Search for packages
| purl | pkg:deb/debian/linux@5.10.244-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1471-btm1-1qcg | kernel: nfsd: Initialize ssc before laundromat_work to prevent NULL dereference |
CVE-2025-38231
|
| VCID-14hp-mh7a-ayef | kernel: sch_htb: make htb_qlen_notify() idempotent |
CVE-2025-37932
|
| VCID-17j1-c3fv-wyej | kernel: net_sched: Flush gso_skb list too during ->change() |
CVE-2025-37992
|
| VCID-17jc-frw3-v3ep | kernel: media: venus: protect against spurious interrupts during probe |
CVE-2025-39709
|
| VCID-18wu-uw8m-myc2 | kernel: iio: light: as73211: Ensure buffer holes are zeroed |
CVE-2025-39687
|
| VCID-1brz-b2qw-pbhy | kernel: comedi: aio_iiro_16: Fix bit shift out of bounds |
CVE-2025-38529
|
| VCID-1dr9-d7qp-abbs | kernel: bcache: fix NULL pointer in cache_set_flush() |
CVE-2025-38263
|
| VCID-1es2-2yzp-6ufp | kernel: f2fs: fix to avoid out-of-boundary access in devs.path |
CVE-2025-38652
|
| VCID-1jvn-mqky-83d5 | kernel: wifi: cfg80211: fix use-after-free in cmp_bss() |
CVE-2025-39864
|
| VCID-1u7s-ayax-x3fs | kernel: iwlwifi: Add missing check for alloc_ordered_workqueue |
CVE-2025-38602
|
| VCID-1z95-hqym-fbcc | kernel: tee: fix NULL pointer dereference in tee_shm_put |
CVE-2025-39865
|
| VCID-26p9-kfem-6yar | kernel: pptp: ensure minimal skb length in pptp_xmit() |
CVE-2025-38574
|
| VCID-27tf-w55m-97gh | kernel: net_sched: sch_sfq: don't allow 1 packet limit |
CVE-2024-57996
|
| VCID-2ahz-hvvc-n3cd | kernel: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo |
CVE-2025-37970
|
| VCID-2e9y-367d-r7d3 | kernel: netfilter: xt_nfacct: don't assume acct name is null-terminated |
CVE-2025-38639
|
| VCID-2gxn-97ry-tfec | kernel: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() |
CVE-2025-38249
|
| VCID-2nk9-4y34-vkba | kernel: dmaengine: ti: Add NULL check in udma_probe() |
CVE-2025-38138
|
| VCID-2tkt-trv2-d7gf | kernel: Linux kernel: Denial of Service in ftrace due to race condition in trace_printk_seq |
CVE-2025-39813
|
| VCID-36e2-uj9a-6baj | kernel: tracing: Limit access to parser->buffer when trace_get_user failed |
CVE-2025-39683
|
| VCID-3a7k-7tcz-yfcw | kernel: openvswitch: Fix unsafe attribute parsing in output_userspace() |
CVE-2025-37998
|
| VCID-3pqh-5kcf-q3cm | kernel: f2fs: fix to do sanity check on sit_bitmap_size |
CVE-2025-38218
|
| VCID-3q3e-m1px-sfcc | kernel: ARM: rockchip: fix kernel hang during smp initialization |
CVE-2025-39752
|
| VCID-3thc-wed7-1bhn | kernel: jfs: Regular file corruption check |
CVE-2025-38698
|
| VCID-3w2h-qpev-p7d2 | kernel: hfsplus: remove mutex_lock check in hfsplus_free_extents |
CVE-2025-38650
|
| VCID-3wec-9zyd-n7ay | kernel: Linux kernel kTLS: Denial of Service from uninitialized data transmission |
CVE-2025-38608
|
| VCID-3yy5-gnkd-kkhg | kernel: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT |
CVE-2025-38439
|
| VCID-3yy5-tvhs-bygv | kernel: Linux kernel: `iommu/amd`: Buffer overflow in `parse_ivrs_acpihid` |
CVE-2025-37927
|
| VCID-3z58-qk98-9fby | kernel: net/packet: fix a race in packet_set_ring() and packet_notifier() |
CVE-2025-38617
|
| VCID-46ph-9mta-yqhy | kernel: drm/sched: Increment job count before swapping tail spsc queue |
CVE-2025-38515
|
| VCID-4785-svcx-fqc3 | kernel: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock |
CVE-2025-38058
|
| VCID-47ch-yrmn-7yfu | kernel: HID: core: ensure the allocated report buffer can contain the reserved report ID |
CVE-2025-38495
|
| VCID-48g7-8qwz-rkg7 | kernel: hfs: fix slab-out-of-bounds in hfs_bnode_read() |
CVE-2025-38715
|
| VCID-4a1v-kwks-e3ew | kernel: atm: Revert atm_account_tx() if copy_from_iter_full() fails |
CVE-2025-38190
|
| VCID-4d5z-v3d2-2bb7 | kernel: netfilter: nf_reject: don't leak dst refcount for loopback packets |
CVE-2025-38732
|
| VCID-4edg-3cps-d3dd | kernel: block: don't call rq_qos_ops->done_bio if the bio isn't tracked |
CVE-2021-47412
|
| VCID-4eg6-1ts3-fqek | kernel: ext4: inline: fix len overflow in ext4_prepare_inline_data |
CVE-2025-38222
|
| VCID-4emc-x9jp-57d8 | kernel: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). |
CVE-2025-38460
|
| VCID-4hxs-uzt2-x3b8 | kernel: f2fs: fix to do sanity check on ino and xnid |
CVE-2025-38347
|
| VCID-4j6j-3d7w-zfe6 | kernel: net_sched: red: fix a race in __red_change() |
CVE-2025-38108
|
| VCID-4ja6-dv1f-mydc | kernel: PCI: endpoint: Fix configfs group list head handling |
CVE-2025-39783
|
| VCID-4k7z-wxx8-jyg3 | kernel: Linux kernel VMCI: Denial of Service via GPF |
CVE-2023-53259
|
| VCID-4nak-rmgk-jybq | kernel: sctp: initialize more fields in sctp_v6_from_sk() |
CVE-2025-39812
|
