Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 20 of 132
CVE-2025-21647HIGHCVSS 7.1fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21647 [HIGH] CVE-2025-21647: linux - In the Linux kernel, the following vulnerability has been resolved: sched: sch_...
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts Even though we fixed a logic error in the commit cited below, syzbot still managed to trigger an underflow of the per-host bulk flow counters, leading to an out of bounds memory access. To avoid any such logic errors causing out of b
debian
CVE-2025-21719HIGHCVSS 7.1fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21719 [HIGH] CVE-2025-21719: linux - In the Linux kernel, the following vulnerability has been resolved: ipmr: do no...
In the Linux kernel, the following vulnerability has been resolved: ipmr: do not call mr_mfc_uses_dev() for unres entries syzbot found that calling mr_mfc_uses_dev() for unres entries would crash [1], because c->mfc_un.res.minvif / c->mfc_un.res.maxvif alias to "struct sk_buff_head unresolved", which contain two pointers. This code never worked, lets remove it. [1] Un
debian
CVE-2025-38352HIGHCVSS 7.4KEVfixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38352 [HIGH] CVE-2025-38352: linux - In the Linux kernel, the following vulnerability has been resolved: posix-cpu-t...
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_c
debian
CVE-2025-38572HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38572 [HIGH] CVE-2025-38572: linux - In the Linux kernel, the following vulnerability has been resolved: ipv6: rejec...
In the Linux kernel, the following vulnerability has been resolved: ipv6: reject malicious packets in ipv6_gso_segment() syzbot was able to craft a packet with very long IPv6 extension headers leading to an overflow of skb->transport_header. This 16bit field has a limited range. Add skb_reset_transport_header_careful() helper and use it from ipv6_gso_segment() WARNING
debian
CVE-2025-21687HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2025
CVE-2025-21687 [HIGH] CVE-2025-21687: linux - In the Linux kernel, the following vulnerability has been resolved: vfio/platfo...
In the Linux kernel, the following vulnerability has been resolved: vfio/platform: check the bounds of read/write syscalls count and offset are passed from user space and not checked, only offset is capped to 40 bits, which can be used to read/write out of bounds of the device.
Scope: local
bookworm: resolved (fixed in 6.1.128-1)
bullseye: resolved (fixed in 5.10.234-
debian
CVE-2025-71078HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71078 [HIGH] CVE-2025-71078: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/64s...
In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multihit issue during SLB preload On systems using the hash MMU, there is a software SLB preload cache that mirrors the entries loaded into the hardware SLB buffer. This preload cache is subject to periodic eviction — typically after every 256 context switches — to remove old
debian
CVE-2025-38653HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38653 [HIGH] CVE-2025-38653: linux - In the Linux kernel, the following vulnerability has been resolved: proc: use t...
In the Linux kernel, the following vulnerability has been resolved: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al Check pde->proc_ops->proc_lseek directly may cause UAF in rmmod scenario. It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in proc_get_inode()"). Followed by AI Viro's suggestion, fix it in same man
debian
CVE-2025-38022HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-38022 [HIGH] CVE-2025-38022: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/core: ...
In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:408 [inline] print_report+0xc3/0x670 mm/kasan/report.c:521 kasan_report+0xe0/
debian
CVE-2025-22041HIGHCVSS 8.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-22041 [HIGH] CVE-2025-22041: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_sessions_deregister() In multichannel mode, UAF issue can occur in session_deregister when the second channel sets up a session through the connection of the first channel. session that is freed through the global session table can be accessed again through ->session
debian
CVE-2025-39835HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39835 [HIGH] CVE-2025-39835: linux - In the Linux kernel, the following vulnerability has been resolved: xfs: do not...
In the Linux kernel, the following vulnerability has been resolved: xfs: do not propagate ENODATA disk errors into xattr code ENODATA (aka ENOATTR) has a very specific meaning in the xfs xattr code; namely, that the requested attribute name could not be found. However, a medium error from disk may also return ENODATA. At best, this medium error may escape to userspace
debian
CVE-2025-22121HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-22121 [HIGH] CVE-2025-22121: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix o...
