Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 14 of 132
CVE-2025-37839HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37839 [HIGH] CVE-2025-37839: linux - In the Linux kernel, the following vulnerability has been resolved: jbd2: remov...
In the Linux kernel, the following vulnerability has been resolved: jbd2: remove wrong sb->s_sequence check Journal emptiness is not determined by sb->s_sequence == 0 but rather by sb->s_start == 0 (which is set a few lines above). Furthermore 0 is a valid transaction ID so the check can spuriously trigger. Remove the invalid WARN_ON.
Scope: local
bookworm: resolved (
debian
CVE-2025-21919HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21919 [HIGH] CVE-2025-21919: linux - In the Linux kernel, the following vulnerability has been resolved: sched/fair:...
In the Linux kernel, the following vulnerability has been resolved: sched/fair: Fix potential memory corruption in child_cfs_rq_on_list child_cfs_rq_on_list attempts to convert a 'prev' pointer to a cfs_rq. This 'prev' pointer can originate from struct rq's leaf_cfs_rq_list, making the conversion invalid and potentially leading to memory corruption. Depending on the r
debian
CVE-2025-37892HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37892 [HIGH] CVE-2025-37892: linux - In the Linux kernel, the following vulnerability has been resolved: mtd: inftlc...
In the Linux kernel, the following vulnerability has been resolved: mtd: inftlcore: Add error check for inftl_read_oob() In INFTL_findwriteunit(), the return value of inftl_read_oob() need to be checked. A proper implementation can be found in INFTL_deleteblock(). The status will be set as SECTOR_IGNORE to break from the while-loop correctly if the inftl_read_oob() fa
debian
CVE-2025-39766HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39766 [HIGH] CVE-2025-39766: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit The following setup can trigger a WARNING in htb_activate due to the condition: !cl->leaf.q->q.qlen tc qdisc del dev lo root tc qdisc add dev lo root handle 1: htb default 1 tc class add dev lo parent 1: classid 1:1 \ htb rate 64bi
debian
CVE-2025-38051HIGHCVSS 7.0fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38051 [HIGH] CVE-2025-38051: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...
In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix use-after-free in cifs_fill_dirent There is a race condition in the readdir concurrency process, which may access the rsp buffer after it has been released, triggering the following KASAN warning. ================================================================== BUG: KASAN: slab-use-
debian
CVE-2025-38024HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-38024 [HIGH] CVE-2025-38024: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: F...
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xcf/0x610 mm/kasan/report.c:489 kasan_report+0xb5/0xe0 mm/kasan/rep
debian
CVE-2025-71091HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71091 [HIGH] CVE-2025-71091: linux - In the Linux kernel, the following vulnerability has been resolved: team: fix c...
In the Linux kernel, the following vulnerability has been resolved: team: fix check for port enabled in team_queue_override_port_prio_changed() There has been a syzkaller bug reported recently with the following trace: list_del corruption, ffff888058bea080->prev is LIST_POISON2 (dead000000000122) ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:59!
debian
CVE-2025-39686HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39686 [HIGH] CVE-2025-39686: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: Mak...
In the Linux kernel, the following vulnerability has been resolved: comedi: Make insn_rw_emulate_bits() do insn->n samples The `insn_rw_emulate_bits()` function is used as a default handler for `INSN_READ` instructions for subdevices that have a handler for `INSN_BITS` but not for `INSN_READ`. Similarly, it is used as a default handler for `INSN_WRITE` instructions fo
debian
CVE-2025-38724HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38724 [HIGH] CVE-2025-38724: linux - In the Linux kernel, the following vulnerability has been resolved: nfsd: handl...
In the Linux kernel, the following vulnerability has been resolved: nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() Lei Lu recently reported that nfsd4_setclientid_confirm() did not check the return value from get_client_locked(). a SETCLIENTID_CONFIRM could race with a confirmed client expiring and fail to get a reference. That could later lea
debian
CVE-2025-38375HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38375 [HIGH] CVE-2025-38375: linux - In the Linux kernel, the following vulnerability has been resolved: virtio-net:...
