Search for packages
| purl | pkg:deb/debian/linux@6.16.5-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-17jc-frw3-v3ep | kernel: media: venus: protect against spurious interrupts during probe |
CVE-2025-39709
|
| VCID-18wu-uw8m-myc2 | kernel: iio: light: as73211: Ensure buffer holes are zeroed |
CVE-2025-39687
|
| VCID-1b2m-gdn8-nycf | kernel: scsi: ufs: core: Remove WARN_ON_ONCE() call from ufshcd_uic_cmd_compl() |
CVE-2025-39803
|
| VCID-23sk-csa1-kkdy | kernel: HID: intel-thc-hid: intel-quicki2c: Fix ACPI dsd ICRS/ISUB length |
CVE-2025-39809
|
| VCID-2b9k-rn6z-7fhz | kernel: drm/amd/display: Avoid a NULL pointer dereference |
CVE-2025-39693
|
| VCID-2f4p-ccne-fyb5 | kernel: LoongArch: KVM: Fix stack protector issue in send_ipi_data() |
CVE-2025-39704
|
| VCID-2tkt-trv2-d7gf | kernel: Linux kernel: Denial of Service in ftrace due to race condition in trace_printk_seq |
CVE-2025-39813
|
| VCID-3453-ez2g-97ax | kernel: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path |
CVE-2025-39830
|
| VCID-36e2-uj9a-6baj | kernel: tracing: Limit access to parser->buffer when trace_get_user failed |
CVE-2025-39683
|
| VCID-3cyp-syx5-mbb1 | kernel: lib/crypto: arm/poly1305: Fix register corruption in no-SIMD contexts |
CVE-2025-39802
|
| VCID-3m3c-4r85-qbaj | kernel: drm/hisilicon/hibmc: fix the hibmc loaded failed bug |
CVE-2025-39772
|
| VCID-41h4-rgtz-5bfx | kernel: media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls |
CVE-2025-39711
|
| VCID-42vv-ca62-nbay | kernel: ipv6: sr: Fix MAC comparison to be constant-time |
CVE-2025-39702
|
| VCID-4d5z-v3d2-2bb7 | kernel: netfilter: nf_reject: don't leak dst refcount for loopback packets |
CVE-2025-38732
|
| VCID-4ja6-dv1f-mydc | kernel: PCI: endpoint: Fix configfs group list head handling |
CVE-2025-39783
|
| VCID-4nak-rmgk-jybq | kernel: sctp: initialize more fields in sctp_v6_from_sk() |
CVE-2025-39812
|
| VCID-4p7y-3e4e-6yhd | kernel: media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() |
CVE-2025-39713
|
| VCID-5711-6yhr-4fes | kernel: sched/ext: Fix invalid task state transitions on class switch |
CVE-2025-39780
|
| VCID-5czk-8u6k-57bf | kernel: perf: Avoid undefined behavior from stopping/starting inactive events |
CVE-2025-39821
|
| VCID-5zte-6djd-xyae | kernel: i2c: rtl9300: Fix out-of-bounds bug in rtl9300_i2c_smbus_xfer |
CVE-2025-39680
|
| VCID-62jz-qpdg-kyhe | kernel: NFS: Fix a race when updating an existing write |
CVE-2025-39697
|
| VCID-6ejs-59g2-xkgg | kernel: drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities |
CVE-2025-39707
|
| VCID-6gxs-qg6w-y3dg | kernel: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL |
CVE-2025-39678
|
| VCID-7hmd-zbsv-qqcx | kernel: bus: mhi: host: Detect events pointing to unexpected TREs |
CVE-2025-39790
|
| VCID-7r9a-99rx-nffa | kernel: parisc: Drop WARN_ON_ONCE() from flush_cache_vmap |
CVE-2025-39781
|
| VCID-7wfs-maep-aybj | kernel: comedi: pcl726: Prevent invalid irq number |
CVE-2025-39685
|
| VCID-89ck-c5cy-ebhy | kernel: iommu/riscv: prevent NULL deref in iova_to_phys |
CVE-2025-39699
|
| VCID-8b4z-nus3-c7h8 | kernel: ksmbd: fix refcount leak causing resource not released |
CVE-2025-39720
|
| VCID-8d8s-4erb-r7e2 | kernel: net/mlx5: Fix lockdep assertion on sync reset unload event |
CVE-2025-39832
|
| VCID-8hgk-zrmy-tbba | kernel: io_uring/kbuf: fix signedness in this_len calculation |
CVE-2025-39822
