Search for packages
| purl | pkg:deb/debian/linux@6.12.16-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1buh-fk6e-r7h1 | kernel: NFSD: fix hang in nfsd4_shutdown_callback |
CVE-2025-21795
|
| VCID-24gw-73zd-3khc | kernel: ipv6: mcast: extend RCU protection in igmp6_send() |
CVE-2025-21759
|
| VCID-2kud-6ebm-dkb2 | kernel: arp: use RCU protection in arp_xmit() |
CVE-2025-21762
|
| VCID-2prt-1t8q-bycy | kernel: media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread |
CVE-2024-57834
|
| VCID-49j4-4br3-cyab | kernel: clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context |
CVE-2025-21767
|
| VCID-57ww-5dxf-y7e2 | kernel: vsock: Keep the binding until socket destruction |
CVE-2025-21756
|
| VCID-64nd-yud7-wqev | kernel: ndisc: use RCU protection in ndisc_alloc_skb() |
CVE-2025-21764
|
| VCID-76f2-7gkv-wkgu | kernel: usb: gadget: f_midi: fix MIDI Streaming descriptor lengths |
CVE-2025-21835
|
| VCID-82kc-vuvj-ffau | kernel: can: ctucanfd: handle skb allocation failure |
CVE-2025-21775
|
| VCID-8rxa-u3wr-c7g8 | kernel: iommu: Fix potential memory leak in iopf_queue_remove_device() |
CVE-2025-21770
|
| VCID-8w72-3555-8ue2 | kernel: HID: winwing: Add NULL check in winwing_init_led() |
CVE-2024-58021
|
| VCID-9fn1-ytny-vke1 | kernel: drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit() |
CVE-2024-52559
|
| VCID-9gzx-uqjk-jbcn | kernel: batman-adv: fix panic during interface removal |
CVE-2025-21781
|
| VCID-auub-amxt-43bv | kernel: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array |
CVE-2025-21785
|
| VCID-bad9-4wfn-4ueu | kernel: ndisc: extend RCU protection in ndisc_send_skb() |
CVE-2025-21760
|
| VCID-bbr5-mbgv-zbb7 | kernel: LoongArch: csum: Fix OoB access in IP checksum code for negative lengths |
CVE-2025-21789
|
| VCID-bfte-3vt5-pfab | kernel: Linux kernel: usb: cdc-acm: Memory corruption due to improper buffer size check |
CVE-2025-21704
|
| VCID-bmu4-tvzy-e7hx | kernel: workqueue: Put the pwq after detaching the rescuer from the pool |
CVE-2025-21786
|
| VCID-bp5v-gncn-mqfa | kernel: nfsd: clear acl_access/acl_default after releasing them |
CVE-2025-21796
|
| VCID-bpx6-avpr-7kdg | kernel: drm/xe/tracing: Fix a potential TP_printk UAF |
CVE-2024-49570
|
| VCID-c6hp-wue5-6qew | kernel: firmware: qcom: scm: smc: Handle missing SCM device |
CVE-2024-57852
|
| VCID-d5ny-6ttq-1yhx | kernel: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel |
CVE-2025-21779
|
| VCID-dgj8-npay-zke1 | kernel: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client() |
CVE-2024-54456
|
| VCID-dskx-ncgs-s3gj | kernel: gpiolib: Fix crash on error in gpiochip_get_ngpios() |
CVE-2025-21783
|
| VCID-edgj-jkju-6bem | kernel: drm/v3d: Stop active perfmon if it is being destroyed |
CVE-2024-58086
|
| VCID-ezm4-88sz-j3g9 | kernel: team: better TEAM_OPTION_TYPE_STRING validation |
CVE-2025-21787
|
| VCID-g374-wee6-7fh3 | kernel: net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases |
CVE-2025-21788
|
| VCID-gxyj-nmte-jkd4 | kernel: gpu: host1x: Fix a use of uninitialized mutex |
CVE-2025-21824
|
| VCID-h3sy-9k3r-sug4 | kernel: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() |
