Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 55 of 132
CVE-2025-40048UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40048 CVE-2025-40048: linux - In the Linux kernel, the following vulnerability has been resolved: uio_hv_gene...
In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace take care of interrupt mask Remove the logic to set interrupt mask by default in uio_hv_generic driver as the interrupt mask value is supposed to be controlled completely by the user space. If the mask bit gets changed by the driver, concurrently with user mode operating on the
debian
CVE-2025-68295UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68295 CVE-2025-68295: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client...
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix memory leak in cifs_construct_tcon() When having a multiuser mount with domain= specified and using cifscreds, cifs_set_cifscreds() will end up setting @ctx->domainname, so it needs to be freed before leaving cifs_construct_tcon(). This fixes the following memory leak reported by kmemleak: m
debian
CVE-2025-68818UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68818 CVE-2025-68818: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: Rever...
In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path" This reverts commit 0367076b0817d5c75dfb83001ce7ce5c64d803a9. The commit being reverted added code to __qla2x00_abort_all_cmds() to call sp->done() without holding a spinlock. But unlike the older code below it, this new code fai
debian
CVE-2025-40312UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40312 CVE-2025-40312: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: Verify...
In the Linux kernel, the following vulnerability has been resolved: jfs: Verify inode mode when loading from disk The inode mode loaded from corrupted disk can be invalid. Do like what commit 0a9e74051313 ("isofs: Verify inode mode when loading from disk") does.
Scope: local
bookworm: resolved (fixed in 6.1.159-1)
bullseye: resolved (fixed in 5.10.247-1)
forky: resolved (fix
debian
CVE-2025-40318UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40318 CVE-2025-40318: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once hci_cmd_sync_dequeue_once() does lookup and then cancel the entry under two separate lock sections. Meanwhile, hci_cmd_sync_work() can also delete the same entry, leading to double list_del() and "UAF". Fix this by holding cmd_sync_work_lock across b
debian
CVE-2025-68733UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68733 CVE-2025-68733: linux - In the Linux kernel, the following vulnerability has been resolved: smack: fix ...
In the Linux kernel, the following vulnerability has been resolved: smack: fix bug: unprivileged task can create labels If an unprivileged task is allowed to relabel itself (/smack/relabel-self is not empty), it can freely create new labels by writing their names into own /proc/PID/attr/smack/current This occurs because do_setattr() imports the provided label in advance, bef
debian
CVE-2025-40167UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40167 CVE-2025-40167: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: detec...
In the Linux kernel, the following vulnerability has been resolved: ext4: detect invalid INLINE_DATA + EXTENTS flag combination syzbot reported a BUG_ON in ext4_es_cache_extent() when opening a verity file on a corrupted ext4 filesystem mounted without a journal. The issue is that the filesystem has an inode with both the INLINE_DATA and EXTENTS flags set: EXT4-fs error (dev
debian
CVE-2025-68218UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68218 CVE-2025-68218: linux - In the Linux kernel, the following vulnerability has been resolved: nvme-multip...
In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: fix lockdep WARN due to partition scan work Blktests test cases nvme/014, 057 and 058 fail occasionally due to a lockdep WARN. As reported in the Closes tag URL, the WARN indicates that a deadlock can happen due to the dependency among disk->open_mutex, kblockd workqueue completion and partit
debian
CVE-2025-68753UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68753 CVE-2025-68753: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: firew...
In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check before put_user().
Scope: local
bookworm:
debian
CVE-2025-40343UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40343 CVE-2025-40343: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: a...
In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: avoid scheduling association deletion twice When forcefully shutting down a port via the configfs interface, nvmet_port_subsys_drop_link() first calls nvmet_port_del_ctrls() and then nvmet_disable_port(). Both functions will eventually schedule all remaining associations for deletion. The current i
debian
CVE-2025-39987UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39987 CVE-2025-39987: linux - In the Linux kernel, the following vulnerability has been resolved: can: hi311x...