|
| VCID-8ke9-myay-nyer | kernel: scsi: qla4xxx: Prevent a potential error pointer dereference |
CVE-2025-39676
|
| VCID-8mf6-1wkt-a7g2 | kernel: efi: stmm: Fix incorrect buffer allocation method |
CVE-2025-39836
|
| VCID-8qye-qpm8-qbaw | kernel: ALSA: hda: tas2781: Fix wrong reference of tasdevice_priv |
CVE-2025-39696
|
| VCID-8w8h-4vzc-hfg5 | kernel: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() |
CVE-2025-39806
|
| VCID-8w8t-pnnc-1yc9 | kernel: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper |
CVE-2025-39681
|
| VCID-92nu-bkjp-67as | kernel: parisc: Revise gateway LWS calls to probe user read access |
CVE-2025-39715
|
| VCID-9b8w-6271-wuf1 | kernel: ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset |
CVE-2025-39814
|
| VCID-9jgy-8b6j-ayfz | kernel: net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow |
CVE-2025-39834
|
| VCID-9k11-ez7x-efcn | kernel: net: bridge: fix soft lockup in br_multicast_query_expired() |
CVE-2025-39773
|
| VCID-9pf3-n7d8-bbck | kernel: iio: adc: ad7173: fix channels index for syscalib_mode |
CVE-2025-39786
|
| VCID-9qcu-u3nr-mkb3 | kernel: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare |
CVE-2025-39817
|
| VCID-9x7c-98v1-hkdj | kernel: serial: 8250: fix panic due to PSLVERR |
CVE-2025-39724
|
| VCID-9xs9-tyrz-6ug7 | kernel: ppp: fix race conditions in ppp_fill_forward_path |
CVE-2025-39673
|
| VCID-a27g-trkr-fyaw | kernel: net/mlx5: HWS, fix complex rules rehash error flow |
CVE-2025-39768
|
| VCID-a644-ptgb-5bdp | kernel: regulator: pca9450: Use devm_register_sys_off_handler |
CVE-2025-39771
|
| VCID-afkx-cy3n-zkef | kernel: media: venus: Add a check for packet size after reading from shared memory |
CVE-2025-39710
|
| VCID-afv2-zdxy-vqb9 | kernel: drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset |
CVE-2025-39820
|
| VCID-b9tb-cyzp-c3am | kernel: jbd2: prevent softlockup in jbd2_log_do_checkpoint() |
CVE-2025-39782
|
| VCID-c8h6-u5x4-y3ac | kernel: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE |
CVE-2025-39788
|
| VCID-cav5-5jpm-1fdt | kernel: comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() |
CVE-2025-39684
|
| VCID-ck6a-dd1t-nba8 | kernel: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit |
CVE-2025-39766
|
| VCID-cug9-9cgh-f7ch | kernel: Linux kernel: Denial of service in drm/xe/vm due to improper error handling |
CVE-2025-39811
|
| VCID-d1gu-5q4s-p7eq | kernel: net/smc: fix UAF on smcsk after smc_listen_out() |
CVE-2025-38734
|
| VCID-d6qh-964p-cff9 | kernel: net, hsr: reject HSR frame if skb can't hold tag |
CVE-2025-39703
|
| VCID-d8ad-6vw9-b7f2 | kernel: drm/amd/display: fix a Null pointer dereference vulnerability |
CVE-2025-39705
|
| VCID-d99p-k5d1-y7db | kernel: iio: accel: sca3300: fix uninitialized iio scan data |
CVE-2025-39690
|
| VCID-dqp6-k3du-n3ep | kernel: btrfs: subpage: keep TOWRITE tag until folio is cleaned |
CVE-2025-39779
|
| VCID-dttg-whxw-4kbq | kernel: iio: adc: rzg2l_adc: Set driver data before enabling runtime PM |
CVE-2025-39774
|
| VCID-e1pe-znzp-jqhx | kernel: LoongArch: Optimize module load time by optimizing PLT/GOT counting |
CVE-2025-39767
|
| VCID-e2vy-prvw-xkhq | kernel: bnxt_en: Fix memory corruption when FW resources change during ifdown |
CVE-2025-39810
|
| VCID-e6na-e54f-gygm | kernel: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths |
CVE-2025-39816
|
