Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 1 of 132
CVE-2026-23112CRITICALCVSS 9.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23112 [CRITICAL] CVE-2026-23112: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: ...
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining entries, and sg->length/offset bef
debian
CVE-2026-23025HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23025 [HIGH] CVE-2026-23025: linux - In the Linux kernel, the following vulnerability has been resolved: mm/page_all...
In the Linux kernel, the following vulnerability has been resolved: mm/page_alloc: prevent pcp corruption with SMP=n The kernel test robot has reported: BUG: spinlock trylock failure on UP on CPU#0, kcompactd0/28 lock: 0xffff888807e35ef0, .magic: dead4ead, .owner: kcompactd0/28, .owner_cpu: 0 CPU: 0 UID: 0 PID: 28 Comm: kcompactd0 Not tainted 6.18.0-rc5-00127-ga061578
debian
CVE-2026-23074HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23074 [HIGH] CVE-2026-23074: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: Enforce that teql can only be used as root qdisc Design intent of teql is that it is only supposed to be used as root qdisc. We need to check for that constraint. Although not important, I will describe the scenario that unearthed this issue for the curious. GangMin Kim managed to concot a
debian
CVE-2026-23216HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23216 [HIGH] CVE-2026-23216: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: targe...
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() In iscsit_dec_conn_usage_count(), the function calls complete() while holding the conn->conn_usage_lock. As soon as complete() is invoked, the waiter (such as iscsit_close_connection()) may wake up and proceed to free the iscsit_
debian
CVE-2026-23180HIGHCVSS 7.0fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23180 [HIGH] CVE-2026-23180: linux - In the Linux kernel, the following vulnerability has been resolved: dpaa2-switc...
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: add bounds check for if_id in IRQ handler The IRQ handler extracts if_id from the upper 16 bits of the hardware status register and uses it to index into ethsw->ports[] without validation. Since if_id can be any 16-bit value (0-65535) but the ports array is only allocated with sw_attr.nu
debian
CVE-2026-23230HIGHCVSS 8.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23230 [HIGH] CVE-2026-23230: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...
In the Linux kernel, the following vulnerability has been resolved: smb: client: split cached_fid bitfields to avoid shared-byte RMW races is_open, has_lease and on_list are stored in the same bitfield byte in struct cached_fid but are updated in different code paths that may run concurrently. Bitfield assignments generate byte read–modify–write operations (e.g. `orb
debian
CVE-2026-23209HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23209 [HIGH] CVE-2026-23209: linux - In the Linux kernel, the following vulnerability has been resolved: macvlan: fi...
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip link add invalid% link
debian
CVE-2026-23234HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23234 [HIGH] CVE-2026-23234: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t...
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). It is caused by below race condition: loop device umount - worker_thread - loop_process_work - do_req_filebacked - lo_rw_aio - lo_rw_aio_complete - blk_mq_end_request - blk_update_request -
debian
CVE-2026-23099HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23099 [HIGH] CVE-2026-23099: linux - In the Linux kernel, the following vulnerability has been resolved: bonding: li...
In the Linux kernel, the following vulnerability has been resolved: bonding: limit BOND_MODE_8023AD to Ethernet devices BOND_MODE_8023AD makes sense for ARPHRD_ETHER only. syzbot reported: BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline] BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c
debian
CVE-2026-23193HIGHCVSS 8.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23193 [HIGH] CVE-2026-23193: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: targe...
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock. Similar to the connection usage count logic, the waiter signaled by complete() (e.g., in the session release path)
debian
CVE-2026-22980HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-22980 [HIGH] CVE-2026-22980: linux - In the Linux kernel, the following vulnerability has been resolved: nfsd: provi...
In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_end_grace Writing to v4_end_grace can race with server shutdown and result in memory being accessed after it was freed - reclaim_str_hashtbl in particularly. We cannot hold nfsd_mutex across the nfsd4_end_grace() call as that is held while client_tracking_op->init() is cal
debian
CVE-2026-23098HIGHCVSS 8.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23098 [HIGH] CVE-2026-23098: linux - In the Linux kernel, the following vulnerability has been resolved: netrom: fix...