| VCID-4p7y-3e4e-6yhd | kernel: media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() |
CVE-2025-39713
|
| VCID-4pfh-69kg-17bc | kernel: smb: client: Fix use-after-free in cifs_fill_dirent |
CVE-2025-38051
|
| VCID-4qwu-fw8y-t7et | kernel: jfs: Fix null-ptr-deref in jfs_ioc_trim |
CVE-2025-38203
|
| VCID-4uds-n12w-aket | kernel: soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled |
CVE-2025-38487
|
| VCID-51rd-4qg2-rkb4 | kernel: comedi: das16m1: Fix bit shift out of bounds |
CVE-2025-38483
|
| VCID-5574-kh48-93hy | kernel: platform/x86: dell_rbu: Fix list usage |
CVE-2025-38197
|
| VCID-55rr-9h4c-1ugn | kernel: scsi: pm80xx: Fix memory leak during rmmod |
CVE-2021-47193
|
| VCID-5bym-ak3k-8yg7 | kernel: Linux kernel: Denial of Service via excessive file descriptor table allocation |
CVE-2025-39756
|
| VCID-5ed9-6yn1-t7f3 | kernel: pNFS: Fix uninited ptr deref in block/scsi layout |
CVE-2025-38691
|
| VCID-5mxa-xpvq-dka1 | kernel: net_sched: qfq: Fix double list add in class with netem as child qdisc |
CVE-2025-37913
|
| VCID-5nak-sax2-m3fa | kernel: wifi: mwifiex: Initialize the chan_stats array to zero |
CVE-2025-39891
|
| VCID-5r96-czfc-hygr | kernel: clk: davinci: Add NULL check in davinci_lpsc_clk_register() |
CVE-2025-38635
|
| VCID-5tyw-xkgy-cfgz | kernel: Linux kernel: Local privilege escalation or denial of service in usb: net: sierra driver |
CVE-2025-38474
|
| VCID-5w4u-gzpx-tqan | kernel: Linux kernel: Denial of Service due to invalid queueing discipline (qdisc) parent class handling |
CVE-2025-38457
|
| VCID-5xcb-e2am-s7en | kernel: f2fs: fix to avoid UAF in f2fs_sync_inode_meta() |
CVE-2025-38578
|
| VCID-5xm3-xwqf-ebce | kernel: Linux kernel: Local Denial of Service in network scheduler |
CVE-2025-38115
|
| VCID-5xsd-59cv-vyc6 | kernel: soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() |
CVE-2025-38145
|
| VCID-6233-92av-nfdg | kernel: iio: light: opt3001: fix deadlock due to concurrent flag access |
CVE-2025-37968
|
| VCID-62jz-qpdg-kyhe | kernel: NFS: Fix a race when updating an existing write |
CVE-2025-39697
|
| VCID-6a6r-5fwk-u3ax | kernel: Linux kernel: Use-After-Free vulnerability in PCM OSS layer due to race condition |
CVE-2025-38078
|
| VCID-6hh8-5da7-2qcc | kernel: net/sched: Always pass notifications when child class becomes empty |
CVE-2025-38350
|
| VCID-6kyx-94dd-buas | kernel: Linux kernel: Denial of Service in ath11k wifi driver due to list node corruption |
CVE-2025-38293
|
| VCID-6zr9-dcw4-8yg9 | kernel: Linux kernel Open vSwitch: Denial of Service via malformed MPLS packets |
CVE-2025-38146
|
| VCID-75fw-e7zr-qufc | kernel: nvmet-tcp: don't restore null sk_state_change |
CVE-2025-38035
|
| VCID-7a9q-ppkr-53cx | kernel: Linux kernel: Double-free vulnerability in fsl-mc bus driver can lead to denial of service, information disclosure, or arbitrary code execution. |
CVE-2025-38313
|
| VCID-7bqh-pzdg-bkez | kernel: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() |
CVE-2025-39742
|
| VCID-7cnv-qdcn-3qhq | kernel: xenbus: Use kref to track req lifetime |
CVE-2025-37949
|
| VCID-7jmm-2y4z-u3bj | kernel: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() |
CVE-2025-38061
|
| VCID-7key-3jrb-skg2 | kernel: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() |
CVE-2025-38399
|
| VCID-7p9b-nj4u-bbak | kernel: HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras |
CVE-2025-38540
|
| VCID-7pzg-z5p7-wuck | kernel: crypto: marvell/cesa - Handle zero-length skcipher requests |
CVE-2025-38173
|
| VCID-7sq6-1tjz-6qgh | kernel: usb: potential integer overflow in usbg_make_tpg() |
CVE-2025-68750
|
| VCID-7vhj-ptcf-cuc1 | kernel: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() |
CVE-2025-38458
|
| VCID-7zgg-nmhf-zuhx | kernel: netfilter: ipset: fix region locking in hash types |
CVE-2025-37997
|
| VCID-88uv-n88p-9feg | kernel: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo |
CVE-2025-37969
|
| VCID-8amw-qaqv-37c6 | kernel: perf/core: Exit early on perf_mmap() fail |
CVE-2025-38565
|
| VCID-8bmj-tczd-k7gm | kernel: bpf: Fix WARN() in get_bpf_raw_tp_regs |
CVE-2025-38285
|
| VCID-8dbn-tnsj-4bbe | kernel: Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() |
CVE-2025-38473
|
| VCID-8ke9-myay-nyer | kernel: scsi: qla4xxx: Prevent a potential error pointer dereference |
CVE-2025-39676
|
| VCID-8sw8-s4yy-u7dk | kernel: ALSA: usb-audio: Validate UAC3 power domain descriptors, too |
CVE-2025-38729
|
| VCID-8w8t-pnnc-1yc9 | kernel: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper |
CVE-2025-39681
|
| VCID-8zhx-68dt-1bbf | kernel: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() |
CVE-2025-37798
|
