Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 3 of 132
CVE-2026-23026MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23026 [MEDIUM] CVE-2026-23026: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() Fix a memory leak in gpi_peripheral_config() where the original memory pointed to by gchan->config could be lost if krealloc() fails. The issue occurs when: 1. gchan->config points to previously allocated memory 2. krealloc() fails and
debian
CVE-2026-23108MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23108 [MEDIUM] CVE-2026-23108: linux - In the Linux kernel, the following vulnerability has been resolved: can: usb_8d... In the Linux kernel, the following vulnerability has been resolved: can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In usb_8dev_open() -> usb_8dev_start(), the URBs for USB-in transfers are allocated, added to the priv->rx_submitt
debian
CVE-2026-23069MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23069 [MEDIUM] CVE-2026-23069: linux - In the Linux kernel, the following vulnerability has been resolved: vsock/virti... In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: fix potential underflow in virtio_transport_get_credit() The credit calculation in virtio_transport_get_credit() uses unsigned arithmetic: ret = vvs->peer_buf_alloc - (vvs->tx_cnt - vvs->peer_fwd_cnt); If the peer shrinks its advertised buffer (peer_buf_alloc) while bytes are in flight
debian
CVE-2026-23061MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23061 [MEDIUM] CVE-2026-23061: linux - In the Linux kernel, the following vulnerability has been resolved: can: kvaser... In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In kvaser_usb_set_{,data_}bittiming() -> kvaser_usb_setup_rx_urbs(), the URBs for USB-in transfers are allocat
debian
CVE-2026-23229MEDIUMCVSS 5.5fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23229 [MEDIUM] CVE-2026-23229: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: vir... In the Linux kernel, the following vulnerability has been resolved: crypto: virtio - Add spinlock protection with virtqueue notification When VM boots with one virtio-crypto PCI device and builtin backend, run openssl benchmark command with multiple processes, such as openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32 openssl processes will hangup an
debian
CVE-2026-23237MEDIUMCVSS 5.5fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23237 [MEDIUM] CVE-2026-23237: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8... In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: Add missing NULL pointer checks In a few places in the Classmate laptop driver, code using the accel object may run before that object's address is stored in the driver data of the input device using it. For example, cmpc_accel_sensitivity_store_v4() is the "show" met
debian
CVE-2026-22979MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-22979 [MEDIUM] CVE-2026-22979: linux - In the Linux kernel, the following vulnerability has been resolved: net: fix me... In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in skb_segment_list for GRO packets When skb_segment_list() is called during packet forwarding, it handles packets that were aggregated by the GRO engine. Historically, the segmentation logic in skb_segment_list assumes that individual segments are split from a parent SKB and ma
debian
CVE-2026-22994MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-22994 [MEDIUM] CVE-2026-22994: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix re... In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak in bpf_prog_test_run_xdp() syzbot is reporting unregister_netdevice: waiting for sit0 to become free. Usage count = 2 problem. A debug printk() patch found that a refcount is obtained at xdp_convert_md_to_buff() from bpf_prog_test_run_xdp(). According to commit ec94670f
debian
CVE-2026-23019MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23019 [MEDIUM] CVE-2026-23019: linux - In the Linux kernel, the following vulnerability has been resolved: net: marvel... In the Linux kernel, the following vulnerability has been resolved: net: marvell: prestera: fix NULL dereference on devlink_alloc() failure devlink_alloc() may return NULL on allocation failure, but prestera_devlink_alloc() unconditionally calls devlink_priv() on the returned pointer. This leads to a NULL pointer dereference if devlink allocation fails. Add a check
debian
CVE-2026-23075MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23075 [MEDIUM] CVE-2026-23075: linux - In the Linux kernel, the following vulnerability has been resolved: can: esd_us... In the Linux kernel, the following vulnerability has been resolved: can: esd_usb: esd_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In esd_usb_open(), the URBs for USB-in transfers are allocated, added to the dev->rx_submitted anchor and submitted.
