Search for packages
| purl | pkg:deb/debian/linux@6.12.57-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1epc-ddrq-v7bw | kernel: net: tun: Update napi->skb after XDP process |
CVE-2025-39984
|
| VCID-1kx2-fvd6-abcu | kernel: crypto: af_alg - Set merge to zero early in af_alg_sendmsg |
CVE-2025-39931
|
| VCID-1nsb-9t2e-2kf4 | kernel: drm/panthor: Fix kernel panic on partial unmap of a GPU VA region |
CVE-2025-40225
|
| VCID-1x2r-t2gj-akgf | kernel: netfilter: nft_objref: validate objref and objrefmap expressions |
CVE-2025-40206
|
| VCID-1xv5-7gzs-8fb1 | kernel: net: phy: micrel: always set shared->phydev for LAN8814 |
CVE-2025-40239
|
| VCID-2a25-xxe2-4bf3 | kernel: Bluetooth: ISO: Fix possible UAF on iso_conn_free |
CVE-2025-40141
|
| VCID-2g48-2tyb-4ugq | kernel: qed: Don't collect too many protection override GRC elements |
CVE-2025-39949
|
| VCID-2hdc-hwf3-bqax | kernel: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() |
CVE-2025-40088
|
| VCID-311t-c3jg-tuc3 | kernel: usb: gadget: f_acm: Refactor bind path to use __free() |
CVE-2025-40094
|
| VCID-3279-e33p-nkay | kernel: can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow |
CVE-2025-39986
|
| VCID-36xm-pbn4-2yfu | kernel: Linux kernel i40e: Resource exhaustion via unbounded VF filter requests |
CVE-2025-39968
|
| VCID-3fr1-fm18-qfhr | kernel: ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback |
CVE-2025-40132
|
| VCID-3gtc-6ny2-ybe6 | kernel: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III |
CVE-2025-40124
|
| VCID-3vzu-bb37-9ydc | kernel: sctp: Fix MAC comparison to be constant-time |
CVE-2025-40204
|
| VCID-3y1h-tf8h-yqev | kernel: tls: make sure to abort the stream if headers are bogus |
CVE-2025-39946
|
| VCID-46cw-muvz-kudc | kernel: cnic: Fix use-after-free bugs in cnic_delete_task |
CVE-2025-39945
|
| VCID-4ebq-x7rk-4ya3 | kernel: wifi: wilc1000: avoid buffer overflow in WID string configuration |
CVE-2025-39952
|
| VCID-4jrg-kd6n-wbbg | kernel: igc: don't fail igc_probe() on LED setup error |
CVE-2025-39956
|
| VCID-4qjp-y931-9uet | kernel: vhost: Take a reference on the task in struct vhost_task |
CVE-2025-40024
|
| VCID-4wyy-uw7z-5be9 | kernel: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work |
CVE-2025-40003
|
| VCID-4y19-hvww-dqcs | kernel: i40e: fix idx validation in i40e_validate_queue_map |
CVE-2025-39972
|
| VCID-4ywv-9sxh-q7gf | kernel: drm/vmwgfx: Fix Use-after-free in validation |
CVE-2025-40111
|
| VCID-5fzg-3bmp-gkee | kernel: i40e: fix input validation logic for action_meta |
CVE-2025-39970
|
| VCID-5nsy-fndc-7ka8 | kernel: tty: n_gsm: Don't block input queue by waiting MSC |
CVE-2025-40071
|
| VCID-5qq9-p617-8kb6 | kernel: afs: Fix potential null pointer dereference in afs_put_server |
CVE-2025-40010
|
| VCID-5vzs-ujfb-qubj | kernel: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak |
CVE-2025-40035
|
| VCID-5xry-bk46-m7ae | kernel: most: usb: Fix use-after-free in hdm_disconnect |
CVE-2025-40223
|
| VCID-5z1p-98w2-dbc3 | kernel: ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size |
CVE-2025-39942
|
| VCID-681k-sqwe-abh1 | kernel: x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP |
CVE-2025-40181
|
