Search for packages
| purl | pkg:deb/debian/linux@6.12.30-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-17j1-c3fv-wyej | kernel: net_sched: Flush gso_skb list too during ->change() |
CVE-2025-37992
|
| VCID-27ks-xwub-8ugq | kernel: Linux kernel: Memory corruption via unplugging HID devices |
CVE-2025-38016
|
| VCID-2fjq-waru-kkc8 | kernel: usb: typec: ucsi: displayport: Fix deadlock |
CVE-2025-37967
|
| VCID-4vhc-h9fj-sugq | kernel: drm/amdgpu: csa unmap use uninterruptible lock |
CVE-2025-38011
|
| VCID-6233-92av-nfdg | kernel: iio: light: opt3001: fix deadlock due to concurrent flag access |
CVE-2025-37968
|
| VCID-8w3f-nmmr-zue9 | kernel: dmaengine: idxd: fix memory leak in error handling path of idxd_alloc |
CVE-2025-38015
|
| VCID-b1um-w9u2-mkgb | kernel: net: cadence: macb: Fix a possible deadlock in macb_halt_tx. |
CVE-2025-38094
|
| VCID-cggr-nded-4kdf | kernel: Linux kernel: Local Denial of Service due to NULL pointer dereference in net/tls |
CVE-2025-38018
|
| VCID-d8ej-upmb-1ue2 | kernel: phy: tegra: xusb: Use a bitmask for UTMI pad power state tracking |
CVE-2025-38010
|
| VCID-dc47-7r56-tfhu | kernel: wifi: mt76: disable napi on driver removal |
CVE-2025-38009
|
| VCID-drqe-npyk-5yfa | kernel: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper |
CVE-2025-38014
|
| VCID-dwzr-3wdm-jbh6 | kernel: Linux kernel: RDMA/rxe use-after-free vulnerability leading to potential arbitrary code execution |
CVE-2025-38024
|
| VCID-g2gb-t5zm-1qb1 | kernel: net: mctp: Don't access ifa_index when missing |
CVE-2025-38006
|
| VCID-h1d8-gyg4-63ex | kernel: dmaengine: ti: k3-udma: Add missing locking |
CVE-2025-38005
|
| VCID-htcq-radh-pygy | kernel: net/mlx5e: Disable MACsec offload for uplink representor profile |
CVE-2025-38020
|
| VCID-hxfw-9578-mba2 | kernel: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices |
CVE-2025-38019
|
| VCID-jc6x-qzac-2khq | kernel: sched_ext: bpf_iter_scx_dsq_new() should always initialize iterator |
CVE-2025-38012
|
| VCID-nraj-qr2a-pubu | kernel: Linux kernel dma-buf: Denial of Service via memory reordering |
CVE-2025-38095
|
| VCID-nuva-dv49-xbau | kernel: regulator: max20086: fix invalid memory access |
CVE-2025-38027
|
| VCID-qjk3-cqtt-3fbz | kernel: Bluetooth: btnxpuart: Fix kernel panic during FW release |
CVE-2025-22102
|
| VCID-suxk-vufc-xqgj | kernel: Linux kernel: Denial of Service due to race condition in unaccepted memory handling |
CVE-2025-38008
|
| VCID-t1e7-w1sa-d3fz | kernel: Kernel: Denial of Service via NULL pointer dereference in NFS unlock path |
CVE-2025-38023
|
| VCID-t71t-scz9-kfc1 | kernel: wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request |
CVE-2025-38013
|
| VCID-u46c-by2j-6faa | kernel: HID: uclogic: Add NULL check in uclogic_input_configured() |
CVE-2025-38007
|
| VCID-x7ch-ec75-7faz | kernel: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem |
CVE-2025-38022
|