In the Linux kernel, the following vulnerability has been resolved: netrom: fix double-free in nr_route_frame() In nr_route_frame(), old_skb is immediately freed without checking if nr_neigh->ax25 pointer is NULL. Therefore, if nr_neigh->ax25 is NULL, the caller function will free old_skb again, causing a double-free bug. Therefore, to prevent this, we need to modify
debian
CVE-2026-23235HIGHCVSS 7.1fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23235 [HIGH] CVE-2026-23235: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix o...
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access in sysfs attribute read/write Some f2fs sysfs attributes suffer from out-of-bounds memory access and incorrect handling of integer values whose size is not 4 bytes. For example: vm:~# echo 65537 > /sys/fs/f2fs/vde/carve_out vm:~# cat /sys/fs/f2fs/vde/carve_out 65537 vm:~
debian
CVE-2026-23089HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23089 [HIGH] CVE-2026-23089: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a...
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees mixer->id_elems but the controls already added to the card still reference the freed memory. Later when snd_card_register() runs, the OSS mixer layer calls their callbacks and hits
debian
CVE-2026-23001HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23001 [HIGH] CVE-2026-23001: linux - In the Linux kernel, the following vulnerability has been resolved: macvlan: fi...
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix possible UAF in macvlan_forward_source() Add RCU protection on (struct macvlan_source_entry)->vlan. Whenever macvlan_hash_del_source() is called, we must clear entry->vlan pointer before RCU grace period starts. This allows macvlan_forward_source() to skip over entries queued for freeing.
debian
CVE-2026-23095HIGHCVSS 7.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23095 [HIGH] CVE-2026-23095: linux - In the Linux kernel, the following vulnerability has been resolved: gue: Fix sk...
In the Linux kernel, the following vulnerability has been resolved: gue: Fix skb memleak with inner IP protocol 0. syzbot reported skb memleak below. [0] The repro generated a GUE packet with its inner protocol 0. gue_udp_recv() returns -guehdr->proto_ctype for "resubmit" in ip_protocol_deliver_rcu(), but this only works with non-zero protocol number. Let's drop such
debian
CVE-2026-23222HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23222 [HIGH] CVE-2026-23222: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: oma...
In the Linux kernel, the following vulnerability has been resolved: crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly The existing allocation of scatterlists in omap_crypto_copy_sg_lists() was allocating an array of scatterlist pointers, not scatterlist objects, resulting in a 4x too small allocation. Use sizeof(*new_sg) to get the correct object s
debian
CVE-2026-23102HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23102 [HIGH] CVE-2026-23102: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/fpsim...
In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Fix restoration of SVE context When SME is supported, Restoring SVE signal context can go wrong in a few ways, including placing the task into an invalid state where the kernel may read from out-of-bounds memory (and may potentially take a fatal fault) and/or may kill the task wi
debian
CVE-2026-23083HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23083 [HIGH] CVE-2026-23083: linux - In the Linux kernel, the following vulnerability has been resolved: fou: Don't ...
In the Linux kernel, the following vulnerability has been resolved: fou: Don't allow 0 for FOU_ATTR_IPPROTO. fou_udp_recv() has the same problem mentioned in the previous patch. If FOU_ATTR_IPPROTO is set to 0, skb is not freed by fou_udp_recv() nor "resubmit"-ted in ip_protocol_deliver_rcu(). Let's forbid 0 for FOU_ATTR_IPPROTO.
Scope: local
bookworm: resolved (fixed
debian
CVE-2026-23068HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23068 [HIGH] CVE-2026-23068: linux - In the Linux kernel, the following vulnerability has been resolved: spi: spi-sp...
In the Linux kernel, the following vulnerability has been resolved: spi: spi-sprd-adi: Fix double free in probe error path The driver currently uses spi_alloc_host() to allocate the controller but registers it using devm_spi_register_controller(). If devm_register_restart_handler() fails, the code jumps to the put_ctlr label and calls spi_controller_put(). However, si
debian
1 / 132Next →