-to-ocfs2-xattr-find-entry.patch
- From: 5.10.234-1
- CVE-2024-47685, CVSSv2 Score: 9.1
- Description:
netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-47685
- Patch: debian11/5.10.234-1/CVE-2024-47685-netfilter-nf-reject-ipv6-fix-nf-reject-ip6-tcphdr-put.patch
- From: 5.10.234-1
- CVE-2024-49883, CVSSv2 Score: 7.8
- Description:
ext4: aovid use-after-free in ext4_ext_insert_extent()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49883
- Patch: debian11/5.10.234-1/CVE-2024-49883-ext4-aovid-use-after-free-in-ext4-ext-insert-extent.patch
- From: 5.10.234-1
- CVE-2024-49966, CVSSv2 Score: 7.8
- Description:
ocfs2: cancel dqi_sync_work before freeing oinfo
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49966
- Patch: debian11/5.10.234-1/CVE-2024-49966-ocfs2-cancel-dqi-sync-work-before-freeing-oinfo.patch
- From: 5.10.234-1
- CVE-2024-50151, CVSSv2 Score: 7.8
- Description:
smb: client: fix OOBs when building SMB2_IOCTL request
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50151
- Patch: debian11/5.10.234-1/CVE-2024-50151-smb-client-fix-oobs-when-building-smb2-ioctl-request.patch
- From: 5.10.234-1
- CVE-2024-53061, CVSSv2 Score: 7.8
- Description:
media: s5p-jpeg: prevent buffer overflows
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53061
- Patch: debian11/5.10.234-1/CVE-2024-53061-media-s5p-jpeg-prevent-buffer-overflows.patch
- From: 5.10.234-1
- CVE-2024-49996, CVSSv2 Score: 7.8
- Description:
cifs: Fix buffer overflow when parsing NFS reparse points
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49996
- Patch: debian11/5.10.234-1/CVE-2024-49996-cifs-fix-buffer-overflow-when-parsing-nfs-reparse-points.patch
- From: 5.10.234-1
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53237
- Patch: debian11/5.10.234-1/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child.patch
- From: 5.10.234-1
- CVE-2024-53237, CVSSv2 Score: 7.8
- Description:
Bluetooth: fix use-after-free in device_for_each_child()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53237
- Patch: debian11/5.10.234-1/CVE-2024-53237-bluetooth-fix-use-after-free-in-device-for-each-child-kpatch.patch
- From: 5.10.234-1
- CVE-2024-56596, CVSSv2 Score: 7.8
- Description:
jfs: fix array-index-out-of-bounds in jfs_readdir
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56596
- Patch: debian11/5.10.234-1/CVE-2024-56596-jfs-fix-array-index-out-of-bounds-in-jfs-readdir.patch
- From: 5.10.234-1
- CVE-2024-49894, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix index out of bounds in degamma hardware format translation
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49894
- Patch: debian11/5.10.234-1/CVE-2024-49894-drm-amd-display-fix-index-out-of-bounds-in-degamma-hardware-format-translation.patch
- From: 5.10.234-1
- CVE-2024-49884, CVSSv2 Score: 7.8
- Description:
ext4: fix slab-use-after-free in ext4_split_extent_at()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-49884
- Patch: debian11/5.10.234-1/CVE-2024-49884-ext4-fix-slab-use-after-free-in-ext4-split-extent-at.patch
- From: 5.10.234-1
- CVE-2024-53057, CVSSv2 Score: 7.8
- Description:
net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53057
- Patch: debian11/5.10.234-1/CVE-2024-53057-net-sched-stop-qdisc-tree-reduce-backlog-on-tc-h-root.patch
- From: 5.10.234-1
- CVE-2024-53173, CVSSv2 Score: 7.8
- Description:
NFSv4.0: Fix a use-after-free problem in the asynchronous open()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53173
- Patch: debian11/5.10.234-1/CVE-2024-53173-nfsv4-0-fix-a-use-after-free-problem-in-the-asynchronous-open.patch
- From: 5.10.234-1
- CVE-2024-56642, CVSSv2 Score: 7.8
- Description:
tipc: Fix use-after-free of kernel socket in cleanup_bearer().