In the Linux kernel, the following vulnerability has been resolved: can: hi311x: populate ndo_change_mtu() to prevent buffer overflow Sending an PF_PACKET allows to bypass the CAN framework logic and to directly reach the xmit() function of a CAN driver. The only check which is performed by the PF_PACKET framework is to make sure that skb->len fits the interface's MTU. Unfor
debian
CVE-2025-40283UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40283 CVE-2025-40283: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF There is a KASAN: slab-use-after-free read in btusb_disconnect(). Calling "usb_driver_release_interface(&btusb_driver, data->intf)" will free the btusb data associated with the interface. The same data is then used later in the function, henc
debian
CVE-2025-68241UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68241 CVE-2025-68241: linux - In the Linux kernel, the following vulnerability has been resolved: ipv4: route...
In the Linux kernel, the following vulnerability has been resolved: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe The sit driver's packet transmission path calls: sit_tunnel_xmit() -> update_or_create_fnhe(), which lead to fnhe_remove_oldest() being called to delete entries exceeding FNHE_RECLAIM_DEPTH+random. The race window is between fnhe_remove_oldes
debian
CVE-2025-68808UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68808 CVE-2025-68808: linux - In the Linux kernel, the following vulnerability has been resolved: media: vidt...
In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local pointers upon transfer of memory ownership vidtv_channel_si_init() creates a temporary list (program, service, event) and ownership of the memory itself is transferred to the PAT/SDT/EIT tables through vidtv_psi_pat_program_assign(), vidtv_psi_sdt_service_assign(), vidtv_psi_ei
debian
CVE-2025-68307UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68307 CVE-2025-68307: linux - In the Linux kernel, the following vulnerability has been resolved: can: gs_usb...
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs The driver lacks the cleanup of failed transfers of URBs. This reduces the number of available URBs per error by 1. This leads to reduced performance and ultimately to a complete stop of the transmission. If the sending of a bulk UR
debian
CVE-2025-68258UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68258 CVE-2025-68258: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: mul...
In the Linux kernel, the following vulnerability has been resolved: comedi: multiq3: sanitize config options in multiq3_attach() Syzbot identified an issue [1] in multiq3_attach() that induces a task timeout due to open() or COMEDI_DEVCONFIG ioctl operations, specifically, in the case of multiq3 driver. This problem arose when syzkaller managed to craft weird configuration o
debian
CVE-2025-40088UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40088 CVE-2025-40088: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi...
In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() The hfsplus_strcasecmp() logic can trigger the issue: [ 117.317703][ T9855] ================================================================== [ 117.318353][ T9855] BUG: KASAN: slab-out-of-bounds in hfsplus_strcasecmp+0x1bc/0x490 [ 117.318991][ T98
debian
CVE-2025-68312UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68312 CVE-2025-68312: linux - In the Linux kernel, the following vulnerability has been resolved: usbnet: Pre...
In the Linux kernel, the following vulnerability has been resolved: usbnet: Prevents free active kevent The root cause of this issue are: 1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0); put the kevent work in global workqueue. However, the kevent has not yet been scheduled when the usbnet device is unregistered. Therefore, executing free_netdev()
debian
CVE-2025-68302UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68302 CVE-2025-68302: linux - In the Linux kernel, the following vulnerability has been resolved: net: sxgbe:...
In the Linux kernel, the following vulnerability has been resolved: net: sxgbe: fix potential NULL dereference in sxgbe_rx() Currently, when skb is null, the driver prints an error and then dereferences skb on the next line. To fix this, let's add a 'break' after the error message to switch to sxgbe_rx_refill(), which is similar to the approach taken by the other drivers in
debian
CVE-2025-68283UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68283 CVE-2025-68283: linux - In the Linux kernel, the following vulnerability has been resolved: libceph: re...
In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from untrusted network packets. Boundary checks are added to validate these against map->max_osd. [ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic edits ]
Scope: local
bookworm: resolved (fixed in 6.1.159-1)
bul
debian