| VCID-9aq6-tyaw-nuck | kernel: x86/vmscape: Add conditional IBPB mitigation |
CVE-2025-40300
|
| VCID-9ats-p2j3-qub2 | kernel: jfs: upper bound check of tree index in dbAllocAG |
CVE-2025-38697
|
| VCID-9brg-t4ed-akbw | kernel: vsock: Do not allow binding to VMADDR_PORT_ANY |
CVE-2025-38618
|
| VCID-9d1v-c3ex-kfez | kernel: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race |
CVE-2025-38085
|
| VCID-9e1d-geb3-suhq | kernel: VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify |
CVE-2025-38102
|
| VCID-9hpn-bb61-m3c5 | kernel: usb: gadget : fix use-after-free in composite_dev_cleanup() |
CVE-2025-38555
|
| VCID-9p2w-b7vj-yya1 | kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done |
CVE-2025-38052
|
| VCID-9pfe-npnh-tugq | kernel: i40e: Fix potential invalid access when MAC list is empty |
CVE-2025-39853
|
| VCID-9qcu-u3nr-mkb3 | kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare |
CVE-2025-39817
|
| VCID-9rd2-p783-rbae | kernel: Linux kernel's ath9k_htc Wi-Fi driver: Denial of Service or information disclosure via malicious USB device input |
CVE-2025-38157
|
| VCID-9twf-hmmb-dqev | kernel: rose: fix dangling neighbour pointers in rose_rt_device_down() |
CVE-2025-38377
|
| VCID-9w88-du3c-qyc4 | kernel: scsi: lpfc: Use memcpy() for BIOS version |
CVE-2025-38332
|
| VCID-9x6z-na1u-93bs | kernel: ice: arfs: fix use-after-free when freeing @rx_cpu_rmap |
CVE-2022-49063
|
| VCID-9x7c-98v1-hkdj | kernel: serial: 8250: fix panic due to PSLVERR |
CVE-2025-39724
|
| VCID-aa2q-cu55-w7g7 | kernel: phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode |
CVE-2025-38535
|
| VCID-ab1j-9nu9-rueu | kernel: atm: clip: prevent NULL deref in clip_push() |
CVE-2025-38251
|
| VCID-abga-1vvy-2bfw | kernel: do_change_type(): refuse to operate on unmounted/not ours mounts |
CVE-2025-38498
|
| VCID-afkx-cy3n-zkef | kernel: media: venus: Add a check for packet size after reading from shared memory |
CVE-2025-39710
|
| VCID-ag6b-2w7j-f7fr | kernel: tracing: Add down_write(trace_event_sem) when adding trace event |
CVE-2025-38539
|
| VCID-ajrh-yrhu-6kbr | kernel: net: ch9200: fix uninitialised access during mii_nway_restart |
CVE-2025-38086
|
| VCID-akrr-rwd8-1qdg | kernel: Linux kernel: Denial of Service via NULL pointer dereference in raspberrypi_clk_register() |
CVE-2025-38160
|
| VCID-amka-68hb-hkes | kernel: mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup() |
CVE-2025-39737
|
| VCID-at2g-hnaw-w7ca | kernel: benet: fix BUG when creating VFs |
CVE-2025-38569
|
| VCID-at2g-xzwv-ubga | kernel: comedi: pcl812: Fix bit shift out of bounds |
CVE-2025-38530
|
| VCID-aucw-cvc4-27fp | kernel: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree |
CVE-2025-38468
|
| VCID-aur9-31dd-wbcr | kernel: NFC: nci: uart: Set tty->disc_data only in success path |
CVE-2025-38416
|
| VCID-az8z-5q7k-2ye9 | kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied |
CVE-2021-47076
|
| VCID-b1um-w9u2-mkgb | kernel: net: cadence: macb: Fix a possible deadlock in macb_halt_tx. |
CVE-2025-38094
|
| VCID-b48k-8uke-7kgq | kernel: wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() |
CVE-2025-38348
|
| VCID-b9tb-cyzp-c3am | kernel: jbd2: prevent softlockup in jbd2_log_do_checkpoint() |
CVE-2025-39782
|
| VCID-baxv-8xcq-zqeq | kernel: media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() |
CVE-2025-38694
|
| VCID-bb8d-akkd-q3gv | kernel: media: vidtv: Terminating the subsequent process of initialization failure |
CVE-2025-38227
|
| VCID-bbm4-ygwp-w3a1 | kernel: gpio: rcar: Use raw_spinlock to protect register access |
CVE-2025-21912
|
| VCID-bck8-wa86-skgs | kernel: mm/slub: avoid accessing metadata when pointer is invalid in object_err() |
CVE-2025-39902
|
| VCID-bdc1-fw6c-sbgj | kernel: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr |
CVE-2025-38701
|
| VCID-bmk2-e92y-m3gd | kernel: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() |
CVE-2025-38706
|
| VCID-c83s-2hkq-v7dx | kernel: padata: do not leak refcount in reorder_work |
CVE-2025-38031
|
| VCID-c8h6-u5x4-y3ac | kernel: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE |
CVE-2025-39788
|
| VCID-c8yu-g26s-gkhh | kernel: usb: renesas_usbhs: Reorder clock handling and power management in probe |
CVE-2025-38136
|
| VCID-cgb9-h21c-2khk | kernel: f2fs: fix to avoid panic in f2fs_evict_inode |
CVE-2025-38577
|
| VCID-cjka-26gb-bbb5 | kernel: scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure |
CVE-2025-38695
|
| VCID-ck6a-dd1t-nba8 | kernel: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit |
CVE-2025-39766
|
| VCID-cnvt-py2b-ruh3 | kernel: f2fs: prevent kernel warning due to negative i_nlink from corrupted image |