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56642
- Patch: debian11/5.10.234-1/CVE-2024-56642-tipc-fix-use-after-free-of-kernel-socket-in-cleanup-bearer.patch
- From: 5.10.234-1
- CVE-2024-56602, CVSSv2 Score: 7.8
- Description:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56602
- Patch: debian11/5.10.234-1/CVE-2024-56602-net-ieee802154-do-not-leave-a-dangling-sk-pointer-in-ieee802154-create.patch
- From: 5.10.234-1
- CVE-2024-56600, CVSSv2 Score: 7.8
- Description:
net: inet6: do not leave a dangling sk pointer in inet6_create()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56600
- Patch: debian11/5.10.234-1/CVE-2024-56600-net-inet6-do-not-leave-a-dangling-sk-pointer-in-inet6-create.patch
- From: 5.10.234-1
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-57951
- Patch: debian11/5.10.234-1/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug.patch
- From: 5.10.234-1
- CVE-2024-57951, CVSSv2 Score: 7.8
- Description:
hrtimers: Handle CPU state correctly on hotplug
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-57951
- Patch: debian11/5.10.234-1/CVE-2024-57951-hrtimers-handle-cpu-state-correctly-on-hotplug-kpatch.patch
- From: 5.10.234-1
- CVE-2024-56672, CVSSv2 Score: 7.8
- Description:
blk-cgroup: Fix UAF in blkcg_unpin_online()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56672
- Patch: debian11/5.10.234-1/CVE-2024-56672-blk-cgroup-fix-uaf-in-blkcg-unpin-online.patch
- From: 5.10.234-1
- CVE-2024-56766, CVSSv2 Score: 7.8
- Description:
mtd: rawnand: fix double free in atmel_pmecc_create_user()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56766
- Patch: debian11/5.10.234-1/CVE-2024-56766-mtd-rawnand-fix-double-free-in-atmel-pmecc-create-user.patch
- From: 5.10.234-1
- CVE-2024-53104, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-53104
- Patch: debian11/5.10.230-1/CVE-2024-53104-media-uvcvideo-Skip-parsing-frames-of-type-UVC_VS_UN.patch
- From: 5.10.230
- CVE-2024-58069, CVSSv2 Score: 7.8
- Description:
rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-58069
- Patch: debian11/5.10.237-1/CVE-2024-58069-rtc-pcf85063-fix-potential-oob-write-in-pcf85063-nvmem-read.patch
- From: 5.10.237-1
- CVE-2025-21715, CVSSv2 Score: 7.8
- Description:
net: davicom: fix UAF in dm9000_drv_remove
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21715
- Patch: debian11/5.10.237-1/CVE-2025-21715-net-davicom-fix-uaf-in-dm9000-drv-remove.patch
- From: 5.10.237-1
- CVE-2025-21735, CVSSv2 Score: 7.8
- Description:
NFC: nci: Add bounds checking in nci_hci_create_pipe()
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21735
- Patch: debian11/5.10.237-1/CVE-2025-21735-nfc-nci-add-bounds-checking-in-nci-hci-create-pipe.patch
- From: 5.10.237-1
- CVE-2025-21785, CVSSv2 Score:
- Description:
Out of scope: ARM64 architecture isn't supported for current kernel
- CVE:
- Patch: skipped/CVE-2025-21785.patch
- From:
- CVE-2025-22056, CVSSv2 Score:
- Description:
Postponed: complex analysis and adaptation required
- CVE:
- Patch: skipped/CVE-2025-22056.patch
- From:
- CVE-2024-46812, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46812
- Patch: debian11/5.10.237-1/CVE-2024-46812-drm-amd-display-skip-inactive-planes-within-modesupportandsystemconfiguration.patch
- From: 5.10.237-1
- CVE-2025-37838, CVSSv2 Score: 7.8
- Description:
HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-37838
- Patch: debian11/5.10.237-1/CVE-2025-37838-hsi-ssi-protocol-fix-use-after-free-vulnerability-in-ssi-protocol-driver-due-to-race-condition.patch
- From: 5.10.237-1
- CVE-2024-50154, CVSSv2 Score: 7.8
- Description:
tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50154
- Patch: debian11/5.10.237-1/CVE-2024-50154-tcp-dccp-don-t-use-timer-pending-in-reqsk-queue-unlink.patch
- From: 5.10.237-1
- CVE-2021-47247, CVSSv2 Score: 7.8
- Description:
net/mlx5e: Fix use-after-free of encap entry in neigh update handler
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-47247
- Patch: debian11/5.10.237-1/CVE-2021-47247-net-mlx5e-fix-use-after-free-of-encap-entry-in-neigh-update-handler.patch
- From: 5.10.237-1
- CVE-2021-47489, CVSSv2 Score: 7.8
- Description:
drm/amdgpu: Fix even more out of bound writes from debugfs
- CVE: https://security-tracker.debian.org/tracker/CVE-2021-47489
- Patch: debian11/5.10.237-1/CVE-2021-47489-drm-amdgpu-fix-even-more-out-of-bound-writes-from-debugfs.patch
- From: 5.10.237-1
- CVE-2023-52752, CVSSv2 Score: 8.4
- Description:
smb: client: fix use-after-free bug in cifs_debug_data_proc_show()
- CVE: https://security-tracker.debian.org/tracker/CVE-2023-52752
- Patch: debian11/5.10.237-1/CVE-2023-52752-smb-client-fix-use-after-free-bug-in-cifs-debug-data-proc-show.patch
- From: 5.10.237-1
- CVE-2024-50280, CVSSv2 Score: 7.8
- Description:
dm cache: fix flushing uninitialized delayed_work on cache_ctr error
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50280
- Patch: debian11/5.10.237-1/CVE-2024-50280-dm-cache-fix-flushing-uninitialized-delayed-work-on-cache-ctr-error.patch
- From: 5.10.237-1
- CVE-2025-21858, CVSSv2 Score: 7.8
- Description:
geneve: Fix use-after-free in geneve_find_dev().
