Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 16 of 132
CVE-2025-21702HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21702 [HIGH] CVE-2025-21702: linux - In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_... In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 Expected behaviour: In case we reach scheduler's limit, pfifo_tail_enqueue() will drop a packet in scheduler's queue and decrease scheduler's qlen by one. Then, pfifo_tail_enqueue() enqueue new packet and increase scheduler's qlen by one. Finall
debian
CVE-2025-37785HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37785 [HIGH] CVE-2025-37785: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix O... In the Linux kernel, the following vulnerability has been resolved: ext4: fix OOB read when checking dotdot dir Mounting a corrupted filesystem with directory which contains '.' dir entry with rec_len == block size results in out-of-bounds read (later on, when the corrupted directory is removed). ext4_empty_dir() assumes every ext4 directory contains at least '.' and
debian
CVE-2025-39913HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39913 [HIGH] CVE-2025-39913: linux - In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Ca... In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. syzbot reported the splat below. [0] The repro does the following: 1. Load a sk_msg prog that calls bpf_msg_cork_bytes(msg, cork_bytes) 2. Attach the prog to a SOCKMAP 3. Add a socket to the SOCKMAP 4. Activate faul
debian
CVE-2025-22107HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-22107 [HIGH] CVE-2025-22107: linux - In the Linux kernel, the following vulnerability has been resolved: net: dsa: s... In the Linux kernel, the following vulnerability has been resolved: net: dsa: sja1105: fix kasan out-of-bounds warning in sja1105_table_delete_entry() There are actually 2 problems: - deleting the last element doesn't require the memmove of elements [i + 1, end) over it. Actually, element i+1 is out of bounds. - The memmove itself should move size - i - 1 elements, be
debian
CVE-2025-38131HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38131 [HIGH] CVE-2025-38131: linux - In the Linux kernel, the following vulnerability has been resolved: coresight: ... In the Linux kernel, the following vulnerability has been resolved: coresight: prevent deactivate active config while enabling the config While enable active config via cscfg_csdev_enable_active_config(), active config could be deactivated via configfs' sysfs interface. This could make UAF issue in below scenario: CPU0 CPU1 (sysfs enable) load module cscfg_load_config
debian
CVE-2025-38159HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38159 [HIGH] CVE-2025-38159: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88... In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds Set the size to 6 instead of 2, since 'para' array is passed to 'rtw_fw_bt_wifi_control(rtwdev, para[0], ¶[1])', which reads 5 bytes: void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data) { ... SET_BT_WIFI_CONTR
debian
CVE-2025-38257HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38257 [HIGH] CVE-2025-38257: linux - In the Linux kernel, the following vulnerability has been resolved: s390/pkey: ... In the Linux kernel, the following vulnerability has been resolved: s390/pkey: Prevent overflow in size calculation for memdup_user() Number of apqn target list entries contained in 'nr_apqns' variable is determined by userspace via an ioctl call so the result of the product in calculation of size passed to memdup_user() may overflow. In this case the actual size of t
debian
CVE-2025-38004HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38004 [HIGH] CVE-2025-38004: linux - In the Linux kernel, the following vulnerability has been resolved: can: bcm: a... In the Linux kernel, the following vulnerability has been resolved: can: bcm: add locking for bcm_op runtime updates The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via hrtimer. The content and also the length of the sequence can be changed resp reduced at runtime where the 'currframe' counter is then set to zero. Although this appeared to be a s
debian
CVE-2025-38425HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38425 [HIGH] CVE-2025-38425: linux - In the Linux kernel, the following vulnerability has been resolved: i2c: tegra:... In the Linux kernel, the following vulnerability has been resolved: i2c: tegra: check msg length in SMBUS block read For SMBUS block read, do not continue to read if the message length passed from the device is '0' or greater than the maximum allowed bytes. Scope: local bookworm: resolved (fixed in 6.1.147-1) bullseye: resolved forky: resolved (fixed in 6.12.35-1) sid
debian
CVE-2025-38459HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38459 [HIGH] CVE-2025-38459: linux - In the Linux kernel, the following vulnerability has been resolved: atm: clip: ... In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix infinite recursive call of clip_push(). syzbot reported the splat below. [0] This happens if we call ioctl(ATMARP_MKIP) more than once. During the first call, clip_mkip() sets clip_push() to vcc->push(), and the second call copies it to clip_vcc->old_push(). Later, when the socket is cl
debian
CVE-2025-21762HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21762 [HIGH] CVE-2025-21762: linux - In the Linux kernel, the following vulnerability has been resolved: arp: use RC... In the Linux kernel, the following vulnerability has been resolved: arp: use RCU protection in arp_xmit() arp_xmit() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF. Scope: local bookworm: resolved (fixed in 6.1.129-1) bullseye: resolved (fixed in 5.10.237-1) forky: resolved (fixed in 6.12.16-1) sid: resolved (fixed in 6.12.16-1
debian
CVE-2025-39853HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39853 [HIGH] CVE-2025-39853: linux - In the Linux kernel, the following vulnerability has been resolved: i40e: Fix p... In the Linux kernel, the following vulnerability has been resolved: i40e: Fix potential invalid access when MAC list is empty list_first_entry() never returns NULL - if the list is empty, it still returns a pointer to an invalid object, leading to potential invalid memory access when dereferenced. Fix this by using list_first_entry_or_null instead of list_first_entry.