| VCID-686r-fvxa-vqhx | kernel: can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled |
CVE-2025-40107
|
| VCID-6bc1-grr5-2uef | kernel: iommufd: Fix race during abort for file descriptors |
CVE-2025-39966
|
| VCID-6faj-ta9a-cyfn | kernel: sctp: avoid NULL dereference when chunk data buffer is missing |
CVE-2025-40240
|
| VCID-6fwr-v8rj-s3d3 | kernel: ocfs2: fix double free in user_cluster_connect() |
CVE-2025-40055
|
| VCID-6gxs-qg6w-y3dg | kernel: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL |
CVE-2025-39678
|
| VCID-6n32-z9u6-gfch | kernel: f2fs: fix to truncate first page in error path of f2fs_truncate() |
CVE-2025-40137
|
| VCID-6x53-rdak-h3gw | kernel: fbdev: simplefb: Fix use after free in simplefb_detach_genpds() |
CVE-2025-40037
|
| VCID-7avq-dq92-7bhg | kernel: mm/hugetlb: fix folio is still mapped when deleted |
CVE-2025-40006
|
| VCID-7cnt-x96y-vqfy | kernel: can: peak_usb: fix shift-out-of-bounds issue |
CVE-2025-40020
|
| VCID-7hnj-p4bx-73ac | kernel: btrfs: do not assert we found block group item when creating free space tree |
CVE-2025-40100
|
| VCID-7pgr-fdhf-83du | kernel: ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer |
CVE-2025-39943
|
| VCID-7srj-fan9-bygq | kernel: io_uring/waitid: always prune wait queue entry in io_waitid_wait() |
CVE-2025-40047
|
| VCID-7thm-a7w6-vbhe | kernel: Linux kernel: Buffer overflow in target_lu_gp_members_show can lead to arbitrary code execution |
CVE-2025-39998
|
| VCID-7u2d-zbp4-y7ft | kernel: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference |
CVE-2025-40042
|
| VCID-7vdf-qwa1-ubeg | kernel: smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) |
CVE-2025-39932
|
| VCID-7zyx-neq8-ybe8 | kernel: Linux kernel: Data corruption and denial of service in vhost/vringh due to improper copy_to_iter return value check |
CVE-2025-40056
|
| VCID-82py-ut98-qfb3 | kernel: iommu/amd/pgtbl: Fix possible race while increase page table level |
CVE-2025-39961
|
| VCID-8319-gum8-dfbb | kernel: sunrpc: fix null pointer dereference on zero-length checksum |
CVE-2025-40129
|
| VCID-86w7-n9bm-4bcu | kernel: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card |
CVE-2025-40085
|
| VCID-8fue-j8hg-vfb2 | kernel: drm/gma500: Fix null dereference in hdmi teardown |
CVE-2025-40011
|
| VCID-8hez-6g8f-aqev | kernel: smb: client: fix crypto buffers in non-linear memory |
CVE-2025-40052
|
| VCID-8mdf-dtv1-zqec | kernel: Linux kernel: Denial of service in i10nm_edac driver due to disabled memory controller |
CVE-2025-40157
|
| VCID-8vyv-u4s9-4kae | kernel: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths |
CVE-2025-40201
|
| VCID-8vz2-e9vk-sfb8 | kernel: crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs |
CVE-2025-40062
|
| VCID-93yj-3vbb-3ub5 | kernel: bpf: Check the helper function is valid in get_helper_proto |
CVE-2025-39990
|
| VCID-94e2-v7fm-1kcv | kernel: iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE |
CVE-2025-21833
|
| VCID-954w-5xws-bkd1 | kernel: Linux kernel: NULL pointer dereference in mount leads to local denial of service |
CVE-2025-40195
|
| VCID-9aru-svmf-kbfr | kernel: usb: gadget: f_ecm: Refactor bind path to use __free() |
CVE-2025-40093
|
| VCID-9ccn-pye3-kbgb | kernel: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST |
