Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 10 of 132
CVE-2025-39735HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-39735 [HIGH] CVE-2025-39735: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: fix sl... In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds read in ea_get() During the "size_check" label in ea_get(), the code checks if the extended attribute list (xattr) size matches ea_size. If not, it logs "ea_get: invalid extended attribute" and calls print_hex_dump(). Here, EALIST_SIZE(ea_buf->xattr) returns 4110417968, whi
debian
CVE-2025-37854HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37854 [HIGH] CVE-2025-37854: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd:... In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix mode1 reset crash issue If HW scheduler hangs and mode1 reset is used to recover GPU, KFD signal user space to abort the processes. After process abort exit, user queues still use the GPU to access system memory before h/w is reset while KFD cleanup worker free system memory and free V
debian
CVE-2025-21914HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21914 [HIGH] CVE-2025-21914: linux - In the Linux kernel, the following vulnerability has been resolved: slimbus: me... In the Linux kernel, the following vulnerability has been resolved: slimbus: messaging: Free transaction ID in delayed interrupt scenario In case of interrupt delay for any reason, slim_do_transfer() returns timeout error but the transaction ID (TID) is not freed. This results into invalid memory access inside qcom_slim_ngd_rx_msgq_cb() due to invalid TID. Fix the iss
debian
CVE-2025-38714HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38714 [HIGH] CVE-2025-38714: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi... In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() The hfsplus_bnode_read() method can trigger the issue: [ 174.852007][ T9784] ================================================================== [ 174.852709][ T9784] BUG: KASAN: slab-out-of-bounds in hfsplus_bnode_read+0x2f4/0x360 [ 174.853412][
debian
CVE-2025-38500HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38500 [HIGH] CVE-2025-38500: linux - In the Linux kernel, the following vulnerability has been resolved: xfrm: inter... In the Linux kernel, the following vulnerability has been resolved: xfrm: interface: fix use-after-free after changing collect_md xfrm interface collect_md property on xfrm interfaces can only be set on device creation, thus xfrmi_changelink() should fail when called on such interfaces. The check to enforce this was done only in the case where the xi was returned from
debian
CVE-2025-21947HIGHCVSS 8.1fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21947 [HIGH] CVE-2025-21947: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ... In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix type confusion via race condition when using ipc_msg_send_request req->handle is allocated using ksmbd_acquire_id(&ipc_ida), based on ida_alloc. req->handle from ksmbd_ipc_login_request and FSCTL_PIPE_TRANSCEIVE ioctl can be same and it could lead to type confusion between messages, resulti
debian
CVE-2025-71112HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71112 [HIGH] CVE-2025-71112: linux - In the Linux kernel, the following vulnerability has been resolved: net: hns3: ... In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validation before using Currently, the VLAN id may be used without validation when receive a VLAN configuration mailbox from VF. The length of vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause out-of-bounds memory access once the VLAN id is bigger than or equal to VL
debian
CVE-2025-38068HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38068 [HIGH] CVE-2025-38068: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: lzo... In the Linux kernel, the following vulnerability has been resolved: crypto: lzo - Fix compression buffer overrun Unlike the decompression code, the compression code in LZO never checked for output overruns. It instead assumes that the caller always provides enough buffer space, disregarding the buffer length provided by the caller. Add a safe compression interface tha
debian
CVE-2025-37738HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37738 [HIGH] CVE-2025-37738: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: ignor... In the Linux kernel, the following vulnerability has been resolved: ext4: ignore xattrs past end Once inside 'ext4_xattr_inode_dec_ref_all' we should ignore xattrs entries past the 'end' entry. This fixes the following KASAN reported issue: ================================================================== BUG: KASAN: slab-use-after-free in ext4_xattr_inode_dec_ref_al
debian
CVE-2025-38552HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38552 [HIGH] CVE-2025-38552: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: plug... In the Linux kernel, the following vulnerability has been resolved: mptcp: plug races between subflow fail and subflow creation We have races similar to the one addressed by the previous patch between subflow failing and additional subflow creation. They are just harder to trigger. The solution is similar. Use a separate flag to track the condition 'socket state preve
