Search for packages
| purl | pkg:deb/debian/linux@6.12.32-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-21z5-p9ct-p7g2 | kernel: wifi: iwlwifi: fix debug actions order |
CVE-2025-38045
|
| VCID-321e-n6u7-r3cb | kernel: ptp: ocp: Limit signal/freq counts in summary output functions |
CVE-2025-38054
|
| VCID-4785-svcx-fqc3 | kernel: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock |
CVE-2025-38058
|
| VCID-4pfh-69kg-17bc | kernel: smb: client: Fix use-after-free in cifs_fill_dirent |
CVE-2025-38051
|
| VCID-55j6-49hy-nbhv | kernel: gpio: virtuser: fix potential out-of-bound write |
CVE-2025-38082
|
| VCID-6a6r-5fwk-u3ax | kernel: Linux kernel: Use-After-Free vulnerability in PCM OSS layer due to race condition |
CVE-2025-38078
|
| VCID-6r1j-pnmx-mkdm | kernel: Linux Kernel: Denial of Service in iwlwifi due to improper firmware error handling |
CVE-2025-38096
|
| VCID-75fw-e7zr-qufc | kernel: nvmet-tcp: don't restore null sk_state_change |
CVE-2025-38035
|
| VCID-7jb6-fpgr-yuec | kernel: Linux kernel AMD display driver: Denial of Service via incorrect DML21 plane_id query |
CVE-2025-38091
|
| VCID-7jmm-2y4z-u3bj | kernel: net: pktgen: fix access outside of user given buffer in pktgen_thread_write() |
CVE-2025-38061
|
| VCID-8dud-6uza-ekc9 | kernel: Linux kernel Bluetooth: Denial of Service via improper SCO voice setting |
CVE-2025-38099
|
| VCID-9dpa-sr3b-xfdq | kernel: Linux kernel: Data race in virtio_ring can lead to denial of service |
CVE-2025-38048
|
| VCID-9p2w-b7vj-yya1 | kernel: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done |
CVE-2025-38052
|
| VCID-ah9v-pkq9-uqek | kernel: spi-rockchip: Fix register out of bounds access |
CVE-2025-38081
|
| VCID-bquq-cmn8-5kbr | kernel: idpf: fix null-ptr-deref in idpf_features_check |
CVE-2025-38053
|
| VCID-c83s-2hkq-v7dx | kernel: padata: do not leak refcount in reorder_work |
CVE-2025-38031
|
| VCID-deaw-fjms-u3fh | kernel: x86/mm: Check return value from memblock_phys_alloc_range() |
CVE-2025-38071
|
| VCID-f616-emkd-g3hu | kernel: serial: mctrl_gpio: split disable_ms into sync and no_sync APIs |
CVE-2025-38040
|
| VCID-fh55-d7fy-jbcm | kernel: drm/amd/display: Don't treat wb connector as physical in create_validate_stream_for_sink |
CVE-2025-38098
|
| VCID-fhf4-drwe-eugu | kernel: Linux kernel: Use-After-Free vulnerability in MSI translation via IOMMU domain change during VFIO operation |
CVE-2025-38062
|
| VCID-fmh7-u2fr-tygw | kernel: espintcp: fix skb leaks |
CVE-2025-38057
|
| VCID-fu8g-cmhp-vqfb | kernel: media: cx231xx: set device_caps for 417 |
CVE-2025-38044
|
| VCID-h5b9-yvze-nyc7 | kernel: espintcp: remove encap socket caching to avoid reference leak |
CVE-2025-38097
|
| VCID-j167-3jme-h7d6 | kernel: dm cache: prevent BUG_ON by blocking retries on failed device resumes |
CVE-2025-38066
|
| VCID-jhzr-1fc7-x3en | kernel: perf/x86/intel: Fix segfault with PEBS-via-PT with sample_freq |
CVE-2025-38055
|
| VCID-jxy9-g2vu-23g9 | kernel: Linux kernel: Use-after-free in ASoC SOF Intel HDA driver allows information disclosure, privilege escalation, or denial of service |
CVE-2025-38056
|
| VCID-p4zs-7bzn-myhf | kernel: x86/fred: Fix system hang during S4 resume with FRED enabled |
CVE-2025-38047
|
| VCID-qgyt-826f-wuhy | kernel: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice |
CVE-2025-38001
|
| VCID-qunx-79yy-tqhb | kernel: orangefs: Do not truncate file size |
CVE-2025-38065
|
| VCID-rgt3-asgv-8be3 | kernel: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() |
CVE-2025-38000
|
| VCID-rmm1-ny95-s3gn | kernel: Linux kernel: BPF verifier security bypass due to incorrect state handling |
CVE-2025-38060
|
| VCID-rn7v-jp3y-7udf | kernel: can: bcm: add missing rcu read protection for procfs content |
CVE-2025-38003
|
| VCID-s11g-4uc7-77ar | kernel: Linux kernel: LZO compression buffer overrun due to insufficient output buffer checks |
CVE-2025-38068
|
| VCID-tczs-u9mb-zqgq | kernel: firmware: arm_ffa: Set dma_mask for ffa devices |
CVE-2025-38043
|
| VCID-tfg7-cn7k-ffaj | kernel: drm/amd/display: Increase block_sequence array size |
CVE-2025-38080
|
| VCID-tmap-v72a-jydg | kernel: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref |
CVE-2025-38034
|
| VCID-uc8y-s8hf-vfa7 | kernel: Linux kernel: Buffer overflow in dell-wmi-sysman leading to denial of service, information disclosure, or code execution |
CVE-2025-38077
|
| VCID-vc5p-efem-2qhj | kernel: ksmbd: use list_first_entry_or_null for opinfo_get_list() |
CVE-2025-38092
|
| VCID-vwmn-w6tb-sudq | kernel: Linux kernel: Denial of Service in amd-pstate cpufreq driver via deadlock |
CVE-2025-38038
|
| VCID-w4u7-5ke3-57a7 | kernel: net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabled |
CVE-2025-38039
|
| VCID-x9za-c2zz-rqfk | kernel: vhost-scsi: protect vq->log_used with vq->mutex |
CVE-2025-38074
|
| VCID-xgn2-cjg9-jkay | kernel: libnvdimm/labels: Fix divide error in nd_label_data_init() |
CVE-2025-38072
|
| VCID-xuhf-kwk4-y3dx | kernel: can: bcm: add locking for bcm_op runtime updates |
CVE-2025-38004
|
| VCID-yc6p-cqzt-pbby | kernel: crypto: algif_hash - fix double free in hash_accept |
CVE-2025-38079
|
| VCID-yg28-ap29-tudc | kernel: dm: fix unconditional IO throttle caused by REQ_PREFLUSH |
CVE-2025-38063
|
| VCID-ypt7-tc1u-p3ev | kernel: btrfs: avoid NULL pointer dereference if no valid csum tree |
CVE-2025-38059
|
| VCID-yqcd-vygr-zug6 | kernel: vxlan: Annotate FDB data races |
CVE-2025-38037
|
| VCID-yuf4-s8bg-93bf | kernel: Linux kernel: Denial of Service due to NULL pointer dereference in iSCSI target NOPIN timer handling |
CVE-2025-38075
|
| VCID-zufu-pwxh-eqbw | kernel: PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops |
CVE-2025-38069
|
| VCID-zw8d-9m9a-yqex | kernel: x86/Kconfig: make CFI_AUTO_DEFAULT depend on !RUST or Rust >= 1.88 |
CVE-2025-38033
|