CVE-2025-40101
|
| VCID-9d3k-s661-nud4 | kernel: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping |
CVE-2025-40154
|
| VCID-9hk6-ttws-hkdw | kernel: drm/vmwgfx: Fix a null-ptr access in the cursor snooper |
CVE-2025-40110
|
| VCID-9m1a-8rh4-tbfq | kernel: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() |
CVE-2025-39978
|
| VCID-9ns9-s6pf-d7hr | kernel: Linux kernel: Denial of Service via integer overflow in dm-stripe |
CVE-2025-39940
|
| VCID-9prt-dwy5-pkfj | kernel: mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable() |
CVE-2025-40133
|
| VCID-9rb8-c41v-byf2 | kernel: PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() |
CVE-2025-40156
|
| VCID-9trv-6m6q-5yae | kernel: net: dlink: handle copy_thresh allocation failure |
CVE-2025-40053
|
| VCID-9v2n-85hk-d3dh | kernel: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe |
CVE-2025-39995
|
| VCID-a12r-8uyz-tyem | kernel: Squashfs: fix uninit-value in squashfs_get_parent |
CVE-2025-40049
|
| VCID-a7vh-jjmx-3qhc | kernel: ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed |
CVE-2025-39938
|
| VCID-adym-gsev-sfey | kernel: futex: Prevent use-after-free during requeue-PI |
CVE-2025-39977
|
| VCID-antz-3h6j-n7f6 | kernel: fbcon: fix integer overflow in fbcon_do_set_font |
CVE-2025-39967
|
| VCID-areu-d2us-guhb | kernel: perf/x86/intel: Fix crash in icl_update_topdown_event() |
CVE-2025-38322
|
| VCID-as4s-97zw-x3bz | kernel: i40e: fix idx validation in config queues msg |
CVE-2025-39971
|
| VCID-awxe-sksj-87f5 | kernel: can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow |
CVE-2025-39988
|
| VCID-b5p8-njwq-sqhk | kernel: crypto: af_alg - Fix incorrect boolean values in af_alg_ctx |
CVE-2025-40022
|
| VCID-bbmr-5gqq-sqe7 | kernel: drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ |
CVE-2025-39934
|
| VCID-beqz-y8h2-sbgs | kernel: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast |
CVE-2025-40140
|
| VCID-bjza-jgxq-rqh4 | kernel: ocfs2: clear extent cache after moving/defragmenting extents |
CVE-2025-40233
|
| VCID-bmvt-m7sr-skgy | kernel: nios2: ensure that memblock.current_limit is set when setting pfn limits |
CVE-2025-40245
|
| VCID-bza6-2aqf-ukbh | kernel: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() |
CVE-2025-40346
|
| VCID-c1bg-jns5-s3dg | kernel: ice: fix Rx page leak on multi-buffer frames |
CVE-2025-39948
|
| VCID-c3dk-zkrf-x3fj | kernel: Linux kernel: Privilege escalation or Denial of Service via TCP Fast Open vulnerability |
CVE-2025-40186
|
| VCID-c8t3-zakp-jqe2 | kernel: drm/amd/display: increase max link count and fix link->enc NULL pointer access |
CVE-2025-40354
|
| VCID-ce1p-mpa2-6bbr | kernel: net/mlx5: Fix IPsec cleanup over MPV device |
CVE-2025-40238
|
| VCID-chhk-jc2v-zyae | kernel: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() |
CVE-2025-40244
|
| VCID-ck9r-m9hw-y7g1 | kernel: smb: client: fix wrong index reference in smb2_compound_op() |
CVE-2025-39975
|
| VCID-cx7t-25fw-1bdu | kernel: usb: gadget: f_rndis: Refactor bind path to use __free() |
CVE-2025-40095
|
| VCID-cz3y-gxb5-yyew | kernel: hfs: validate record offset in hfsplus_bmap_alloc |
CVE-2025-40349
|