debian
CVE-2025-38718HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-38718 [HIGH] CVE-2025-38718: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: linea... In the Linux kernel, the following vulnerability has been resolved: sctp: linearize cloned gso packets in sctp_rcv A cloned head skb still shares these frag skbs in fraglist with the original head skb. It's not safe to access these frag skbs. syzbot reported two use-of-uninitialized-memory bugs caused by this: BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net
debian
CVE-2025-39702HIGHCVSS 7.0fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39702 [HIGH] CVE-2025-39702: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: F... In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this. Scope: local bookworm: resolved (fixed in 6.1.153-1) bullseye: resolved (fixed in 5.10.249-1) forky: resolved (fixed in 6.16.5-1) sid: re
debian
CVE-2025-21671HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21671 [HIGH] CVE-2025-21671: linux - In the Linux kernel, the following vulnerability has been resolved: zram: fix p... In the Linux kernel, the following vulnerability has been resolved: zram: fix potential UAF of zram table If zram_meta_alloc failed early, it frees allocated zram->table without setting it NULL. Which will potentially cause zram_meta_free to access the table if user reset an failed and uninitialized device. Scope: local bookworm: resolved (fixed in 6.1.128-1) bullseye
debian
CVE-2025-37780HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37780 [HIGH] CVE-2025-37780: linux - In the Linux kernel, the following vulnerability has been resolved: isofs: Prev... In the Linux kernel, the following vulnerability has been resolved: isofs: Prevent the use of too small fid syzbot reported a slab-out-of-bounds Read in isofs_fh_to_parent. [1] The handle_bytes value passed in by the reproducing program is equal to 12. In handle_to_path(), only 12 bytes of memory are allocated for the structure file_handle->f_handle member, which caus
debian
CVE-2025-22038HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-22038 [HIGH] CVE-2025-22038: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: vali... In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate zero num_subauth before sub_auth is accessed Access psid->sub_auth[psid->num_subauth - 1] without checking if num_subauth is non-zero leads to an out-of-bounds read. This patch adds a validation step to ensure num_subauth != 0 before sub_auth is accessed. Scope: local bookworm: resolve
debian
CVE-2025-21794HIGHCVSS 7.1fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21794 [HIGH] CVE-2025-21794: linux - In the Linux kernel, the following vulnerability has been resolved: HID: hid-th... In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() Syzbot[1] has detected a stack-out-of-bounds read of the ep_addr array from hid-thrustmaster driver. This array is passed to usb_check_int_endpoints function from usb.c core driver, which executes a for loop that iterates
debian
CVE-2025-21905HIGHCVSS 7.1fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21905 [HIGH] CVE-2025-21905: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwi... In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the
debian
CVE-2025-38280HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38280 [HIGH] CVE-2025-38280: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid ... In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid __bpf_prog_ret0_warn when jit fails syzkaller reported an issue: WARNING: CPU: 3 PID: 217 at kernel/bpf/core.c:2357 __bpf_prog_ret0_warn+0xa/0x20 kernel/bpf/core.c:2357 Modules linked in: CPU: 3 UID: 0 PID: 217 Comm: kworker/u32:6 Not tainted 6.15.0-rc4-syzkaller-00040-g8bac8898fe39 RIP: 00
debian
CVE-2025-38027HIGHCVSS 7.1fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-38027 [HIGH] CVE-2025-38027: linux - In the Linux kernel, the following vulnerability has been resolved: regulator: ... In the Linux kernel, the following vulnerability has been resolved: regulator: max20086: fix invalid memory access max20086_parse_regulators_dt() calls of_regulator_match() using an array of struct of_regulator_match allocated on the stack for the matches argument. of_regulator_match() calls devm_of_regulator_put_matches(), which calls devres_alloc() to allocate a str
debian
CVE-2025-38670HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38670 [HIGH] CVE-2025-38670: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/entry... In the Linux kernel, the following vulnerability has been resolved: arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() `cpu_switch_to()` and `call_on_irq_stack()` manipulate SP to change to different stacks along with the Shadow Call Stack if it is enabled. Those two stack changes cannot be done atomically and both functions can be interrupted by SErrors o
debian
Debian Linux-6.1 vulnerabilities | cvebase