Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 11 of 132
CVE-2025-38201HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2025
CVE-2025-38201 [HIGH] CVE-2025-38201: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when resizing hashtable because __GFP_NOWARN is unset. Similar to: b541ba7d1f5a ("netfilter: conntrack: clamp maximum hashtable size to INT_MAX")
Scope: local
b
debian
CVE-2025-21756HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21756 [HIGH] CVE-2025-21756: linux - In the Linux kernel, the following vulnerability has been resolved: vsock: Keep...
In the Linux kernel, the following vulnerability has been resolved: vsock: Keep the binding until socket destruction Preserve sockets bindings; this includes both resulting from an explicit bind() and those implicitly bound through autobind during connect(). Prevents socket unbinding during a transport reassignment, which fixes a use-after-free: 1. vsock_create() (ref
debian
CVE-2025-71123HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71123 [HIGH] CVE-2025-71123: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix s...
In the Linux kernel, the following vulnerability has been resolved: ext4: fix string copying in parse_apply_sb_mount_options() strscpy_pad() can't be used to copy a non-NUL-term string into a NUL-term string of possibly bigger size. Commit 0efc5990bca5 ("string.h: Introduce memtostr() and memtostr_pad()") provides additional information in that regard. So if this happ
debian
CVE-2025-38396HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38396 [HIGH] CVE-2025-38396: linux - In the Linux kernel, the following vulnerability has been resolved: fs: export ...
In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create anonymous inodes with proper security context. This replaces the current pattern of calling alloc_anon_inode() followed by inode_init_security_anon() for crea
debian
CVE-2025-21945HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21945 [HIGH] CVE-2025-21945: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in smb2_lock If smb_lock->zero_len has value, ->llist of smb_lock is not delete and flock is old one. It will cause use-after-free on error handling routine.
Scope: local
bookworm: resolved (fixed in 6.1.133-1)
bullseye: resolved
forky: resolved (fixed in 6.12.19-1)
sid: reso
debian
CVE-2025-38226HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38226 [HIGH] CVE-2025-38226: linux - In the Linux kernel, the following vulnerability has been resolved: media: vivi...
In the Linux kernel, the following vulnerability has been resolved: media: vivid: Change the siize of the composing syzkaller found a bug: BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline] BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg
debian
CVE-2025-39883HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39883 [HIGH] CVE-2025-39883: linux - In the Linux kernel, the following vulnerability has been resolved: mm/memory-f...
In the Linux kernel, the following vulnerability has been resolved: mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory When I did memory failure tests, below panic occurs: page dumped because: VM_BUG_ON_PAGE(PagePoisoned(page)) kernel BUG at include/linux/page-flags.h:616! Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI CPU: 3 PID: 720 Co
debian
CVE-2025-37778HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37778 [HIGH] CVE-2025-37778: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix dangling pointer in krb_authenticate krb_authenticate frees sess->user and does not set the pointer to NULL. It calls ksmbd_krb5_authenticate to reinitialise sess->user but that function may return without doing so. If that happens then smb2_sess_setup, which calls krb_authenticate, will be
debian
CVE-2025-38129HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-38129 [HIGH] CVE-2025-38129: linux - In the Linux kernel, the following vulnerability has been resolved: page_pool: ...
In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.28
debian
CVE-2025-71082HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71082 [HIGH] CVE-2025-71082: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: revert use of devm_kzalloc in btusb This reverts commit 98921dbd00c4e ("Bluetooth: Use devm_kzalloc in btusb.c file"). In btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This ties the lifetime of all the btusb data to the binding of a driver to one interface, INTF. I
debian
CVE-2025-38697HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38697 [HIGH] CVE-2025-38697: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: upper ...
In the Linux kernel, the following vulnerability has been resolved: jfs: upper bound check of tree index in dbAllocAG When computing the tree index in dbAllocAG, we never check if we are out of bounds realative to the size of the stree. This could happen in a scenario where the filesystem metadata are corrupted.
Scope: local
bookworm: resolved (fixed in 6.1.153-1)
bul
debian
CVE-2025-21692HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21692 [HIGH] CVE-2025-21692: linux - In the Linux kernel, the following vulnerability has been resolved: net: sched:...