| VCID-d178-8c3s-tkan | kernel: i40e: add validation for ring_len param |
CVE-2025-39973
|
| VCID-d4fk-h32c-2bb5 | kernel: pwm: berlin: Fix wrong register in suspend/resume |
CVE-2025-40188
|
| VCID-d52n-tszf-kbb6 | kernel: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() |
CVE-2025-40194
|
| VCID-d8tr-usd8-6yca | kernel: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV |
CVE-2025-40219
|
| VCID-dmjg-sqz8-9yb7 | kernel: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() |
CVE-2025-39955
|
| VCID-dr2g-7nmg-jfh1 | kernel: media: pci: mg4b: fix uninitialized iio scan data |
CVE-2025-40221
|
| VCID-dsyh-3m9c-gufx | kernel: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() |
CVE-2025-40187
|
| VCID-e2pp-vkfh-4qej | kernel: drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies |
CVE-2025-40096
|
| VCID-e6na-e54f-gygm | kernel: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths |
CVE-2025-39816
|
| VCID-e8j3-8h7n-6kd3 | kernel: udmabuf: fix a buf size overflow issue during udmabuf creation |
CVE-2025-37803
|
| VCID-ef5h-b4sk-pycu | kernel: binder: fix double-free in dbitmap |
CVE-2025-40028
|
| VCID-en51-ndg3-nya2 | kernel: uio_hv_generic: Let userspace take care of interrupt mask |
CVE-2025-40048
|
| VCID-ep5k-5evd-2qhg | kernel: fs: udf: fix OOB read in lengthAllocDescs handling |
CVE-2025-40044
|
| VCID-eqqg-y6kf-8uan | kernel: firmware: arm_scmi: Account for failed debug initialization |
CVE-2025-40226
|
| VCID-evrz-zess-n3g1 | kernel: ixgbevf: fix mailbox API compatibility by negotiating supported features |
CVE-2025-40104
|
| VCID-ezje-17n4-x3ew | kernel: tee: fix register_shm_helper() |
CVE-2025-40031
|
| VCID-ezzy-1zx4-efbk | kernel: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() |
CVE-2025-40198
|
| VCID-f1uu-64pk-y7dr | kernel: fs/notify: call exportfs_encode_fid with s_umount |
CVE-2025-40237
|
| VCID-f5s7-zw63-ayaf | kernel: mm: swap: check for stable address space before operating on the VMA |
CVE-2025-39992
|
| VCID-fa5h-ka6h-nkh5 | kernel: coresight: Fix incorrect handling for return value of devm_kzalloc |
CVE-2025-40059
|
| VCID-fbf1-uqgb-juat | kernel: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() |
CVE-2025-38643
|
| VCID-ff1s-taxm-xyc2 | kernel: Linux kernel: Use-after-free in xc5000 tuner driver due to race condition |
CVE-2025-39994
|
| VCID-fk6k-5wz9-k3hh | kernel: Linux kernel: Denial of Service due to memory leak in SMB client |
CVE-2025-39929
|
| VCID-fr3g-sbxx-s7er | kernel: media: rc: fix races with imon_disconnect() |
CVE-2025-39993
|
| VCID-fs6s-jdqw-kfch | In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the current register contents. This commit fixes a couple of bad calculations and a broken epilogue in the exception handlers. This will prevent crashes and ensure correct return values of copy_from_user and copy_to_user in the faulting case. The behaviour of memcpy stays unchanged. |
CVE-2025-40112
|
| VCID-fu7r-nnzr-3yfk | kernel: btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots() |
CVE-2025-40235
|
| VCID-fufn-uqtv-wkas | kernel: f2fs: fix to avoid panic once fallocation fails for pinfile |
CVE-2025-23130
|
| VCID-fumm-c7vy-4ydp | kernel: bpf: Reject negative offsets for ALU ops |
CVE-2025-40169
|
