Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 17 of 132
CVE-2025-38471HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38471 [HIGH] CVE-2025-38471: linux - In the Linux kernel, the following vulnerability has been resolved: tls: always...
In the Linux kernel, the following vulnerability has been resolved: tls: always refresh the queue when reading sock After recent changes in net-next TCP compacts skbs much more aggressively. This unearthed a bug in TLS where we may try to operate on an old skb when checking if all skbs in the queue have matching decrypt state and geometry. BUG: KASAN: slab-use-after-f
debian
CVE-2025-38488HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38488 [HIGH] CVE-2025-38488: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free in crypt_message when using async crypto The CVE-2024-50047 fix removed asynchronous crypto handling from crypt_message(), assuming all crypto operations are synchronous. However, when hardware crypto accelerators are used, this can cause use-after-free crashes: crypt_m
debian
CVE-2025-21631HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21631 [HIGH] CVE-2025-21631: linux - In the Linux kernel, the following vulnerability has been resolved: block, bfq:...
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq() Our syzkaller report a following UAF for v6.6: BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958 Read of size 8 at addr ffff8881b57147d8 by task fsstress/232726 CPU: 2 PID: 232726 Comm: fsstress Not tainted 6.6.0
debian
CVE-2025-21718HIGHCVSS 7.0fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21718 [HIGH] CVE-2025-21718: linux - In the Linux kernel, the following vulnerability has been resolved: net: rose: ...
In the Linux kernel, the following vulnerability has been resolved: net: rose: fix timer races against user threads Rose timers only acquire the socket spinlock, without checking if the socket is owned by one user thread. Add a check and rearm the timers if needed. BUG: KASAN: slab-use-after-free in rose_timer_expiry+0x31d/0x360 net/rose/rose_timer.c:174 Read of size
debian
CVE-2025-39730HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-39730 [HIGH] CVE-2025-39730: linux - In the Linux kernel, the following vulnerability has been resolved: NFS: Fix fi...
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() The function needs to check the minimal filehandle length before it can access the embedded filehandle.
Scope: local
bookworm: resolved (fixed in 6.1.148-1)
bullseye: resolved (fixed in 5.10.244-1)
forky: resolved (fixed in 6.16.3-1)
sid: resol
debian
CVE-2025-37838HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37838 [HIGH] CVE-2025-37838: linux - In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_pr...
In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver Due to Race Condition In the ssi_protocol_probe() function, &ssi->work is bound with ssip_xmit_work(), In ssip_pn_setup(), the ssip_pn_xmit() function within the ssip_pn_ops structure is capable of starting the work. If we remo
debian
CVE-2025-37797HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2025
CVE-2025-37797 [HIGH] CVE-2025-37797: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ...
In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerabilit
debian
CVE-2025-38699HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38699 [HIGH] CVE-2025-38699: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: ...
In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo()
debian
CVE-2025-38728HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38728 [HIGH] CVE-2025-38728: linux - In the Linux kernel, the following vulnerability has been resolved: smb3: fix f...
In the Linux kernel, the following vulnerability has been resolved: smb3: fix for slab out of bounds on mount to ksmbd With KASAN enabled, it is possible to get a slab out of bounds during mount to ksmbd due to missing check in parse_server_interfaces() (see below): BUG: KASAN: slab-out-of-bounds in parse_server_interfaces+0x14ee/0x1880 [cifs] Read of size 4 at addr f
debian
CVE-2025-38052HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38052 [HIGH] CVE-2025-38052: linux - In the Linux kernel, the following vulnerability has been resolved: net/tipc: f...
In the Linux kernel, the following vulnerability has been resolved: net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done Syzbot reported a slab-use-after-free with the following call trace: ================================================================== BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840 Read of s
debian
CVE-2025-37810HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2025
CVE-2025-37810 [HIGH] CVE-2025-37810: linux - In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: ...