debian
CVE-2026-23071MEDIUMCVSS 4.7fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23071 [MEDIUM] CVE-2026-23071: linux - In the Linux kernel, the following vulnerability has been resolved: regmap: Fix... In the Linux kernel, the following vulnerability has been resolved: regmap: Fix race condition in hwspinlock irqsave routine Previously, the address of the shared member '&map->spinlock_flags' was passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race condition where multiple contexts contending for the lock could overwrite the shared flags variable,
debian
CVE-2026-22976MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-22976 [MEDIUM] CVE-2026-22976: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ... In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset `qfq_class->leaf_qdisc->q.qlen > 0` does not imply that the class itself is active. Two qfq_class objects may point to the same leaf_qdisc. This happens when: 1. one QFQ qdisc is attached to the dev as the root qdis
debian
CVE-2026-23101MEDIUMCVSS 4.7fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23101 [MEDIUM] CVE-2026-23101: linux - In the Linux kernel, the following vulnerability has been resolved: leds: led-c... In the Linux kernel, the following vulnerability has been resolved: leds: led-class: Only Add LED to leds_list when it is fully ready Before this change the LED was added to leds_list before led_init_core() gets called adding it the list before led_classdev.set_brightness_work gets initialized. This leaves a window where led_trigger_register() of a LED's default tri
debian
CVE-2026-23020MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23020 [MEDIUM] CVE-2026-23020: linux - In the Linux kernel, the following vulnerability has been resolved: net: 3com: ... In the Linux kernel, the following vulnerability has been resolved: net: 3com: 3c59x: fix possible null dereference in vortex_probe1() pdev can be null and free_ring: can be called in 1297 with a null pdev. Scope: local bookworm: resolved (fixed in 6.1.162-1) bullseye: resolved (fixed in 5.10.249-1) forky: resolved (fixed in 6.18.8-1) sid: resolved (fixed in 6.18.8-
debian
CVE-2026-23085MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23085 [MEDIUM] CVE-2026-23085: linux - In the Linux kernel, the following vulnerability has been resolved: irqchip/gic... In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Avoid truncating memory addresses On 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem allocations to be backed by addresses physical memory above the 32-bit address limit, as found while experimenting with larger VMSPLIT configurations. This caused the qemu virt mo
debian
CVE-2026-23011MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23011 [MEDIUM] CVE-2026-23011: linux - In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_gr... In the Linux kernel, the following vulnerability has been resolved: ipv4: ip_gre: make ipgre_header() robust Analog to commit db5b4e39c4e6 ("ip6_gre: make ip6gre_header() robust") Over the years, syzbot found many ways to crash the kernel in ipgre_header() [1]. This involves team or bonding drivers ability to dynamically change their dev->needed_headroom and/or dev-
debian
CVE-2026-23060MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23060 [MEDIUM] CVE-2026-23060: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: aut... In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than the minimum expected length, crypto_authenc_esn_decrypt() can advance past the end of the destination scatterlist and trigger a NULL pointer derefer
debian
CVE-2026-23096MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-23096 [MEDIUM] CVE-2026-23096: linux - In the Linux kernel, the following vulnerability has been resolved: uacce: fix ... In the Linux kernel, the following vulnerability has been resolved: uacce: fix cdev handling in the cleanup path When cdev_device_add fails, it internally releases the cdev memory, and if cdev_device_del is then executed, it will cause a hang error. To fix it, we check the return value of cdev_device_add() and clear uacce->cdev to avoid calling cdev_device_del in th
debian
CVE-2026-23206MEDIUMCVSS 5.5fixed in linux 6.1.164-1 (bookworm)2026
CVE-2026-23206 [MEDIUM] CVE-2026-23206: linux - In the Linux kernel, the following vulnerability has been resolved: dpaa2-switc... In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero The driver allocates arrays for ports, FDBs, and filter blocks using kcalloc() with ethsw->sw_attr.num_ifs as the element count. When the device reports zero interfaces (either due to hardware configuration or firmware issues), kca
debian
CVE-2026-22992MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2026
CVE-2026-22992 [MEDIUM] CVE-2026-22992: linux - In the Linux kernel, the following vulnerability has been resolved: libceph: re... In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any error from ceph_auth_handle_reply_done() is propagated via finish_auth() but isn't returned from mon_handle_auth_done(). This results in higher layers learning that (despite the monitor considering us to be successfully auth
debian