| VCID-g34c-hwct-tqb1 | kernel: ptp: Add a upper bound on max_vclocks |
CVE-2025-40057
|
| VCID-ge76-761p-tkdv | kernel: usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup |
CVE-2025-40116
|
| VCID-genq-1u1r-1kbv | kernel: net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer |
CVE-2025-39937
|
| VCID-gf9m-8mf2-bqat | kernel: fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist |
CVE-2025-40067
|
| VCID-ggrz-9e98-ykg2 | kernel: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() |
CVE-2025-40000
|
| VCID-gnjt-sbh2-4ud8 | kernel: net/9p: Fix buffer overflow in USB transport layer |
CVE-2025-40004
|
| VCID-gnvn-qhzr-dyfa | kernel: vsock: fix lock inversion in vsock_assign_transport() |
CVE-2025-40231
|
| VCID-gqs9-1huv-gyck | kernel: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() |
CVE-2025-39944
|
| VCID-gt6u-vdfu-hkek | kernel: hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits() |
CVE-2025-40243
|
| VCID-gv16-egay-kufe | kernel: vfs: Don't leak disconnected dentries on umount |
CVE-2025-40105
|
| VCID-h1w2-bbtg-qfaa | kernel: i40e: fix validation of VF state in get resources |
CVE-2025-39969
|
| VCID-h3qz-yv9u-dygv | kernel: xsk: Harden userspace-supplied xdp_desc validation |
CVE-2025-40159
|
| VCID-h8tr-9qhx-8qat | kernel: media: mc: Clear minor number before put device |
CVE-2025-40197
|
| VCID-ha6w-4v7c-nyfb | kernel: ext4: guard against EA inode refcount underflow in xattr update |
CVE-2025-40190
|
| VCID-hhn7-3hub-pbc7 | kernel: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC |
CVE-2025-40126
|
| VCID-hk22-6w6w-pue3 | kernel: NFSD: Define a proc_layoutcommit for the FlexFiles layout type |
CVE-2025-40087
|
| VCID-hqff-95rf-8qbu | kernel: kmsan: fix out-of-bounds access to shadow memory |
CVE-2025-40008
|
| VCID-hu4f-e8qk-8fbz | kernel: fs: quota: create dedicated workqueue for quota_release_work |
CVE-2025-40196
|
| VCID-hwcn-bnd9-e7c7 | kernel: cgroup: split cgroup_destroy_wq into 3 workqueues |
CVE-2025-39953
|
| VCID-hzmg-udjd-5kfg | kernel: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() |
CVE-2025-40115
|
| VCID-j1d8-n694-wfc6 | kernel: dm: fix NULL pointer dereference in __dm_suspend() |
CVE-2025-40134
|
| VCID-j7xf-6d47-73fy | kernel: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() |
CVE-2025-40033
|
| VCID-j9tf-d5qg-6fgq | kernel: gfs2: Fix unlikely race in gdlm_put_lock |
CVE-2025-40242
|
| VCID-jfhv-6svu-x3f6 | kernel: sfc: fix NULL dereferences in ef100_process_design_param() |
CVE-2025-37860
|
| VCID-jgaw-mgbm-sfaf | kernel: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop |
CVE-2025-40180
|
| VCID-jq5d-nnun-afh5 | kernel: xtensa: simdisk: add input size check in proc_write_simdisk |
CVE-2025-40193
|
| VCID-jxqg-n8d6-pkd9 | kernel: pps: fix warning in pps_register_cdev when register device fail |
CVE-2025-40070
|
| VCID-k756-peeq-efeg | kernel: most: usb: hdm_probe: Fix calling put_device() before device initialization |
CVE-2025-68249
|
| VCID-k7h8-fsse-9kes | kernel: smb: client: Fix refcount leak for cifs_sb_tlink |
CVE-2025-40103
|
| VCID-k7jq-me1r-bfc4 | kernel: Revert "ipmi: fix msg stack when IPMI is disconnected" |
CVE-2025-40192
|