In the Linux kernel, the following vulnerability has been resolved: virtio-net: ensure the received length does not exceed allocated size In xdp_linearize_page, when reading the following buffers from the ring, we forget to check the received length with the true allocate size. This can lead to an out-of-bound read. This commit adds that missing check.
Scope: local
bo
debian
CVE-2025-38298HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38298 [HIGH] CVE-2025-38298: linux - In the Linux kernel, the following vulnerability has been resolved: EDAC/skx_co...
In the Linux kernel, the following vulnerability has been resolved: EDAC/skx_common: Fix general protection fault After loading i10nm_edac (which automatically loads skx_edac_common), if unload only i10nm_edac, then reload it and perform error injection testing, a general protection fault may occur: mce: [Hardware Error]: Machine check events logged Oops: general prot
debian
CVE-2025-38736HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38736 [HIGH] CVE-2025-38736: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: a...
In the Linux kernel, the following vulnerability has been resolved: net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization Syzbot reported shift-out-of-bounds exception on MDIO bus initialization. The PHY address should be masked to 5 bits (0-31). Without this mask, invalid PHY addresses could be used, potentially causing issues with MDIO bus operatio
debian
CVE-2025-38485HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38485 [HIGH] CVE-2025-38485: linux - In the Linux kernel, the following vulnerability has been resolved: iio: accel:...
In the Linux kernel, the following vulnerability has been resolved: iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush fxls8962af_fifo_flush() uses indio_dev->active_scan_mask (with iio_for_each_active_channel()) without making sure the indio_dev stays in buffer mode. There is a race if indio_dev exits buffer mode in the middle of the interrupt that f
debian
CVE-2025-37914HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37914 [HIGH] CVE-2025-37914: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ...
In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of ets, there won't be a UAF, but the code will add the same classifier to the
debian
CVE-2025-38535HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38535 [HIGH] CVE-2025-38535: linux - In the Linux kernel, the following vulnerability has been resolved: phy: tegra:...
In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode When transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code assumed that the regulator should be disabled. However, if the regulator is marked as always-on, regulator_is_enabled() continues to return true, leading to an incorre
debian
CVE-2025-37796HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37796 [HIGH] CVE-2025-37796: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: at76c...
In the Linux kernel, the following vulnerability has been resolved: wifi: at76c50x: fix use after free access in at76_disconnect The memory pointed to by priv is freed at the end of at76_delete_device function (using ieee80211_free_hw). But the code then accesses the udev field of the freed object to put the USB device. This may also lead to a memory leak of the usb d
debian
CVE-2025-39873HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39873 [HIGH] CVE-2025-39873: linux - In the Linux kernel, the following vulnerability has been resolved: can: xilinx...
In the Linux kernel, the following vulnerability has been resolved: can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB can_put_echo_skb() takes ownership of the SKB and it may be freed during or after the call. However, xilinx_can xcan_write_frame() keeps using SKB after the call. Fix that by only calling can_put_echo_skb() after the code is do
debian
CVE-2025-23158HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-23158 [HIGH] CVE-2025-23158: linux - In the Linux kernel, the following vulnerability has been resolved: media: venu...
In the Linux kernel, the following vulnerability has been resolved: media: venus: hfi: add check to handle incorrect queue size qsize represents size of shared queued between driver and video firmware. Firmware can modify this value to an invalid large value. In such situation, empty_space will be bigger than the space actually available. Since new_wr_idx is not check
debian
CVE-2025-39849HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39849 [HIGH] CVE-2025-39849: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80...
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() If the ssid->datalen is more than IEEE80211_MAX_SSID_LEN (32) it would lead to memory corruption so add some bounds checking.
Scope: local
bookworm: resolved (fixed in 6.1.153-1)
bullseye: resolved
forky: resolved (fixed in 6.16.6-1)
debian
CVE-2025-39749HIGHCVSS 7.0fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39749 [HIGH] CVE-2025-39749: linux - In the Linux kernel, the following vulnerability has been resolved: rcu: Protec...
In the Linux kernel, the following vulnerability has been resolved: rcu: Protect ->defer_qs_iw_pending from data race On kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is invoked within an interrupts-disabled region of code [1], it will invoke rcu_read_unlock_special(), which uses an irq-work handler to force the system to notice when the RCU read-side c
debian