CVE-2025-38219
|
| VCID-cus3-rzk7-k3bu | kernel: wifi: ath11k: clear initialized flag for deinit-ed srng lists |
CVE-2025-38601
|
| VCID-cy84-7225-3yec | kernel: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated |
CVE-2025-38700
|
| VCID-czkk-a14k-nfa1 | kernel: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs |
CVE-2025-37948
|
| VCID-d2qm-raam-3yb9 | kernel: Linux kernel: Denial of Service in perf subsystem due to VMA split |
CVE-2025-38563
|
| VCID-d6qh-964p-cff9 | kernel: net, hsr: reject HSR frame if skb can't hold tag |
CVE-2025-39703
|
| VCID-dc47-7r56-tfhu | kernel: wifi: mt76: disable napi on driver removal |
CVE-2025-38009
|
| VCID-dfcs-t4fd-zqhe | kernel: net: tipc: fix refcount warning in tipc_aead_encrypt |
CVE-2025-38273
|
| VCID-dg1h-2nwv-cbgz | kernel: Linux kernel: Denial of Service in carl9170 Wi-Fi driver via ping to failed device |
CVE-2025-38420
|
| VCID-dh34-eegq-suf2 | kernel: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value |
CVE-2022-50327
|
| VCID-drf5-ur3k-gfee | kernel: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction |
CVE-2025-38211
|
| VCID-dva1-wfet-puc2 | kernel: RDMA/mlx5: Initialize obj_event->obj_sub_list before xa_insert |
CVE-2025-38387
|
| VCID-dwzr-3wdm-jbh6 | kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution |
CVE-2025-38024
|
| VCID-e4ks-d61v-cqgd | kernel: pcmcia: Add error handling for add_interval() in do_validate_mem() |
CVE-2025-39920
|
| VCID-ehtu-sncb-9qg6 | kernel: hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file() |
CVE-2025-38712
|
| VCID-ejhc-6yqt-gkgv | x86: Indirect Target Selection |
CVE-2024-28956
XSA-469 |
| VCID-es4k-7j4u-qyah | kernel: vsock: Fix transport_* TOCTOU |
CVE-2025-38461
|
| VCID-exhn-kypt-2fbd | kernel: jfs: fix array-index-out-of-bounds read in add_missing_indices |
CVE-2025-38204
|
| VCID-f1ap-4atf-mubz | kernel: drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() |
CVE-2025-37930
|
| VCID-f5cm-5jx1-x3hn | kernel: RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction |
CVE-2025-38161
|
| VCID-f6uy-cc29-97c5 | kernel: net_sched: drr: Fix double list add in class with netem as child qdisc |
CVE-2025-37915
|
| VCID-f85j-ru6j-hfg5 | kernel: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() |
CVE-2025-38664
|
| VCID-fjrr-1q5f-qyh2 | kernel: Linux kernel: Use-After-Free vulnerability in ATM subsystem |
CVE-2025-38180
|
| VCID-fnaw-jb9f-jkga | kernel: Linux kernel: Memory leak in ATM clip module can lead to denial of service |
CVE-2025-38546
|
| VCID-fu8g-cmhp-vqfb | kernel: media: cx231xx: set device_caps for 417 |
CVE-2025-38044
|
| VCID-fxun-hz5a-dkhv | kernel: drm/v3d: Disable interrupts before resetting the GPU |
CVE-2025-38371
|
| VCID-fzak-rhfb-xfc3 | kernel: usb: gadget: u_serial: Fix race condition in TTY wakeup |
CVE-2025-38448
|
| VCID-g2ry-tmd2-s3fq | kernel: drivers/rapidio/rio_cm.c: prevent possible heap overwrite |
CVE-2025-38090
|
| VCID-g9dq-44yb-t7ak | kernel: f2fs: fix to do sanity check on sbi->total_valid_block_count |
CVE-2025-38163
|
| VCID-gbnr-uevp-jugj | kernel: uio_hv_generic: Fix another memory leak in error handling paths |
CVE-2021-47070
|
| VCID-gmpj-3qde-cbhm | kernel: comedi: Fix use of uninitialized data in insn_rw_emulate_bits() |
CVE-2025-38480
|
| VCID-gqdm-2vw6-hucw | kernel: drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume |
CVE-2021-47421
|
| VCID-gy8t-jfpr-efaj | kernel: netfilter: nft_socket: fix sk refcount leaks |
CVE-2024-46855
|
| VCID-h1d8-gyg4-63ex | kernel: dmaengine: ti: k3-udma: Add missing locking |
CVE-2025-38005
|
| VCID-h1mg-59vr-pqdz | kernel: net: usb: aqc111: fix error handling of usbnet read calls |
CVE-2025-38153
|
| VCID-h3xz-s1bw-nuhg | kernel: Kernel: Denial of Service in perf due to user stack sampling during process exit |
CVE-2025-38424
|
| VCID-h5u7-a3tf-gyck | kernel: drm/vmwgfx: Fix a deadlock in dma buf fence polling |
CVE-2024-43863
|
| VCID-h7t2-setw-3bhg | kernel: Linux kernel (i2c: qup): Denial of Service via improper I2C client timeout handling |
CVE-2025-38671
|
| VCID-h7uj-6bvd-f3fq | kernel: mm/khugepaged: fix ->anon_vma race |
CVE-2023-52935
|
| VCID-h8vw-cjj2-wfaf | kernel: KVM: x86: use array_index_nospec with indices that come from guest |
CVE-2025-39823
|
| VCID-hdev-8cux-gqf1 | kernel: mm/huge_memory: fix dereferencing invalid pmd migration entry |
CVE-2025-37958
|
| VCID-hm6c-rmfx-sfav | kernel: HID: core: do not bypass hid_hw_raw_request |
CVE-2025-38494
|
| VCID-htnj-8ner-hkcp | kernel: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group |
CVE-2024-35790
|
| VCID-hxx1-r138-1bbh | kernel: usb: typec: displayport: Fix potential deadlock |