| VCID-k8g1-evfe-33e3 | kernel: Linux kernel (media: b2c2): Use-after-free vulnerability in flexcop_pci_remove leading to denial of service. |
CVE-2025-39996
|
| VCID-kj4q-41ch-2bdx | kernel: Linux kernel: uvcvideo Denial of Service from invalid UVC entity IDs |
CVE-2025-40016
|
| VCID-kk3s-r8es-8qau | kernel: mm/ksm: fix flag-dropping behavior in ksm_madvise |
CVE-2025-40040
|
| VCID-krud-9n4r-vkbg | kernel: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI |
CVE-2025-39965
|
| VCID-kspw-qhuh-43g2 | kernel: RDMA/rxe: Fix race in do_task() when draining |
CVE-2025-40061
|
| VCID-m1sy-3r83-cydm | kernel: vhost: vringh: Modify the return value check |
CVE-2025-40051
|
| VCID-m61j-cd51-9ff7 | kernel: can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow |
CVE-2025-39985
|
| VCID-m7k6-aju8-gyag | kernel: arm64: mte: Do not warn if the page is already tagged in copy_highpage() |
CVE-2025-40353
|
| VCID-m7k6-bz5t-e7h9 | kernel: net: nfc: nci: Add parameter validation for packet data |
CVE-2025-40043
|
| VCID-mh7n-zj6f-vkau | kernel: page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches |
CVE-2025-40199
|
| VCID-mm1u-nfnt-nkaf | kernel: net: enetc: fix the deadlock of enetc_mdio_lock |
CVE-2025-40347
|
| VCID-mr9v-2y8c-v7es | kernel: media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() |
CVE-2025-40207
|
| VCID-mx37-uxnb-7ygu | kernel: listmount: don't call path_put() under namespace semaphore |
CVE-2025-40203
|
| VCID-mznd-xet1-wqbp | kernel: net/smc: fix general protection fault in __smc_diag_dump |
CVE-2025-40357
|
| VCID-n298-364p-sbhm | kernel: iommu/vt-d: Disallow dirty tracking if incoherent page walk |
CVE-2025-40058
|
| VCID-n4as-tgyn-tyg2 | kernel: misc: fastrpc: fix possible map leak in fastrpc_put_args |
CVE-2025-40036
|
| VCID-n53s-j16b-cyfa | kernel: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg |
CVE-2025-39964
|
| VCID-n7kt-3rsy-rkg2 | kernel: Linux kernel: Denial of Service in USB-audio MIDI driver due to improper timer shutdown |
CVE-2025-38105
|
| VCID-na8r-byxv-qbhj | kernel: blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx |
CVE-2025-40125
|
| VCID-nawy-2mf2-q7dj | kernel: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR |
CVE-2025-39950
|
| VCID-nban-c4qx-nqa2 | kernel: ipmi: Rework user message limit handling |
CVE-2025-40202
|
| VCID-ng2z-3hcf-9uh8 | kernel: net/mlx5e: Harden uplink netdev access against device unbind |
CVE-2025-39947
|
| VCID-nh4c-h6n9-ykhj | kernel: net/sched: sch_qfq: Fix null-deref in agg_dequeue |
CVE-2025-40083
|
| VCID-nt1v-nf7x-xkep | kernel: mm: prevent poison consumption when splitting THP |
CVE-2025-40230
|
| VCID-numq-afhy-yudw | kernel: mailbox: zynqmp-ipi: Fix SGI cleanup on unbind |
CVE-2025-40161
|
| VCID-p1hp-3ka5-jqad | kernel: Linux kernel: Denial of Service via improper access validation in bpf_sock_addr |
CVE-2025-40078
|
| VCID-p45t-pa6v-d3cx | kernel: iommu/vt-d: debugfs: Fix legacy mode page table dump logic |
CVE-2025-40155
|
| VCID-pa83-ecsd-qybn | kernel: pinctrl: check the return value of pinmux_ops::get_function_name() |
CVE-2025-40030
|
| VCID-pd4y-jpvd-13gk | kernel: um: virtio_uml: Fix use-after-free after put_device in probe |
CVE-2025-39951
|
| VCID-pk38-kgnt-vbh2 | kernel: crypto: essiv - Check ssize for decryption and in-place encryption |