In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ets qdisc OOB Indexing Haowei Yan found that ets_class_from_arg() can index an Out-Of-Bound class in ets_class_from_arg() when passed clid of 0. The overflow may cause local privilege escalation. [ 18.852298] ------------[ cut here ]------------ [ 18.853271] UBSAN: array-index-out-of-b
debian
CVE-2025-39760HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39760 [HIGH] CVE-2025-39760: linux - In the Linux kernel, the following vulnerability has been resolved: usb: core: ...
In the Linux kernel, the following vulnerability has been resolved: usb: core: config: Prevent OOB read in SS endpoint companion parsing usb_parse_ss_endpoint_companion() checks descriptor type before length, enabling a potentially odd read outside of the buffer size. Fix this up by checking the size first before looking at any of the fields in the descriptor.
Scope:
debian
CVE-2025-21680HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21680 [HIGH] CVE-2025-21680: linux - In the Linux kernel, the following vulnerability has been resolved: pktgen: Avo...
In the Linux kernel, the following vulnerability has been resolved: pktgen: Avoid out-of-bounds access in get_imix_entries Passing a sufficient amount of imix entries leads to invalid access to the pkt_dev->imix_entries array because of the incorrect boundary check. UBSAN: array-index-out-of-bounds in net/core/pktgen.c:874:24 index 20 is out of range for type 'imix_pk
debian
CVE-2025-39860HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39860 [HIGH] CVE-2025-39860: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() syzbot reported the splat below without a repro. In the splat, a single thread calling bt_accept_dequeue() freed sk and touched it after that. The root cause would be the racy l2cap_sock_cleanup_listen() call added by the cited commit. bt_ac
debian
CVE-2025-38483HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38483 [HIGH] CVE-2025-38483: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: das...
In the Linux kernel, the following vulnerability has been resolved: comedi: das16m1: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: /* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */ if ((1 options[1]) & 0xdcfc) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount
debian
CVE-2025-39881HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39881 [HIGH] CVE-2025-39881: linux - In the Linux kernel, the following vulnerability has been resolved: kernfs: Fix...
In the Linux kernel, the following vulnerability has been resolved: kernfs: Fix UAF in polling when open file is released A use-after-free (UAF) vulnerability was identified in the PSI (Pressure Stall Information) monitoring mechanism: BUG: KASAN: slab-use-after-free in psi_trigger_poll+0x3c/0x140 Read of size 8 at addr ffff3de3d50bd308 by task systemd/1 psi_trigger_p
debian
CVE-2025-21858HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21858 [HIGH] CVE-2025-21858: linux - In the Linux kernel, the following vulnerability has been resolved: geneve: Fix...
In the Linux kernel, the following vulnerability has been resolved: geneve: Fix use-after-free in geneve_find_dev(). syzkaller reported a use-after-free in geneve_find_dev() [0] without repro. geneve_configure() links struct geneve_dev.next to net_generic(net, geneve_net_id)->geneve_list. The net here could differ from dev_net(dev) if IFLA_NET_NS_PID, IFLA_NET_NS_FD,
debian
CVE-2025-71089HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2025
CVE-2025-71089 [HIGH] CVE-2025-71089: linux - In the Linux kernel, the following vulnerability has been resolved: iommu: disa...
In the Linux kernel, the following vulnerability has been resolved: iommu: disable SVA when CONFIG_X86 is set Patch series "Fix stale IOTLB entries for kernel address space", v7. This proposes a fix for a security vulnerability related to IOMMU Shared Virtual Addressing (SVA). In an SVA context, an IOMMU can cache kernel page table entries. When a kernel page table pa
debian
CVE-2025-38395HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38395 [HIGH] CVE-2025-38395: linux - In the Linux kernel, the following vulnerability has been resolved: regulator: ...
In the Linux kernel, the following vulnerability has been resolved: regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods drvdata::gpiods is supposed to hold an array of 'gpio_desc' pointers. But the memory is allocated for only one pointer. This will lead to out-of-bounds access later in the code if 'config::ngpios' is > 1. So fix the code to allocate enou
debian