CVE-2025-38404
|
| VCID-j167-3jme-h7d6 | kernel: dm cache: prevent BUG_ON by blocking retries on failed device resumes |
CVE-2025-38066
|
| VCID-j1gx-dp1w-7fct | kernel: drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling |
CVE-2025-38467
|
| VCID-j22f-mbqe-a7dk | x86: Transitive Scheduler Attacks |
CVE-2024-36350
|
| VCID-j7gm-3zmx-bfd4 | kernel: calipso: Don't call calipso functions for AF_INET sk. |
CVE-2025-38147
|
| VCID-japp-mkvp-5qcj | kernel: usb: typec: altmodes/displayport: do not index invalid pin_assignments |
CVE-2025-38391
|
| VCID-jj1y-6xej-qkck | kernel: i40e: fix MMIO write access to an invalid page in i40e_clear_hw |
CVE-2025-38200
|
| VCID-jv56-nqp5-3bas | kernel: iommu/amd: Avoid stack buffer overflow from kernel cmdline |
CVE-2025-38676
|
| VCID-k4ed-hzk1-mfe9 | kernel: ipv6: reject malicious packets in ipv6_gso_segment() |
CVE-2025-38572
|
| VCID-k4sb-bps3-tkha | kernel: wifi: rtl818x: Kill URBs before clearing tx status queue |
CVE-2025-38604
|
| VCID-k8y7-5aj8-pbdq | kernel: software node: Correct a OOB check in software_node_get_reference_args() |
CVE-2025-38342
|
| VCID-k9sg-urdd-ukby | In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix WRITE_SAME No Data Buffer crash In newer version of the SBC specs, we have a NDOB bit that indicates there is no data buffer that gets written out. If this bit is set using commands like "sg_write_same --ndob" we will crash in target_core_iblock/file's execute_write_same handlers when we go to access the se_cmd->t_data_sg because its NULL. This patch adds a check for the NDOB bit in the common WRITE SAME code because we don't support it. And, it adds a check for zero SG elements in each handler in case the initiator tries to send a normal WRITE SAME with no data buffer. |
CVE-2022-21546
|
| VCID-ka48-d7h2-kkbj | kernel: drm/tegra: Fix a possible null pointer dereference |
CVE-2025-38363
|
| VCID-kag7-2z1b-83a7 | kernel: rcu: Protect ->defer_qs_iw_pending from data race |
CVE-2025-39749
|
| VCID-kdec-c9h3-7fb8 | kernel: xfs: do not propagate ENODATA disk errors into xattr code |
CVE-2025-39835
|
| VCID-kdvm-b3gx-dqhq | kernel: ARM: tegra: Use I/O memcpy to write to IRAM |
CVE-2025-39794
|
| VCID-kje2-4fqw-57gh | kernel: net_sched: ets: Fix double list add in class with netem as child qdisc |
CVE-2025-37914
|
| VCID-kjpr-c6d7-d3dt | kernel: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() |
CVE-2025-38680
|
| VCID-kr5h-tdtm-7uaa | kernel: drbd: add missing kref_get in handle_write_conflicts |
CVE-2025-38708
|
| VCID-ktqu-3423-eyaj | kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path |
CVE-2025-39841
|
| VCID-kvhw-j7bk-kfhn | kernel: virtio-net: ensure the received length does not exceed allocated size |
CVE-2025-38375
|
| VCID-kwym-cw3g-9bb3 | kernel: serial: Fix potential null-ptr-deref in mlb_usio_probe() |
CVE-2025-38135
|
| VCID-m1k4-4aj5-g3ae | kernel: net/sched: ets: use old 'nbands' while purging unused classes |
CVE-2025-38684
|
| VCID-m5y8-f4mw-ebdv | kernel: Linux kernel (jffs2): Denial of Service via invalid pointer dereference |
CVE-2025-38328
|
| VCID-m9gn-tm7d-5yez | kernel: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control() |
CVE-2025-39828
|
| VCID-m9xm-6722-nyfd | kernel: jfs: validate AG parameters in dbMount() to prevent crashes |
CVE-2025-38230
|
| VCID-mdqz-89en-g3am | kernel: Linux kernel: Denial of service due to null pointer dereference in CALIPSO SYN cookie handling |
CVE-2025-38181
|
| VCID-mjg7-gpnt-jbga | kernel: NFS: Fix the setting of capabilities when automounting a new filesystem |
CVE-2025-39798
|
| VCID-mnqd-esg1-ybhz | kernel: rxrpc: Fix oops due to non-existence of prealloc backlog struct |
CVE-2025-38514
|
| VCID-mu97-p4wb-5qck | kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion |
CVE-2025-38459
|
| VCID-n4hs-s6e7-f7c1 | kernel: btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() |
CVE-2024-46751
|
| VCID-ndg7-qfdw-v3dn | kernel: tipc: Fix use-after-free in tipc_conn_close() |
CVE-2025-38464
|
| VCID-ndvj-m6t4-f7df | kernel: Input: ims-pcu - check record size in ims_pcu_flash_firmware() |
CVE-2025-38428
|
| VCID-njyw-sj3b-xycn | kernel: ALSA: usb-audio: Validate UAC3 cluster segment descriptors |
CVE-2025-39757
|
| VCID-nraj-qr2a-pubu | kernel: Linux kernel dma-buf: Denial of Service via memory reordering |
CVE-2025-38095
|
| VCID-nuxt-ab88-w3a9 | kernel: Linux kernel: Denial of Service due to TOCTOU in `sk_is_readable()` |
CVE-2025-38112
|
| VCID-nv5y-jm2h-zkd6 | kernel: netfilter: ctnetlink: fix refcount leak on table dump |
CVE-2025-38721
|