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21858
- Patch: debian11/5.10.237-1/CVE-2025-21858-geneve-fix-use-after-free-in-geneve-find-dev.patch
- From: 5.10.237-1
- CVE-2025-21858, CVSSv2 Score: 7.8
- Description:
geneve: Suppress list corruption splat in geneve_destroy_tunnels().
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21858
- Patch: debian11/5.10.237-1/CVE-2025-21858-geneve-Suppress-list-corruption-splat-in-geneve_destroy_tunnels.patch
- From: 5.10.237-1
- CVE-2024-57980, CVSSv2 Score: 7.8
- Description:
media: uvcvideo: Fix double free in error path
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-57980
- Patch: debian11/5.10.237-1/CVE-2024-57980-media-uvcvideo-fix-double-free-in-error-path.patch
- From: 5.10.237-1
- CVE-2025-21811, CVSSv2 Score: 7.8
- Description:
nilfs2: protect access to buffers with no active references
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21811
- Patch: debian11/5.10.237-1/CVE-2025-21811-nilfs2-protect-access-to-buffers-with-no-active-references.patch
- From: 5.10.237-1
- CVE-2024-50047, CVSSv2 Score: 7.8
- Description:
smb: client: fix UAF in async decryption
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50047
- Patch: debian11/5.10.237-1/CVE-2024-50047-smb-client-fix-UAF-in-async-decryption.patch
- From: 5.10.237-1
- CVE-2024-50047, CVSSv2 Score: 7.8
- Description:
smb: client: fix NULL ptr deref in crypto_aead_setkey()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-50047
- Patch: debian11/5.10.237-1/CVE-2024-50047-smb-client-fix-NULL-ptr-deref-in-crypto_aead_setkey.patch
- From: 5.10.237-1
- CVE-2025-21731, CVSSv2 Score: 7.8
- Description:
nbd: don't allow reconnect after disconnect
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21731
- Patch: debian11/5.10.237-1/CVE-2025-21731-nbd-don-t-allow-reconnect-after-disconnect.patch
- From: 5.10.237-1
- CVE-2025-21700, CVSSv2 Score: 7.8
- Description:
net: sched: Disallow replacing of child qdisc from one parent to another
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21700
- Patch: debian11/5.10.237-1/CVE-2025-21700-net-sched-disallow-replacing-of-child-qdisc-from-one-parent-to-another.patch
- From: 5.10.237-1
- CVE-2025-21727, CVSSv2 Score: 7.8
- Description:
padata: fix UAF in padata_reorder
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21727
- Patch: debian11/5.10.237-1/CVE-2025-21727-padata-fix-uaf-in-padata-reorder.patch
- From: 5.10.237-1
- CVE-2025-21934, CVSSv2 Score: 7.8
- Description:
rapidio: fix an API misues when rio_add_net() fails
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-21934
- Patch: debian11/5.10.237-1/CVE-2025-21934-rapidio-fix-an-api-misues-when-rio-add-net-fails.patch
- From: 5.10.237-1
- CVE-2025-22020, CVSSv2 Score: 7.8
- Description:
memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-22020
- Patch: debian11/5.10.237-1/CVE-2025-22020-memstick-rtsx-usb-ms-fix-slab-use-after-free-in-rtsx-usb-ms-drv-remove.patch
- From: 5.10.237-1
- CVE-2024-46821, CVSSv2 Score: 7.8
- Description:
drm/amd/pm: Fix negative array index read
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-46821
- Patch: debian11/5.10.237-1/CVE-2024-46821-drm-amd-pm-fix-negative-array-index-read.patch
- From: 5.10.237-1
- CVE-2025-22035, CVSSv2 Score: 7.8
- Description:
tracing: Fix use-after-free in print_graph_function_flags during tracer switching
- CVE: https://security-tracker.debian.org/tracker/CVE-2025-22035
- Patch: debian11/5.10.237-1/CVE-2025-22035-tracing-fix-use-after-free-in-print-graph-function-flags-during-tracer-switching.patch
- From: 5.10.237-1
- CVE-2024-56608, CVSSv2 Score: 7.8
- Description:
drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-56608
- Patch: debian11/5.10.237-1/CVE-2024-56608-drm-amd-display-fix-out-of-bounds-access-in-dcn21-link-encoder-create.patch
- From: 5.10.237-1
- CVE-2024-26928, CVSSv2 Score: 7.8
- Description:
smb: client: fix potential UAF in cifs_debug_files_proc_show()
- CVE: https://security-tracker.debian.org/tracker/CVE-2024-26928
- Patch: debian11/5.10.237-1/CVE-2024-26928-smb-client-fix-potential-uaf-in-cifs-debug-files-proc-show.patch
- From: 5.10.237-1
- N/A, CVSSv2 Score:
- Description:
Restrict access to pagemap/kpageflags/kpagecount
- CVE: http://googleprojectzero.blogspot.ru/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
- Patch: 5.10.0/proc-restrict-pagemap-access.patch
- From: