Search for packages
| purl | pkg:deb/debian/linux@6.1.140-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-14hp-mh7a-ayef | kernel: sch_htb: make htb_qlen_notify() idempotent |
CVE-2025-37932
|
| VCID-17j1-c3fv-wyej | kernel: net_sched: Flush gso_skb list too during ->change() |
CVE-2025-37992
|
| VCID-2ahz-hvvc-n3cd | kernel: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo |
CVE-2025-37970
|
| VCID-2fjq-waru-kkc8 | kernel: usb: typec: ucsi: displayport: Fix deadlock |
CVE-2025-37967
|
| VCID-3pc6-9q2x-2ugj | kernel: bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG |
CVE-2024-43840
|
| VCID-3yy5-tvhs-bygv | kernel: Linux kernel: `iommu/amd`: Buffer overflow in `parse_ivrs_acpihid` |
CVE-2025-37927
|
| VCID-5c4j-urpd-v7fu | kernel: ipvs: fix uninit-value for saddr in do_output_route4 |
CVE-2025-37961
|
| VCID-5mxa-xpvq-dka1 | kernel: net_sched: qfq: Fix double list add in class with netem as child qdisc |
CVE-2025-37913
|
| VCID-6gxd-146x-a7ab | kernel: drm/v3d: Add job to pending list if the reset was skipped |
CVE-2025-37951
|
| VCID-7155-8p78-cfd2 | kernel: bnxt_en: Fix out-of-bound memcpy() during ethtool -w |
CVE-2025-37911
|
| VCID-7cnv-qdcn-3qhq | kernel: xenbus: Use kref to track req lifetime |
CVE-2025-37949
|
| VCID-88uv-n88p-9feg | kernel: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo |
CVE-2025-37969
|
| VCID-8q5e-qfej-wubt | kernel: riscv: mm: Fix the out of bound issue of vmemmap address |
CVE-2024-57945
|
| VCID-8tb3-8pk3-rbh3 | kernel: perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value. |
CVE-2025-37936
|
| VCID-8w3f-nmmr-zue9 | kernel: dmaengine: idxd: fix memory leak in error handling path of idxd_alloc |
CVE-2025-38015
|
| VCID-9esq-tfd3-4ff4 | kernel: parisc: Fix double SIGFPE crash |
CVE-2025-37991
|
| VCID-b1um-w9u2-mkgb | kernel: net: cadence: macb: Fix a possible deadlock in macb_halt_tx. |
CVE-2025-38094
|
| VCID-bmvn-41w7-b3h2 | kernel: bnxt_en: Fix receive ring space parameters when XDP is active |
CVE-2024-53209
|
| VCID-busk-3nt8-cfhm | kernel: drm/amd/display: Fix slab-use-after-free in hdcp |
CVE-2025-37903
|
| VCID-cggr-nded-4kdf | kernel: Linux kernel: Local Denial of Service due to NULL pointer dereference in net/tls |
CVE-2025-38018
|
| VCID-czkk-a14k-nfa1 | kernel: arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs |
CVE-2025-37948
|
| VCID-dc47-7r56-tfhu | kernel: wifi: mt76: disable napi on driver removal |
CVE-2025-38009
|
| VCID-dwzr-3wdm-jbh6 | kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution |
CVE-2025-38024
|
| VCID-e635-1mt5-nuhu | kernel: mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index |
CVE-2024-26783
|
| VCID-ejhc-6yqt-gkgv | x86: Indirect Target Selection |
CVE-2024-28956
XSA-469 |
| VCID-ek7q-aazd-1bd3 | kernel: irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs |
CVE-2025-37901
|
| VCID-f1ap-4atf-mubz | kernel: drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() |
CVE-2025-37930
|
| VCID-f6uy-cc29-97c5 | kernel: net_sched: drr: Fix double list add in class with netem as child qdisc |
CVE-2025-37915
|
| VCID-g7t7-tspv-fqdc | kernel: ipv6: Fix potential uninit-value access in __ip6_make_skb() |
CVE-2024-36903
|
| VCID-h1d8-gyg4-63ex | kernel: dmaengine: ti: k3-udma: Add missing locking |
CVE-2025-38005
|
| VCID-haqy-tfzh-wkbv | kernel: x86/mm: Eliminate window where TLB flushes may be inadvertently skipped |
CVE-2025-37964
|
| VCID-htcq-radh-pygy | kernel: net/mlx5e: Disable MACsec offload for uplink representor profile |
CVE-2025-38020
|
| VCID-htnj-8ner-hkcp | kernel: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group |
CVE-2024-35790
|
| VCID-jbcb-bxa7-57gw | kernel: Linux kernel: sch_htb NULL pointer dereference |
CVE-2025-37953
|
| VCID-k8hr-wfrc-cqbv | kernel: wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release |
CVE-2025-37897
|
| VCID-kje2-4fqw-57gh | kernel: net_sched: ets: Fix double list add in class with netem as child qdisc |
CVE-2025-37914
|
| VCID-m2cm-t3tr-g3f1 | kernel: bpf: Scrub packet on bpf_redirect_peer |
CVE-2025-37959
|
| VCID-n4hs-s6e7-f7c1 | kernel: btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info() |
CVE-2024-46751
|
| VCID-nfu4-2477-3bfv | kernel: dm-bufio: don't schedule in atomic context |
CVE-2025-37928
|
| VCID-nqps-wywv-wkdz | kernel: arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays |
CVE-2025-37929
|
| VCID-nraj-qr2a-pubu | kernel: Linux kernel dma-buf: Denial of Service via memory reordering |
CVE-2025-38095
|
| VCID-nuva-dv49-xbau | kernel: regulator: max20086: fix invalid memory access |
CVE-2025-38027
|
| VCID-nwe9-gm4x-x7bj | kernel: ipv4: Fix uninit-value access in __ip_make_skb() |
CVE-2024-36927
|
| VCID-p4s5-y8ck-ufad | kernel: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc |
CVE-2025-37890
|
| VCID-pm9v-yc8g-a7dq | kernel: platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it |
CVE-2025-21645
|
| VCID-pxv6-4d92-gbdv | kernel: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop |
CVE-2025-21839
|
| VCID-qeyx-6byj-2kct | kernel: sctp: add mutual exclusion in proc_sctp_do_udp_port() |
CVE-2025-22062
|
| VCID-r92d-snm6-yubu | kernel: firmware: arm_scmi: Balance device refcount when destroying devices |
CVE-2025-37905
|
| VCID-s2rj-sx9d-rbht | kernel: net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll |
CVE-2025-37917
|
| VCID-scem-pr64-f7bt | kernel: ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr() |
CVE-2025-37912
|
| VCID-t1e7-w1sa-d3fz | kernel: Kernel: Denial of Service via NULL pointer dereference in NFS unlock path |
CVE-2025-38023
|
| VCID-tdbw-24ap-n7ec | kernel: usb: typec: fix potential array underflow in ucsi_ccg_sync_control() |
CVE-2024-53203
|
| VCID-tn72-dts1-n7eh | kernel: spi: cadence-qspi: fix pointer reference in runtime PM hooks |
CVE-2024-26807
|
| VCID-u46c-by2j-6faa | kernel: HID: uclogic: Add NULL check in uclogic_input_configured() |
CVE-2025-38007
|
| VCID-ug4h-45b6-dkad | kernel: Input: mtk-pmic-keys - fix possible null pointer dereference |
CVE-2025-37972
|
| VCID-uyjw-9s79-xkaq | kernel: ksmbd: prevent out-of-bounds stream writes by validating *pos |
CVE-2025-37947
|
| VCID-w6ku-q9rr-57ht | kernel: net: lan743x: Fix memleak issue when GSO enabled |
CVE-2025-37909
|
| VCID-wdux-9a9h-eqc3 | kernel: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio |
CVE-2025-21931
|
| VCID-wrjg-daj9-eqa8 | kernel: ksmbd: fix use-after-free in kerberos authentication |
CVE-2025-37924
|
| VCID-wvkq-z4mr-dqbg | kernel: tracing: Fix oob write in trace_seq_to_buffer() |
CVE-2025-37923
|
| VCID-x2jw-f63j-uye1 | kernel: vxlan: vnifilter: Fix unlocked deletion of default FDB entry |
CVE-2025-37921
|
| VCID-yvbs-th5a-ckdk | hw: arm64/sme: Always exit sme_alloc() early with existing storage |
CVE-2024-26618
|
| VCID-yzkj-wnhe-m7f2 | kernel: arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users |
CVE-2025-37963
|
| VCID-za93-zh73-g3f4 | kernel: Linux kernel: irqchip/gic-v2m use-after-free vulnerability |
CVE-2025-37819
|
| VCID-zde9-fwwj-9uc1 | kernel: ksmbd: fix memory leak in parse_lease_state() |
CVE-2025-37962
|
| VCID-zssu-1j3y-a3g2 | kernel: wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage() |
CVE-2025-37990
|