debian
CVE-2025-37903HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37903 [HIGH] CVE-2025-37903: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix slab-use-after-free in hdcp The HDCP code in amdgpu_dm_hdcp.c copies pointers to amdgpu_dm_connector objects without incrementing the kref reference counts. When using a USB-C dock, and the dock is unplugged, the corresponding amdgpu_dm_connector objects are freed, creating dangli
debian
CVE-2025-37823HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2025
CVE-2025-37823 [HIGH] CVE-2025-37823: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ... In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer. Scope: local bookworm: resolved (fixed in 6.1.137-1) bullseye: resolved (fixed in 5.10.237-1) forky: resolved (fi
debian
CVE-2025-21991HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21991 [HIGH] CVE-2025-21991: linux - In the Linux kernel, the following vulnerability has been resolved: x86/microco... In the Linux kernel, the following vulnerability has been resolved: x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their CPU masks and unconditionally accesses per-CPU data for the first CPU of each mask. According to Documentation/admin-guide/mm/numaperf.rst: "Some memor
debian
CVE-2025-37979HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2025
CVE-2025-37979 [HIGH] CVE-2025-37979: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom:... In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: Fix sc7280 lpass potential buffer overflow Case values introduced in commit 5f78e1fb7a3e ("ASoC: qcom: Add driver support for audioreach solution") cause out of bounds access in arrays of sc7280 driver data (e.g. in case of RX_CODEC_DMA_RX_0 in sc7280_snd_hw_params()). Redefine LPASS_MAX_P
debian
CVE-2025-21703HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21703 [HIGH] CVE-2025-21703: linux - In the Linux kernel, the following vulnerability has been resolved: netem: Upda... In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child qdisc becomes empty, therefore we need to reduce the backlog of the child qdisc before calling it. Otherwise it would miss the opportunity to call cops->qlen_notify(), in the ca
debian
CVE-2025-21920HIGHCVSS 7.1fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21920 [HIGH] CVE-2025-21920: linux - In the Linux kernel, the following vulnerability has been resolved: vlan: enfor... In the Linux kernel, the following vulnerability has been resolved: vlan: enforce underlying device type Currently, VLAN devices can be created on top of non-ethernet devices. Besides the fact that it doesn't make much sense, this also causes a bug which leaks the address of a kernel function to usermode. When creating a VLAN device, we initialize GARP (garp_init_appl
debian
CVE-2025-38574HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38574 [HIGH] CVE-2025-38574: linux - In the Linux kernel, the following vulnerability has been resolved: pptp: ensur... In the Linux kernel, the following vulnerability has been resolved: pptp: ensure minimal skb length in pptp_xmit() Commit aabc6596ffb3 ("net: ppp: Add bound checking for skb data on ppp_sync_txmung") fixed ppp_sync_txmunge() We need a similar fix in pptp_xmit(), otherwise we might read uninit data as reported by syzbot. BUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x27
debian
CVE-2025-39870HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39870 [HIGH] CVE-2025-39870: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix double free in idxd_setup_wqs() The clean up in idxd_setup_wqs() has had a couple bugs because the error handling is a bit subtle. It's simpler to just re-write it in a cleaner way. The issues here are: 1) If "idxd->max_wqs" is <= 0 then we call put_device(conf_dev) when "conf_dev
debian