| VCID-eknn-jcdu-8qg8 | kernel: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM |
CVE-2025-39770
|
| VCID-ep5w-esa3-fbah | kernel: drm/amdkfd: Destroy KFD debugfs after destroy KFD wq |
CVE-2025-39706
|
| VCID-es8r-wvmz-gfe6 | kernel: net/sched: Fix backlog accounting in qdisc_dequeue_internal |
CVE-2025-39677
|
| VCID-f3ag-5qza-z7bd | kernel: iio: imu: bno055: fix OOB access of hw_xlate array |
CVE-2025-39719
|
| VCID-gb56-bq2d-x7hu | kernel: crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP |
CVE-2025-39722
|
| VCID-gc82-5eyg-9qbb | kernel: drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() |
CVE-2025-39675
|
| VCID-gcqh-9wjd-7kcj | kernel: net: rose: convert 'use' field to refcount_t |
CVE-2025-39826
|
| VCID-gd93-9wtt-5bbx | kernel: crypto: qat - flush misc workqueue during device shutdown |
CVE-2025-39721
|
| VCID-gpvd-tv9q-5fdb | kernel: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() |
CVE-2025-39692
|
| VCID-gzs8-ph2v-mqhw | kernel: netfs: Fix unbuffered write error handling |
CVE-2025-39723
|
| VCID-h78s-vz7q-7yb7 | kernel: net: macb: fix unregister_netdev call order in macb_remove() |
CVE-2025-39805
|
| VCID-h8vw-cjj2-wfaf | kernel: KVM: x86: use array_index_nospec with indices that come from guest |
CVE-2025-39823
|
| VCID-hfna-djaa-ukcm | kernel: bnxt_en: Fix lockdep warning during rmmod |
CVE-2025-39769
|
| VCID-hrpy-vsnk-wkdt | kernel: mm/damon/ops-common: ignore migration request to invalid nodes |
CVE-2025-39700
|
| VCID-j5qv-wuw6-2yah | kernel: Linux kernel (btrfs): Denial of Service due to unexpected metadata generation |
CVE-2025-39800
|
| VCID-jnha-bjtc-5ugp | kernel: smb: client: fix race with concurrent opens in rename(2) |
CVE-2025-39825
|
| VCID-js1p-tqhf-nybc | kernel: vsock/virtio: Validate length in packet header before skb_put() |
CVE-2025-39718
|
| VCID-jv56-nqp5-3bas | kernel: iommu/amd: Avoid stack buffer overflow from kernel cmdline |
CVE-2025-38676
|
| VCID-jwc2-8dkk-rbgw | kernel: RDMA/rxe: Flush delayed SKBs while releasing RXE resources |
CVE-2025-39695
|
| VCID-kbc5-2ek1-gfbd | kernel: trace/fgraph: Fix the warning caused by missing unregister notifier |
CVE-2025-39829
|
| VCID-kdec-c9h3-7fb8 | kernel: xfs: do not propagate ENODATA disk errors into xattr code |
CVE-2025-39835
|
| VCID-kh3x-6f3s-nyaw | kernel: net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization |
CVE-2025-38736
|
| VCID-ktgp-v767-6fcq | kernel: scsi: ufs: ufs-qcom: Fix ESI null pointer dereference |
CVE-2025-39674
|
| VCID-m2h3-5qgn-2ugr | kernel: HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save |
CVE-2025-39818
|
| VCID-m3sc-mw1u-mqgy | kernel: fbnic: Move phylink resume out of service_task and into open/close |
CVE-2025-39831
|
| VCID-m6ct-2mpz-e3e8 | kernel: gve: prevent ethtool ops after shutdown |
CVE-2025-38735
|
| VCID-m9gn-tm7d-5yez | kernel: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control() |
CVE-2025-39828
|
| VCID-mgjc-55mm-kffq | kernel: mISDN: hfcpci: Fix warning when deleting uninitialized timer |
CVE-2025-39833
|
| VCID-n7th-mkkg-bkeq | kernel: s390/sclp: Fix SCCB present check |
CVE-2025-39694
|
| VCID-p1cz-e94f-57c2 | kernel: crypto: x86/aegis - Add missing error checks |
CVE-2025-39789
|
| VCID-pn97-27f6-8ucm | kernel: ALSA: timer: fix ida_free call while not allocated |
CVE-2025-39765
|
| VCID-q32q-tj94-tye1 | kernel: fs/buffer: fix use-after-free when call bh_read() helper |