CVE-2025-40019
|
| VCID-pkys-5922-skeg | kernel: Linux kernel: Denial of Service via mprotect() on huge transparent huge pages |
CVE-2025-40153
|
| VCID-ps1x-1a84-j7gb | kernel: coresight: trbe: Return NULL pointer for allocation failures |
CVE-2025-40060
|
| VCID-pu1m-8uep-93ah | kernel: net/smc: fix warning in smc_rx_splice() when calling get_page() |
CVE-2025-40012
|
| VCID-pzqw-hf31-mba1 | kernel: ext4: detect invalid INLINE_DATA + EXTENTS flag combination |
CVE-2025-40167
|
| VCID-q2am-tq5t-gybe | kernel: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} |
CVE-2025-40183
|
| VCID-q8dv-2j4e-5khk | kernel: Linux kernel: Denial of Service in crypto random number generator due to missing set_ent |
CVE-2025-40109
|
| VCID-qa9j-r5qg-auad | kernel: ASoC: codecs: wcd937x: set the comp soundwire port correctly |
CVE-2025-40045
|
| VCID-qhvm-ct47-jfe4 | kernel: hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() |
CVE-2025-40351
|
| VCID-qqtc-acv3-wbfj | kernel: io_uring: fix incorrect io_kiocb reference in io_link_skb |
CVE-2025-39963
|
| VCID-qsy1-z86z-3qbj | kernel: fuse: fix livelock in synchronous file put from fuseblk workers |
CVE-2025-40220
|
| VCID-rkwn-d95a-zycg | kernel: ipvs: Defer ip_vs_ftp unregister during netns cleanup |
CVE-2025-40018
|
| VCID-rv81-mqxn-sqf6 | kernel: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() |
CVE-2025-40081
|
| VCID-s2ym-tkmq-bbad | kernel: cifs: parse_dfs_referrals: prevent oob on malformed input |
CVE-2025-40099
|
| VCID-su7s-az9j-3qhm | kernel: ice: ice_adapter: release xa entry on adapter allocation failure |
CVE-2025-40185
|
| VCID-t1mn-zkwv-v3hv | kernel: drm/xe/guc: Check GuC running state before deregistering exec queue |
CVE-2025-40166
|
| VCID-t2rr-q2pp-mygz | kernel: media: nxp: imx8-isi: m2m: Fix streaming cleanup on release |
CVE-2025-40165
|
| VCID-tbbd-s353-s3dn | kernel: usb: gadget: f_ncm: Refactor bind path to use __free() |
CVE-2025-40092
|
| VCID-tgnq-h6ks-j3az | kernel: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ |
CVE-2025-40350
|
| VCID-tjxy-knam-e3gm | kernel: wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() |
CVE-2025-39991
|
| VCID-u1xw-b683-67h2 | kernel: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success |
CVE-2025-40218
|
| VCID-u518-cx5c-gkbp | kernel: tls: wait for pending async decryptions if tls_strp_msg_hold fails |
CVE-2025-40176
|
| VCID-ub25-9y3n-hfc6 | kernel: Kernel: Denial of Service in 9p filesystem client via race condition |
CVE-2025-40027
|
| VCID-umrj-n2sx-gye3 | kernel: ksmbd: transport_ipc: validate payload size before reading handle |
CVE-2025-40084
|
| VCID-uwaa-gbex-n3fn | kernel: Squashfs: reject negative file sizes in squashfs_read_inode() |
CVE-2025-40200
|
| VCID-uwed-utmc-e3gm | kernel: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock |
CVE-2025-40120
|
| VCID-v26x-rbss-fkgx | kernel: ext4: verify orphan file size is not too big |
CVE-2025-40179
|
| VCID-vj31-9ycy-k7bd | kernel: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping |
CVE-2025-40121
|
| VCID-vu46-d7jp-5kce | kernel: PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release |
CVE-2025-40032
|