| VCID-nvz6-mdw9-g7g3 | kernel: module: ensure that kobject_put() is safe for module type kobjects |
CVE-2025-37995
|
| VCID-p2bs-4z74-b7bx | kernel: comedi: fix race between polling and detaching |
CVE-2025-38687
|
| VCID-p4s5-y8ck-ufad | kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc |
CVE-2025-37890
|
| VCID-p52d-jz35-3qh3 | kernel: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() |
CVE-2025-39730
|
| VCID-p64w-vsxs-2qc8 | kernel: netlink: Fix wraparounds of sk->sk_rmem_alloc. |
CVE-2025-38465
|
| VCID-p789-6xk9-4faj | kernel: comedi: das6402: Fix bit shift out of bounds |
CVE-2025-38482
|
| VCID-pa8u-zdsm-w7ec | kernel: pinctrl: qcom: msm: mark certain pins as invalid for interrupts |
CVE-2025-38516
|
| VCID-pcek-ba5f-b7gc | kernel: fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() |
CVE-2025-38312
|
| VCID-pd9u-evp2-abh9 | kernel: nilfs2: reject invalid file types when reading inodes |
CVE-2025-38663
|
| VCID-pdwv-vay9-juhg | kernel: net_sched: prio: fix a race in prio_tune() |
CVE-2025-38083
|
| VCID-pnqz-df9d-eue7 | kernel: regulator: core: fix NULL dereference on unbind due to stale coupling data |
CVE-2025-38668
|
| VCID-ppx8-bg8y-83a4 | kernel: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer |
CVE-2025-38184
|
| VCID-pqb4-968d-jbfe | kernel: thunderbolt: Do not double dequeue a configuration request |
CVE-2025-38174
|
| VCID-pssk-5jda-g3b2 | kernel: scsi: lpfc: Fix link down processing to address NULL pointer dereference |
CVE-2021-47183
|
| VCID-pvfh-earf-aqdj | kernel: Linux kernel: Denial of Service via out-of-bounds read in USB configuration parsing |
CVE-2025-39760
|
| VCID-q32q-tj94-tye1 | kernel: fs/buffer: fix use-after-free when call bh_read() helper |
CVE-2025-39691
|
| VCID-q3ee-s8tk-vqag | kernel: Linux kernel: Denial of Service due to stack memory use-after-return in raid1_reshape |
CVE-2025-38445
|
| VCID-q4nf-ncj8-2yg1 | kernel: sctp: linearize cloned gso packets in sctp_rcv |
CVE-2025-38718
|
| VCID-q55w-hud9-9ydw | kernel: ptp: Fix possible memory leak in ptp_clock_register() |
CVE-2021-47455
|
| VCID-q9rm-e46v-gqce | kernel: Linux kernel: Denial of Service in vsock due to TOCTOU race condition |
CVE-2025-38462
|
| VCID-qgyt-826f-wuhy | kernel: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice |
CVE-2025-38001
|
| VCID-qm6d-bk6t-1qgv | kernel: mtk-sd: Prevent memory corruption from DMA map failure |
CVE-2025-38401
|
| VCID-qpn3-gx5a-y3a6 | kernel: aoe: clean device rq_list in aoedev_downdev() |
CVE-2025-38326
|
| VCID-qunx-79yy-tqhb | kernel: orangefs: Do not truncate file size |
CVE-2025-38065
|
| VCID-qvnj-rkxf-ukas | kernel: Linux kernel: Memory corruption in Squashfs due to incorrect block size calculation |
CVE-2025-38415
|
| VCID-rde7-z1g5-jbfh | kernel: Linux kernel: Denial of Service in ATM subsystem due to a race condition |
CVE-2025-38245
|
| VCID-re3v-xm9c-ffb1 | kernel: hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() |
CVE-2025-38714
|
| VCID-rgt3-asgv-8be3 | kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() |
CVE-2025-38000
|
| VCID-rjc6-ebaq-jbfe | kernel: pinctrl: at91: Fix possible out-of-boundary access |
CVE-2025-38286
|
| VCID-rmct-nky3-kyew | kernel: sch_hfsc: make hfsc_qlen_notify() idempotent |
CVE-2025-38177
|
| VCID-rn7v-jp3y-7udf | kernel: can: bcm: add missing rcu read protection for procfs content |
CVE-2025-38003
|
| VCID-rqk9-ym9a-zydh | kernel: net/sched: sch_qfq: Fix race condition on qfq_aggregate |
CVE-2025-38477
|
| VCID-ry17-gncr-s3af | kernel: net: atm: add lec_mutex |
CVE-2025-38323
|
| VCID-s7ax-ksqw-9kac | kernel: scsi: bfa: Double-free fix |
CVE-2025-38699
|
| VCID-sg5f-9ycp-7ybk | kernel: hwmon: (corsair-cpro) Validate the size of the received input buffer |
CVE-2025-38548
|
| VCID-sh6x-y76e-kqa7 | kernel: rpl: Fix use-after-free in rpl_do_srh_inline() |
CVE-2025-38476
|
| VCID-smej-3muv-rfcj | kernel: ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330 |
CVE-2025-38336
|
| VCID-smew-m4w8-t7cp | kernel: ASoC: q6afe-clocks: fix reprobing of the driver |
CVE-2021-47037
|
| VCID-t1e7-w1sa-d3fz | kernel: Kernel: Denial of Service via NULL pointer dereference in NFS unlock path |
CVE-2025-38023
|
| VCID-t48k-ayze-aqe2 | kernel: jfs: truncate good inode pages when hard link is 0 |
CVE-2025-39743
|
| VCID-t7j1-s8d2-vkf1 | kernel: Linux kernel: Denial of Service via device refcount leak in Appletalk protocol implementation |
CVE-2025-38542
|
| VCID-t7vb-497c-nfa4 | kernel: drm/i915/gt: Fix timeline left held on VMA alloc error |
CVE-2025-38389
|
| VCID-t8d9-76jq-vqdc | kernel: of: module: add buffer overflow check in of_modalias() |
CVE-2024-38541
|