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: check that event count does not exceed event buffer length The event count is read from register DWC3_GEVNTCOUNT. There is a check for the count being zero, but not for exceeding the event buffer length. Check that event count does not exceed event buffer length, avoiding an out-of-
debian
CVE-2025-21724HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21724 [HIGH] CVE-2025-21724: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd/iov...
In the Linux kernel, the following vulnerability has been resolved: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() Resolve a UBSAN shift-out-of-bounds issue in iova_bitmap_offset_to_index() where shifting the constant "1" (of type int) by bitmap->mapped.pgshift (an unsigned long value) could result in undefined behavior. The constant "1"
debian
CVE-2025-38154HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38154 [HIGH] CVE-2025-38154: linux - In the Linux kernel, the following vulnerability has been resolved: bpf, sockma...
In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Avoid using sk_socket after free when sending The sk->sk_socket is not locked or referenced in backlog thread, and during the call to skb_send_sock(), there is a race condition with the release of sk_socket. All types of sockets(tcp/udp/unix/vsock) will be affected. Race conditions: '''
debian
CVE-2025-22020HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-22020 [HIGH] CVE-2025-22020: linux - In the Linux kernel, the following vulnerability has been resolved: memstick: r...
In the Linux kernel, the following vulnerability has been resolved: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms] Read of size 8 at addr ffff888136335380 by task
debian
CVE-2025-21811HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21811 [HIGH] CVE-2025-21811: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: pro...
In the Linux kernel, the following vulnerability has been resolved: nilfs2: protect access to buffers with no active references nilfs_lookup_dirty_data_buffers(), which iterates through the buffers attached to dirty data folios/pages, accesses the attached buffers without locking the folios/pages. For data cache, nilfs_clear_folio_dirty() may be called asynchronously
debian
CVE-2025-21764HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21764 [HIGH] CVE-2025-21764: linux - In the Linux kernel, the following vulnerability has been resolved: ndisc: use ...
In the Linux kernel, the following vulnerability has been resolved: ndisc: use RCU protection in ndisc_alloc_skb() ndisc_alloc_skb() can be called without RTNL or RCU being held. Add RCU protection to avoid possible UAF.
Scope: local
bookworm: resolved (fixed in 6.1.129-1)
bullseye: resolved (fixed in 5.10.237-1)
forky: resolved (fixed in 6.12.16-1)
sid: resolved (fix
debian
CVE-2025-38103HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38103 [HIGH] CVE-2025-38103: linux - In the Linux kernel, the following vulnerability has been resolved: HID: usbhid...
In the Linux kernel, the following vulnerability has been resolved: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() Update struct hid_descriptor to better reflect the mandatory and optional parts of the HID Descriptor as per USB HID 1.11 specification. Note: the kernel currently does not parse any optional HID class descriptors, only the mandatory
debian
CVE-2025-39880HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39880 [HIGH] CVE-2025-39880: linux - In the Linux kernel, the following vulnerability has been resolved: libceph: fi...
In the Linux kernel, the following vulnerability has been resolved: libceph: fix invalid accesses to ceph_connection_v1_info There is a place where generic code in messenger.c is reading and another place where it is writing to con->v1 union member without checking that the union member is active (i.e. msgr1 is in use). On 64-bit systems, con->v1.auth_retry overlaps w
debian
CVE-2025-38677HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38677 [HIGH] CVE-2025-38677: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t...
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid out-of-boundary access in dnode page As Jiaming Zhang reported: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x1c1/0x2a0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x17e/0x800 mm/kasan/report.c:480 kasan_report+0x147/0x180
debian
CVE-2025-38593HIGHCVSS 7.8fixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-38593 [HIGH] CVE-2025-38593: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()' Function 'hci_discovery_filter_clear()' frees 'uuids' array and then sets it to NULL. There is a tiny chance of the following race: 'hci_cmd_sync_work()' 'update_passive_scan_sync()' 'hci_update_passive_scan_sync()' 'hci_discovery_
debian