CVE-2025-39691
|
| VCID-qh42-ckfm-cydk | kernel: mm/debug_vm_pgtable: clear page table entries at destroy_args() |
CVE-2025-39776
|
| VCID-qjy6-vz8h-q7g8 | kernel: crypto: acomp - Fix CFI failure due to type punning |
CVE-2025-39777
|
| VCID-qseb-vkvy-jqhh | kernel: ACPI: pfr_update: Fix the driver update version check |
CVE-2025-39701
|
| VCID-r7f5-cwqv-97df | kernel: media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval |
CVE-2025-39712
|
| VCID-resh-q24k-sydu | kernel: cifs: Fix oops due to uninitialised variable |
CVE-2025-38737
|
| VCID-rsnc-vkwu-yua6 | kernel: io_uring/futex: ensure io_futex_wait() cleans up properly on failure |
CVE-2025-39698
|
| VCID-rsxp-payr-kuer | kernel: parisc: Revise __get_user() to probe user read access |
CVE-2025-39716
|
| VCID-rv8c-bamf-9yaj | kernel: media: iris: Fix NULL pointer dereference |
CVE-2025-39708
|
| VCID-sz8x-vw9h-27hq | kernel: comedi: Make insn_rw_emulate_bits() do insn->n samples |
CVE-2025-39686
|
| VCID-ugzf-fz63-y3g9 | kernel: f2fs: fix to avoid out-of-boundary access in dnode page |
CVE-2025-38677
|
| VCID-uywc-57rt-7ue6 | kernel: Linux kernel: mremap local denial of service |
CVE-2025-39775
|
| VCID-vfqz-99a3-vffs | kernel: Linux kernel: PCI link speed calculation DoS |
CVE-2025-39784
|
| VCID-wc9d-a43m-7kda | kernel: usb: dwc3: Remove WARN_ON for device endpoint command timeouts |
CVE-2025-39801
|
| VCID-wjzs-fmtj-vyf4 | kernel: lib/crypto: arm64/poly1305: Fix register corruption in no-SIMD contexts |
CVE-2025-39804
|
| VCID-wk3v-p673-8yff | kernel: drm/xe: Fix vm_bind_ioctl double free bug |
CVE-2025-38731
|
| VCID-wng4-rwvs-cfa4 | kernel: net: rose: include node references in rose_neigh refcount |
CVE-2025-39827
|
| VCID-wnvm-y64g-p7a2 | kernel: open_tree_attr: do not allow id-mapping changes without OPEN_TREE_CLONE |
CVE-2025-39717
|
| VCID-wsnu-mj7t-fqck | kernel: media: usbtv: Lock resolution while streaming |
CVE-2025-39714
|
| VCID-wtm8-vuaw-ufgj | kernel: ftrace: Also allocate and copy hash for reading of filter files |
CVE-2025-39689
|
| VCID-y5sk-3s9h-fkdn | kernel: Linux kernel: Denial of Service due to incorrect lowcore memory mapping |
CVE-2025-38733
|
| VCID-yemn-txer-cber | kernel: drm/hisilicon/hibmc: fix irq_request()'s irq name variable is local |
CVE-2025-39785
|
| VCID-yfrd-t69a-zkgv | kernel: RISC-V: KVM: fix stack overrun when loading vlenb |
CVE-2025-39815
|
| VCID-yms6-jeef-93b1 | kernel: drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() |
CVE-2025-39679
|
| VCID-yu5u-ns56-f3a8 | kernel: Linux kernel: Denial of Service via resource leak in SMB2 compound operations |
CVE-2025-39819
|
| VCID-ywxu-kcrz-6kfx | kernel: drm/mediatek: Add error handling for old state CRTC in atomic_disable |
CVE-2025-39807
|
| VCID-yyer-w5cp-ufe2 | kernel: dm: dm-crypt: Do not partially accept write BIOs with zoned targets |
CVE-2025-39791
|
| VCID-z1jv-1vmy-aqeq | kernel: Linux kernel (ASUS HID): Use-after-free vulnerability allows arbitrary code execution or denial of service |
CVE-2025-39824
|
| VCID-z916-xdst-pka3 | kernel: HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() |
CVE-2025-39808
|
| VCID-zdvd-xbw1-xked | kernel: tls: fix handling of zero-length records on the rx_list |
CVE-2025-39682
|
| VCID-zme1-paup-4bc9 | kernel: Linux kernel: Denial of Service in MDT loader due to improper ELF header validation |
CVE-2025-39787
|