CVE-2025-21761
|
| VCID-h6dz-5pmy-mqhn | kernel: partitions: mac: fix handling of bogus partition table |
CVE-2025-21772
|
| VCID-hcu4-rh89-eyh6 | kernel: sched_ext: Fix incorrect autogroup migration detection |
CVE-2025-21771
|
| VCID-hjgh-pbhw-d3bm | kernel: ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt |
CVE-2025-21792
|
| VCID-jdy5-6s2h-d7ad | kernel: neighbour: use RCU protection in __neigh_notify() |
CVE-2025-21763
|
| VCID-jfna-rgzb-v3ad | kernel: vxlan: check vxlan_vnigroup_init() return value |
CVE-2025-21790
|
| VCID-jguq-h5se-q3fs | kernel: fbdev: omap: use threaded IRQ for LCD DMA |
CVE-2025-21821
|
| VCID-kzc2-uaxs-f7an | kernel: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() |
CVE-2025-21780
|
| VCID-mgk4-pwpy-zbhg | kernel: scsi: ufs: bsg: Set bsg_queue to NULL after removal |
CVE-2024-54458
|
| VCID-p472-z1xz-r3cj | kernel: io_uring/kbuf: re-using old struct io_buffer_list may lead to a use-after-free situation |
CVE-2025-21836
|
| VCID-p4fx-yvs4-37hq | kernel: ipv6: mcast: add RCU protection to mld_newpack() |
CVE-2025-21758
|
| VCID-psh9-z2ad-2udv | kernel: tracing: Do not allow mmap() of persistent ring buffer |
CVE-2025-21778
|
| VCID-pwt4-em7t-4qfb | kernel: USB: hub: Ignore non-compliant devices with too many configs or interfaces |
CVE-2025-21776
|
| VCID-pxv6-4d92-gbdv | kernel: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop |
CVE-2025-21839
|
| VCID-rmbp-bnk7-7ffk | kernel: usb: gadget: core: flush gadget workqueue after device removal |
CVE-2025-21838
|
| VCID-s1s6-ekvg-yuer | kernel: vrf: use RCU protection in l3mdev_l3_out() |
CVE-2025-21791
|
| VCID-s46w-m28p-6fh2 | kernel: ring-buffer: Validate the persistent meta data subbuf array |
CVE-2025-21777
|
| VCID-sw22-xvt9-zfev | kernel: HID: multitouch: Add NULL check in mt_input_configured |
CVE-2024-58020
|
| VCID-txxg-66tt-tqeb | kernel: batman-adv: Drop unmanaged ELP metric worker |
CVE-2025-21823
|
| VCID-v5j9-r143-y7ad | kernel: orangefs: fix a oob in orangefs_debug_write |
CVE-2025-21782
|
| VCID-wrqg-8s7b-1ycw | kernel: amdkfd: properly free gang_ctx_bo when failed to init user queue |
CVE-2025-21842
|
| VCID-xdeu-8mrr-e7gr | kernel: drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode() |
CVE-2025-21784
|
| VCID-xdum-5kpp-fqg5 | kernel: can: etas_es58x: fix potential NULL pointer dereference on udev->serial |
CVE-2025-21773
|
| VCID-xvts-9xqv-n3fx | kernel: spi: sn-f-ospi: Fix division by zero |
CVE-2025-21793
|
| VCID-xwv6-tr1w-87f3 | kernel: can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated |
CVE-2025-21774
|
| VCID-y5eg-tvca-vkgu | kernel: ipv6: use RCU protection in ip6_default_advmss() |
CVE-2025-21765
|
| VCID-yj28-va7b-3ug8 | kernel: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels |
CVE-2025-21768
|
| VCID-yxk4-r73z-x3a9 | kernel: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() |
CVE-2025-21794
|
| VCID-z2vb-4xtt-w7f1 | kernel: ipv4: use RCU protection in __ip_rt_update_pmtu() |
CVE-2025-21766
|
| VCID-zwbb-538h-n3hs | kernel: cpufreq/amd-pstate: Fix cpufreq_policy ref counting |
CVE-2025-21841
|