Search for packages
| purl | pkg:deb/debian/linux@6.12.41-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1brz-b2qw-pbhy | kernel: comedi: aio_iiro_16: Fix bit shift out of bounds |
CVE-2025-38529
|
| VCID-1bzc-r2hs-zkcg | kernel: mptcp: plug races between subflow fail and subflow creation |
CVE-2025-38552
|
| VCID-1ggp-6xxy-uqga | kernel: virtio-net: fix recursived rtnl_lock() during probe() |
CVE-2025-38551
|
| VCID-1nc8-e4r7-kuff | kernel: drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV |
CVE-2025-38104
|
| VCID-1yba-pq6x-qkh3 | kernel: iio: common: st_sensors: Fix use of uninitialize device structs |
CVE-2025-38531
|
| VCID-278s-pvy2-f3d1 | kernel: btrfs: fix assertion when building free space tree |
CVE-2025-38503
|
| VCID-3bny-rs9y-3yag | kernel: smb: client: fix use-after-free in cifs_oplock_break |
CVE-2025-38527
|
| VCID-3gad-tmfc-wqd2 | kernel: Linux kernel: Denial of Service in dm-bufio due to scheduling in atomic context |
CVE-2025-38496
|
| VCID-3yy5-gnkd-kkhg | kernel: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT |
CVE-2025-38439
|
| VCID-46ph-9mta-yqhy | kernel: drm/sched: Increment job count before swapping tail spsc queue |
CVE-2025-38515
|
| VCID-47ch-yrmn-7yfu | kernel: HID: core: ensure the allocated report buffer can contain the reserved report ID |
CVE-2025-38495
|
| VCID-4emc-x9jp-57d8 | kernel: atm: clip: Fix potential null-ptr-deref in to_atmarpd(). |
CVE-2025-38460
|
| VCID-4ewv-bsnw-6kay | kernel: s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again |
CVE-2025-38489
|
| VCID-4je6-6cfj-zfgw | kernel: nbd: fix uaf in nbd_genl_connect() error path |
CVE-2025-38443
|
| VCID-4uds-n12w-aket | kernel: soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled |
CVE-2025-38487
|
| VCID-51rd-4qg2-rkb4 | kernel: comedi: das16m1: Fix bit shift out of bounds |
CVE-2025-38483
|
| VCID-59j6-buc5-guhj | kernel: ksmbd: fix potential use-after-free in oplock/lease break ack |
CVE-2025-38437
|
| VCID-5c9r-d948-uqd4 | kernel: drm/tegra: nvdec: Fix dma_alloc_coherent error check |
CVE-2025-38543
|
| VCID-5czu-cp1h-5bfu | kernel: iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush |
CVE-2025-38485
|
| VCID-5fuy-7n9n-6qa6 | kernel: Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT |
CVE-2025-38335
|
| VCID-5qzv-svgm-d7hr | kernel: KVM: Allow CPU to reschedule while setting per-page memory attributes |
CVE-2025-38506
|
| VCID-5tyw-xkgy-cfgz | kernel: Linux kernel: Local privilege escalation or denial of service in usb: net: sierra driver |
CVE-2025-38474
|
| VCID-5vf7-bhpr-7ffc | kernel: iio: backend: fix out-of-bound write |
CVE-2025-38484
|
| VCID-5w4u-gzpx-tqan | kernel: Linux kernel: Denial of Service due to invalid queueing discipline (qdisc) parent class handling |
CVE-2025-38457
|
| VCID-5zw3-342h-eyex | kernel: md/md-bitmap: fix GPF in bitmap_get_stats() |
CVE-2025-38451
|
| VCID-728e-9me1-8ff3 | kernel: kasan: remove kasan_find_vm_area() to prevent possible deadlock |
CVE-2025-38510
|
| VCID-79gg-9ra8-fqfs | kernel: net: libwx: fix the using of Rx buffer DMA |
CVE-2025-38533
|
| VCID-7kmw-esqh-qyc2 | kernel: net: libwx: properly reset Rx ring descriptor |
CVE-2025-38532
|
| VCID-7p3m-t7q4-vuay | kernel: Linux kernel use-after-free in eventpoll |
CVE-2025-38349
|
| VCID-7p9b-nj4u-bbak | kernel: HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras |
CVE-2025-38540
|