In the Linux kernel, the following vulnerability has been resolved: ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all() There's issue as follows: BUG: KASAN: use-after-free in ext4_xattr_inode_dec_ref_all+0x6ff/0x790 Read of size 4 at addr ffff88807b003000 by task syz-executor.0/15172 CPU: 3 PID: 15172 Comm: syz-executor.0 Call Trace: __dump_stack lib/dump_s
debian
CVE-2025-39823HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39823 [HIGH] CVE-2025-39823: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: x86: u...
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.
Scope: local
bookworm: resolved (fixed in 6.1.153-1)
bullseye: resolv
debian
CVE-2025-38680HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38680 [HIGH] CVE-2025-38680: linux - In the Linux kernel, the following vulnerability has been resolved: media: uvcv...
In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() The buffer length check before calling uvc_parse_format() only ensured that the buffer has at least 3 bytes (buflen > 2), buf the function accesses buffer[3], requiring at least 4 bytes. This can lead to an out-of-bounds read if the
debian
CVE-2025-38350HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38350 [HIGH] CVE-2025-38350: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: Always pass notifications when child class becomes empty Certain classful qdiscs may invoke their classes' dequeue handler on an enqueue operation. This may unexpectedly empty the child qdisc and thus make an in-flight class passive via qlen_notify(). Most qdiscs do not expect such behaviou
debian
CVE-2025-39783HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39783 [HIGH] CVE-2025-39783: linux - In the Linux kernel, the following vulnerability has been resolved: PCI: endpoi...
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix configfs group list head handling Doing a list_del() on the epf_group field of struct pci_epf_driver in pci_epf_remove_cfs() is not correct as this field is a list head, not a list entry. This list_del() call triggers a KASAN warning when an endpoint function driver which has a conf
debian
CVE-2025-21700HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21700 [HIGH] CVE-2025-21700: linux - In the Linux kernel, the following vulnerability has been resolved: net: sched:...
In the Linux kernel, the following vulnerability has been resolved: net: sched: Disallow replacing of child qdisc from one parent to another Lion Ackermann was able to create a UAF which can be abused for privilege escalation with the following script Step 1. create root qdisc tc qdisc add dev lo root handle 1:0 drr step2. a class for packet aggregation do demonstrate
debian
CVE-2025-21715HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21715 [HIGH] CVE-2025-21715: linux - In the Linux kernel, the following vulnerability has been resolved: net: davico...
In the Linux kernel, the following vulnerability has been resolved: net: davicom: fix UAF in dm9000_drv_remove dm is netdev private data and it cannot be used after free_netdev() call. Using dm after free_netdev() can cause UAF bug. Fix it by moving free_netdev() at the end of the function. This is similar to the issue fixed in commit ad297cd2db89 ("net: qcom/emac: fi
debian
CVE-2025-39817HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39817 [HIGH] CVE-2025-39817: linux - In the Linux kernel, the following vulnerability has been resolved: efivarfs: F...
In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare Observed on kernel 6.6 (present on master as well): BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0 Call trace: kasan_check_range+0xe8/0x190 __asan_loadN+0x1c/0x28 memcmp+0x98/0xd0 efivarfs_d_compare+0x68/0xd8 __d_lookup_rcu_op_compare+0x178/0x
debian
CVE-2025-39685HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39685 [HIGH] CVE-2025-39685: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: pcl...
In the Linux kernel, the following vulnerability has been resolved: comedi: pcl726: Prevent invalid irq number The reproducer passed in an irq number(0x80008000) that was too large, which triggered the oob. Added an interrupt number check to prevent users from passing in an irq number that was too large. If `it->options[1]` is 31, then `1 options[1]` is still invalid
debian
CVE-2025-38437HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38437 [HIGH] CVE-2025-38437: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potential use-after-free in oplock/lease break ack If ksmbd_iov_pin_rsp return error, use-after-free can happen by accessing opinfo->state and opinfo_put and ksmbd_fd_put could called twice.
Scope: local
bookworm: resolved (fixed in 6.1.147-1)
bullseye: resolved
forky: resolved (fixed in 6.
debian