| VCID-w36s-wgja-e3ds | kernel: ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT |
CVE-2025-40142
|
| VCID-w3ew-gk84-akf7 | kernel: comedi: fix divide-by-zero in comedi_buf_munge() |
CVE-2025-40106
|
| VCID-w62p-ud1a-afbj | kernel: ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails |
CVE-2025-40162
|
| VCID-wd4m-swhu-wyay | kernel: hwrng: ks-sa - fix division by zero in ks_sa_rng_init |
CVE-2025-40127
|
| VCID-wemg-168r-d3hb | kernel: pid: Add a judgment for ns null in pid_nr_ns |
CVE-2025-40178
|
| VCID-wjg9-f891-kudh | kernel: bus: fsl-mc: Check return value of platform_get_resource() |
CVE-2025-40029
|
| VCID-wms1-e19s-buga | kernel: KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O |
CVE-2025-40026
|
| VCID-wtzd-nwuu-nqhr | kernel: fs/proc/task_mmu: check p->vec_buf for NULL |
CVE-2025-40009
|
| VCID-x684-42wv-hbft | kernel: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid |
CVE-2025-40038
|
| VCID-x9gz-mk6u-4fdv | kernel: bpf: Enforce expected_attach_type for tailcall compatibility |
CVE-2025-40123
|
| VCID-xaas-zwzn-1qcc | kernel: ASoC: qcom: audioreach: fix potential null pointer dereference |
CVE-2025-40013
|
| VCID-xh5z-9tvc-kueq | kernel: nbd: restrict sockets to TCP and UDP |
CVE-2025-40080
|
| VCID-xsra-d7fn-8qbx | kernel: fs: ntfs3: Fix integer overflow in run_unpack() |
CVE-2025-40068
|
| VCID-xt1x-hf7k-bkad | kernel: tracing: dynevent: Add a missing lockdown check on dynevent |
CVE-2025-40021
|
| VCID-xxjc-pp3q-8bga | kernel: nexthop: Forbid FDB status change while nexthop is in a group |
CVE-2025-39980
|
| VCID-xyrg-8pzv-xbct | kernel: riscv, bpf: Sign extend struct ops return values properly |
CVE-2025-40079
|
| VCID-y3m7-jcu1-tqfg | kernel: ksmbd: Fix race condition in RPC handle list access |
CVE-2025-40039
|
| VCID-y7h5-xy2k-47fx | kernel: wifi: mac80211: increase scan_ies_len for S1G |
CVE-2025-39957
|
| VCID-yjek-4ryv-4bas | kernel: accel/qaic: Fix bootlog initialization ordering |
CVE-2025-40177
|
| VCID-yncv-kwk9-s3ak | kernel: can: hi311x: populate ndo_change_mtu() to prevent buffer overflow |
CVE-2025-39987
|
| VCID-yupd-71da-dfaa | kernel: vmxnet3: unregister xdp rxq info in the reset path |
CVE-2025-22106
|
| VCID-yvaa-5kpc-f3at | kernel: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync |
CVE-2025-39982
|
| VCID-yyaw-vut2-mqac | kernel: scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod |
CVE-2025-40118
|
| VCID-z4f8-ybzd-r7dj | kernel: btrfs: avoid potential out-of-bounds in btrfs_encode_fh() |
CVE-2025-40205
|
| VCID-z4xx-msk4-k7bz | kernel: xen/events: Return -EEXIST for bound VIRQs |
CVE-2025-40160
|
| VCID-z711-tvkz-9qa4 | kernel: bonding: check xdp prog when set bond mode |
CVE-2025-22105
|
| VCID-z9nx-vf3q-wff6 | kernel: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev() |
CVE-2024-57995
|
| VCID-zpt5-7cj5-aqc3 | kernel: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue |
CVE-2025-40001
|
| VCID-zre5-cva1-73g3 | kernel: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() |
CVE-2025-40172
|
| VCID-zsrn-dr2j-fyfr | kernel: Kernel: Denial of Service in nvmet-fc due to resource leak |
CVE-2025-40171
|
| VCID-zy69-efpr-cfcj | kernel: net/ip6_tunnel: Prevent perpetual tunnel growth |
CVE-2025-40173
|