| VCID-7r8h-rr9v-7qht | kernel: ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak. |
CVE-2025-38438
|
| VCID-7umx-f6es-hqgf | kernel: Linux kernel: Denial of Service in drm/imagination driver via improper GPU reset handling |
CVE-2025-38521
|
| VCID-7vhj-ptcf-cuc1 | kernel: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() |
CVE-2025-38458
|
| VCID-8dbn-tnsj-4bbe | kernel: Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() |
CVE-2025-38473
|
| VCID-9gkq-3bzw-kbdg | kernel: wifi: mwifiex: discard erroneous disassoc frames on STA interface |
CVE-2025-38505
|
| VCID-aa2q-cu55-w7g7 | kernel: phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode |
CVE-2025-38535
|
| VCID-advv-bewn-vue9 | kernel: KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight |
CVE-2025-38455
|
| VCID-aecr-jk8v-5fa6 | kernel: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry |
CVE-2025-38472
|
| VCID-afdr-tvz5-83ax | kernel: wifi: prevent A-MSDU attacks in mesh networks |
CVE-2025-38512
|
| VCID-ag6b-2w7j-f7fr | kernel: tracing: Add down_write(trace_event_sem) when adding trace event |
CVE-2025-38539
|
| VCID-at2g-xzwv-ubga | kernel: comedi: pcl812: Fix bit shift out of bounds |
CVE-2025-38530
|
| VCID-aucw-cvc4-27fp | kernel: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree |
CVE-2025-38468
|
| VCID-b9vy-ysvc-8kcc | kernel: xfrm: state: initialize state_ptrs earlier in xfrm_state_find |
CVE-2025-38675
|
| VCID-bxux-7g8n-qqe6 | kernel: Linux kernel: Denial of Service in BPF due to format string vulnerability |
CVE-2025-38528
|
| VCID-by2m-26mx-qbg4 | kernel: KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop poll hypercalls |
CVE-2025-38469
|
| VCID-ck1j-mjjg-qfgc | kernel: ALSA: ad1816a: Fix potential NULL pointer deref in snd_card_ad1816a_pnp() |
CVE-2025-38454
|
| VCID-d7f6-jh2h-nyhh | kernel: arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() |
CVE-2025-38670
|
| VCID-d7kb-e9tx-dye1 | kernel: clk: imx: Fix an out-of-bounds access in dispmix_csr_clk_dev_data |
CVE-2025-38446
|
| VCID-dh5z-2avs-5fa9 | kernel: crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() |
CVE-2025-37984
|
| VCID-ds3w-wph8-7kam | kernel: drm/gem: Acquire references on GEM handles for framebuffers |
CVE-2025-38449
|
| VCID-e359-3czk-7ka8 | kernel: xfrm: interface: fix use-after-free after changing collect_md xfrm interface |
CVE-2025-38500
|
| VCID-es4k-7j4u-qyah | kernel: vsock: Fix transport_* TOCTOU |
CVE-2025-38461
|
| VCID-f2ce-pung-aqgw | kernel: Linux kernel: Denial of Service in rxrpc due to prealloc collision |
CVE-2025-38544
|
| VCID-f85j-ru6j-hfg5 | kernel: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() |
CVE-2025-38664
|
| VCID-f8ta-wn7s-nfhc | kernel: mptcp: make fallback action and fallback decision atomic |
CVE-2025-38491
|
| VCID-fnaw-jb9f-jkga | kernel: Linux kernel: Memory leak in ATM clip module can lead to denial of service |
CVE-2025-38546
|
| VCID-fzak-rhfb-xfc3 | kernel: usb: gadget: u_serial: Fix race condition in TTY wakeup |
CVE-2025-38448
|
| VCID-gmpj-3qde-cbhm | kernel: comedi: Fix use of uninitialized data in insn_rw_emulate_bits() |
CVE-2025-38480
|
| VCID-h7b5-k6yn-fueg | kernel: Linux kernel: Denial of Service due to race condition in mlx5e driver |
CVE-2025-38440
|
| VCID-h7t2-setw-3bhg | kernel: Linux kernel (i2c: qup): Denial of Service via improper I2C client timeout handling |
CVE-2025-38671