| VCID-tdbw-24ap-n7ec | kernel: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() |
CVE-2024-53203
|
| VCID-tem5-juk6-uudj | kernel: usb: gadget: configfs: Fix OOB read on empty string write |
CVE-2025-38497
|
| VCID-tmap-v72a-jydg | kernel: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref |
CVE-2025-38034
|
| VCID-tncf-t15m-dya8 | kernel: Linux kernel: Denial of Service in ACPICA due to missing method arguments |
CVE-2025-38386
|
| VCID-tnns-pu2w-nbah | kernel: Linux kernel: Denial of Service via out-of-bounds read in EDAC/skx_common module reload |
CVE-2025-38298
|
| VCID-tw2q-43an-pqb2 | kernel: Linux kernel: Information disclosure and denial of service via stack-out-of-bounds read |
CVE-2025-38320
|
| VCID-u3xh-m3py-ybgs | kernel: comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large |
CVE-2025-38481
|
| VCID-u5m4-3rwx-k7fz | kernel: hv_netvsc: Fix panic during namespace deletion with VF |
CVE-2025-38683
|
| VCID-u6wz-7q3t-cfam | kernel: batman-adv: fix OOB read/write in network-coding decode |
CVE-2025-39839
|
| VCID-uceb-eb41-eyed | kernel: ax25: properly unshare skbs in ax25_kiss_rcv() |
CVE-2025-39848
|
| VCID-uef9-22mb-7bhb | kernel: ipc: fix to protect IPCS lookups using RCU |
CVE-2025-38212
|
| VCID-ugzf-fz63-y3g9 | kernel: f2fs: fix to avoid out-of-boundary access in dnode page |
CVE-2025-38677
|
| VCID-uh15-7ty5-fubx | kernel: regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods |
CVE-2025-38395
|
| VCID-uj96-qpr6-jfh6 | kernel: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() |
CVE-2025-39860
|
| VCID-ujay-r4dd-37fh | kernel: net/sched: act_mirred: don't override retval if we already lost the skb |
CVE-2024-26739
|
| VCID-upz7-dr6x-1qem | kernel: mm/hugetlb: unshare page tables during VMA split, not before |
CVE-2025-38084
|
| VCID-uuxb-2vuz-3kfx | kernel: ACPI: PAD: fix crash in exit_round_robin() |
CVE-2024-49935
|
| VCID-uv8m-bj4c-8fes | x86: Transitive Scheduler Attacks |
CVE-2024-36357
XSA-471 |
| VCID-uz89-3jfw-ufbt | kernel: Linux kernel: Denial of Service in MPLS subsystem due to suspicious RCU usage |
CVE-2025-38324
|
| VCID-uzha-3vmp-97as | kernel: nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails |
CVE-2025-38400
|
| VCID-v3qm-f13v-fkhv | kernel: media: vivid: Change the siize of the composing |
CVE-2025-38226
|
| VCID-vc77-dvcb-gfbb | kernel: usb: typec: ucsi: displayport: Fix NULL pointer access |
CVE-2025-37994
|
| VCID-vf1k-6dag-ufh4 | kernel: btrfs: fix deadlock when cloning inline extents and using qgroups |
CVE-2021-46987
|
| VCID-vs9y-muth-dqgs | kernel: crypto: ccp - Fix crash when rebind ccp device for ccp.ko |
CVE-2025-38581
|
| VCID-vu79-tnhu-x7e6 | kernel: pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() |
CVE-2025-39846
|
| VCID-w2fj-8dqr-gbcc | kernel: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() |
CVE-2025-38352
|
| VCID-w6ku-q9rr-57ht | kernel: net: lan743x: Fix memleak issue when GSO enabled |
CVE-2025-37909
|
| VCID-w73q-zyg9-fkbc | kernel: mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() |
CVE-2025-38681
|
| VCID-wace-ayvn-zucy | kernel: Linux kernel: Denial of Service in uprobes due to improper instruction validation |
CVE-2025-38466
|
| VCID-wbme-mwhe-tkc3 | kernel: ACPICA: fix acpi operand cache leak in dswstate.c |
CVE-2025-38345
|
| VCID-wk3t-3jvn-quf1 | kernel: media: platform: exynos4-is: Add hardware sync wait to fimc_is_hw_change_mode() |
CVE-2025-38237
|
| VCID-wn2n-ev3c-23ep | kernel: Linux kernel: Race condition in network scheduler can cause denial of service and data compromise. |
CVE-2025-38107
|
| VCID-wnnc-9rg2-8ba3 | kernel: ACPICA: fix acpi parse and parseext cache leaks |
CVE-2025-38344
|
| VCID-wq75-bzh1-43d7 | kernel: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime |
CVE-2025-38470
|
| VCID-wsnu-mj7t-fqck | kernel: media: usbtv: Lock resolution while streaming |
CVE-2025-39714
|
| VCID-wtm8-vuaw-ufgj | kernel: ftrace: Also allocate and copy hash for reading of filter files |
CVE-2025-39689
|
| VCID-wur3-taza-rbh2 | kernel: Linux kernel: Local Denial of Service due to TIF_IO_BITMAP inconsistency |
CVE-2025-38100
|
| VCID-wvkq-z4mr-dqbg | kernel: tracing: Fix oob write in trace_seq_to_buffer() |
CVE-2025-37923
|
| VCID-wwma-hh9d-1qhb | kernel: ftrace: Fix UAF when lookup kallsym after ftrace disabled |
CVE-2025-38346
|
| VCID-wy74-8292-87c8 | kernel: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() |
CVE-2025-38724
|
| VCID-wy9s-ey4y-ubck | kernel: wifi: ath6kl: remove WARN on bad firmware input |
CVE-2025-38406
|
| VCID-wywg-zzur-cbep | kernel: atm: atmtcp: Free invalid length skb in atmtcp_c_send() |
CVE-2025-38185
|