|
| VCID-hawy-rbjj-5bgt | IEEE P802.11-REVme D1.1 through D7.0 allows FragAttacks against mesh networks. In mesh networks using Wi-Fi Protected Access (WPA, WPA2, or WPA3) or Wired Equivalent Privacy (WEP), an adversary can exploit this vulnerability to inject arbitrary frames towards devices that support receiving non-SSP A-MSDU frames. NOTE: this issue exists because of an incorrect fix for CVE-2020-24588. P802.11-REVme, as of early 2025, is a planned release of the 802.11 standard. |
CVE-2025-27558
|
| VCID-hm6c-rmfx-sfav | kernel: HID: core: do not bypass hid_hw_raw_request |
CVE-2025-38494
|
| VCID-j1gx-dp1w-7fct | kernel: drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling |
CVE-2025-38467
|
| VCID-jahq-t6tr-17ha | kernel: ipv6: mcast: Delay put pmc->idev in mld_del_delrec() |
CVE-2025-38550
|
| VCID-jtfa-c7ay-vfh9 | kernel: jfs: reject on-disk inodes of an unsupported type |
CVE-2025-37925
|
| VCID-k8f3-pvup-7kf3 | kernel: ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv |
CVE-2025-38662
|
| VCID-kdjg-feqt-abb2 | kernel: Linux kernel: Denial of Service via buffer overflow in timerlat_dump_stack() |
CVE-2025-38493
|
| VCID-kkvv-pn86-ckex | kernel: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() |
CVE-2025-38441
|
| VCID-ks39-3h8c-8ubf | kernel: drm/xe/pf: Clear all LMTT pages on alloc |
CVE-2025-38511
|
| VCID-kv4f-h7zy-2yhd | kernel: rxrpc: Fix recv-recv race of completed call |
CVE-2025-38524
|
| VCID-m37t-uz4s-kbe9 | kernel: iio: adc: axp20x_adc: Add missing sentinel to AXP717 ADC channel maps |
CVE-2025-38547
|
| VCID-mhte-neuf-qbcv | kernel: raid10: cleanup memleak at raid10_make_request |
CVE-2025-38444
|
| VCID-mnqd-esg1-ybhz | kernel: rxrpc: Fix oops due to non-existence of prealloc backlog struct |
CVE-2025-38514
|
| VCID-mtxh-7f6h-t3g4 | kernel: HID: nintendo: avoid bluetooth suspend/resume stalls |
CVE-2025-38507
|
| VCID-mu97-p4wb-5qck | kernel: Linux kernel: Denial of Service in ATM CLIP module via infinite recursion |
CVE-2025-38459
|
| VCID-n3ya-v2k4-efaz | kernel: net: ethernet: rtsn: Fix a null pointer dereference in rtsn_probe() |
CVE-2025-38452
|
| VCID-ndg7-qfdw-v3dn | kernel: tipc: Fix use-after-free in tipc_conn_close() |
CVE-2025-38464
|
| VCID-ne7a-pgn5-qfa8 | kernel: tcp: Correct signedness in skb remaining space calculation |
CVE-2025-38463
|
| VCID-new6-g4u4-tqbh | kernel: tls: always refresh the queue when reading sock |
CVE-2025-38471
|
| VCID-p64w-vsxs-2qc8 | kernel: netlink: Fix wraparounds of sk->sk_rmem_alloc. |
CVE-2025-38465
|
| VCID-p789-6xk9-4faj | kernel: comedi: das6402: Fix bit shift out of bounds |
CVE-2025-38482
|
| VCID-pa8u-zdsm-w7ec | kernel: pinctrl: qcom: msm: mark certain pins as invalid for interrupts |
CVE-2025-38516
|
| VCID-pd9u-evp2-abh9 | kernel: nilfs2: reject invalid file types when reading inodes |
CVE-2025-38663
|
| VCID-pnqz-df9d-eue7 | kernel: regulator: core: fix NULL dereference on unbind due to stale coupling data |
CVE-2025-38668
|
| VCID-q3ee-s8tk-vqag | kernel: Linux kernel: Denial of Service due to stack memory use-after-return in raid1_reshape |
CVE-2025-38445
|
| VCID-q9rm-e46v-gqce | kernel: Linux kernel: Denial of Service in vsock due to TOCTOU race condition |
CVE-2025-38462
|
| VCID-qdb7-v56t-nbge | kernel: net: phy: Don't register LEDs for genphy |
CVE-2025-38537
|
| VCID-qpcg-6qxq-cybf | kernel: Linux kernel: Denial of Service due to memory leak in efivarfs |
CVE-2025-38549
|
| VCID-r7b5-ehyh-wfgz | kernel: wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init() |
CVE-2025-38541
|
| VCID-raxr-6p97-t7hk | kernel: can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode |
CVE-2025-38665
|
| VCID-rqk9-ym9a-zydh | kernel: net/sched: sch_qfq: Fix race condition on qfq_aggregate |
CVE-2025-38477
|
| VCID-samc-rh7c-u3ba | kernel: Linux kernel: Denial of Service due to double-free vulnerability in libwx |
CVE-2025-38490
|
| VCID-sg5f-9ycp-7ybk | kernel: hwmon: (corsair-cpro) Validate the size of the received input buffer |
CVE-2025-38548
|
| VCID-sh6x-y76e-kqa7 | kernel: rpl: Fix use-after-free in rpl_do_srh_inline() |
CVE-2025-38476
|
| VCID-t4td-c8ew-u7hs | kernel: drm/amdkfd: Don't call mmput from MMU notifier callback |
CVE-2025-38520
|
| VCID-t7j1-s8d2-vkf1 | kernel: Linux kernel: Denial of Service via device refcount leak in Appletalk protocol implementation |
CVE-2025-38542
|
| VCID-tdcn-32wh-23c3 | kernel: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info |
CVE-2025-38545
|
| VCID-tem5-juk6-uudj | kernel: usb: gadget: configfs: Fix OOB read on empty string write |
CVE-2025-38497
|
| VCID-tgfe-e37a-r3cf | kernel: Linux kernel (smc): Denial of Service due to type confusion |
CVE-2025-38475
|
| VCID-twgj-58ts-9ybu | kernel: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush |
CVE-2025-38351
|
| VCID-u2dn-mnr7-m3hy | kernel: s390/ism: fix concurrency management in ism_cmd() |
CVE-2025-39726
|
| VCID-u3xh-m3py-ybgs | kernel: comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large |
CVE-2025-38481
|
| VCID-u5xg-qnf4-b7at | kernel: Linux kernel mt7925 Wi-Fi driver: Denial of Service via NULL pointer dereference |
CVE-2025-38450
|
| VCID-v4ds-msgy-m3bv | kernel: btrfs: fix block group refcount race in btrfs_create_pending_block_groups() |
CVE-2025-22115
|
| VCID-wace-ayvn-zucy | kernel: Linux kernel: Denial of Service in uprobes due to improper instruction validation |
CVE-2025-38466
|
| VCID-wq75-bzh1-43d7 | kernel: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime |
CVE-2025-38470
|
| VCID-wq7x-m1fj-g7dg | kernel: ice: add NULL check in eswitch lag check |
CVE-2025-38526
|
| VCID-xpat-gan5-mfh6 | kernel: rseq: Fix segfault on registration when rseq_cs is non-zero |
CVE-2025-38067
|
| VCID-xyxt-ndt5-nkem | kernel: lib/alloc_tag: do not acquire non-existent lock in alloc_tag_top_users() |
CVE-2025-38517
|
| VCID-y4a2-nvuz-23cx | kernel: mm/vmscan: fix hwpoisoned large folio handling in shrink_folio_list |
CVE-2025-39725
|
| VCID-y8jw-xjf6-wycm | kernel: Linux kernel: Denial of Service in SMB client due to use-after-free in asynchronous crypto handling |
CVE-2025-38488
|
| VCID-yam8-11x5-budv | kernel: dmaengine: nbpfaxi: Fix memory corruption in probe() |
CVE-2025-38538
|
| VCID-z27y-c26s-wuek | kernel: wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev() |
CVE-2025-38513
|
| VCID-z62f-5fsk-rkgq | kernel: net: appletalk: Fix use-after-free in AARP proxy probe |
CVE-2025-38666
|
| VCID-z84t-p3sj-1ub5 | kernel: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns |
CVE-2025-38499
|
| VCID-z8bf-rebn-r7bm | kernel: comedi: Fix initialization of data for instructions that write to subdevice |
CVE-2025-38478
|
| VCID-zeyj-ng6h-1kcd | kernel: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() |
CVE-2025-38456
|