| VCID-wz3q-eezz-syej | kernel: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() |
CVE-2025-38103
|
| VCID-x1mt-bfa7-ubfr | kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() |
CVE-2025-38713
|
| VCID-x5c6-pbrm-x3h3 | kernel: net/mdiobus: Fix potential out-of-bounds read/write access |
CVE-2025-38111
|
| VCID-x5k6-cx75-gfet | kernel: media: cxusb: no longer judge rbuf when the write fails |
CVE-2025-38229
|
| VCID-x7nf-hb2f-wkf2 | kernel: mm: hugetlb: independent PMD page table shared count |
CVE-2024-57883
|
| VCID-x9x5-hefw-zuhk | kernel: nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request |
CVE-2025-38430
|
| VCID-x9za-c2zz-rqfk | kernel: vhost-scsi: protect vq->log_used with vq->mutex |
CVE-2025-38074
|
| VCID-xbme-vftn-97h5 | kernel: netlink: avoid infinite retry looping in netlink_unicast() |
CVE-2025-38727
|
| VCID-xefy-hh5k-vbf5 | kernel: block: avoid possible overflow for chunk_sectors check in blk_stack_limits() |
CVE-2025-39795
|
| VCID-xejf-45r3-b7gd | kernel: staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() |
CVE-2025-38612
|
| VCID-xgn2-cjg9-jkay | kernel: libnvdimm/labels: Fix divide error in nd_label_data_init() |
CVE-2025-38072
|
| VCID-xmur-2pys-5kb4 | kernel: net: drop UFO packets in udp_rcv_segment() |
CVE-2025-38622
|
| VCID-xpat-gan5-mfh6 | kernel: rseq: Fix segfault on registration when rseq_cs is non-zero |
CVE-2025-38067
|
| VCID-xtbh-wee7-3qgj | kernel: dm rq: don't queue request to blk-mq during DM suspend |
CVE-2021-47498
|
| VCID-xuhf-kwk4-y3dx | kernel: can: bcm: add locking for bcm_op runtime updates |
CVE-2025-38004
|
| VCID-xztu-wrk9-c7d4 | kernel: jffs2: check that raw node were preallocated before writing summary |
CVE-2025-38194
|
| VCID-y3yf-6uwt-b3gq | kernel: backlight: pm8941: Add NULL check in wled_configure() |
CVE-2025-38143
|
| VCID-y8jw-xjf6-wycm | kernel: Linux kernel: Denial of Service in SMB client due to use-after-free in asynchronous crypto handling |
CVE-2025-38488
|
| VCID-yam8-11x5-budv | kernel: dmaengine: nbpfaxi: Fix memory corruption in probe() |
CVE-2025-38538
|
| VCID-yc5h-cxfk-yfdc | kernel: net/sched: Restrict conditions for adding duplicating netems to qdisc tree |
CVE-2025-38553
|
| VCID-yc6p-cqzt-pbby | kernel: crypto: algif_hash - fix double free in hash_accept |
CVE-2025-38079
|
| VCID-ycev-sqxs-13da | kernel: Kernel: Double free vulnerability in exFAT filesystem can lead to denial of service |
CVE-2025-38206
|
| VCID-ydd5-5x5y-sqeb | kernel: mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock |
CVE-2025-39736
|
| VCID-yhpg-snpu-dbe9 | kernel: Linux kernel: Denial of Service via null-pointer dereference in fb_videomode_to_var |
CVE-2025-38214
|
| VCID-ykvm-p41c-9fhq | kernel: NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN |
CVE-2025-38393
|
| VCID-ymen-78sb-uuax | kernel: Kernel: Privilege escalation via uninitialized data in vmci transport packet |
CVE-2025-38403
|
| VCID-yqcd-vygr-zug6 | kernel: vxlan: Annotate FDB data races |
CVE-2025-38037
|
| VCID-yuf4-s8bg-93bf | kernel: Linux kernel: Denial of Service due to NULL pointer dereference in iSCSI target NOPIN timer handling |
CVE-2025-38075
|
| VCID-yw2a-uaz1-b3ea | kernel: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() |
CVE-2025-38337
|
| VCID-yywy-krb7-3qcb | kernel: ppp: fix memory leak in pad_compress_skb |
CVE-2025-39847
|
| VCID-yzkj-wnhe-m7f2 | kernel: arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users |
CVE-2025-37963
|
| VCID-z1jv-1vmy-aqeq | kernel: Linux kernel (ASUS HID): Use-after-free vulnerability allows arbitrary code execution or denial of service |
CVE-2025-39824
|
| VCID-z27y-c26s-wuek | kernel: wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() |
CVE-2025-38513
|
| VCID-z62f-5fsk-rkgq | kernel: net: appletalk: Fix use-after-free in AARP proxy probe |
CVE-2025-38666
|
| VCID-z8bf-rebn-r7bm | kernel: comedi: Fix initialization of data for instructions that write to subdevice |
CVE-2025-38478
|
| VCID-z916-xdst-pka3 | kernel: HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() |
CVE-2025-39808
|
| VCID-za93-zh73-g3f4 | kernel: Linux kernel: irqchip/gic-v2m use-after-free vulnerability |
CVE-2025-37819
|
| VCID-zfyh-4nmk-hbh6 | kernel: media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar |
CVE-2025-38693
|
| VCID-zjyd-23m1-sug3 | kernel: net_sched: sch_sfq: reject invalid perturb period |
CVE-2025-38193
|
| VCID-zme1-paup-4bc9 | kernel: Linux kernel: Denial of Service in MDT loader due to improper ELF header validation |
CVE-2025-39787
|
| VCID-zssu-1j3y-a3g2 | kernel: wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() |
CVE-2025-37990
|