Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 57 of 132
CVE-2025-39982UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39982 CVE-2025-39982: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync This fixes the following UFA in hci_acl_create_conn_sync where a connection still pending is command submission (conn->state == BT_OPEN) maybe freed, also since this also can happen with the likes of hci_le_create_conn_sync fix it as well: BUG: KASAN:
debian
CVE-2025-40036UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40036 CVE-2025-40036: linux - In the Linux kernel, the following vulnerability has been resolved: misc: fastr... In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: fix possible map leak in fastrpc_put_args copy_to_user() failure would cause an early return without cleaning up the fdlist, which has been updated by the DSP. This could lead to map leak. Fix this by redirecting to a cleanup path on failure, ensuring that all mapped buffers are properly relea
debian
CVE-2025-68217UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68217 CVE-2025-68217: linux - In the Linux kernel, the following vulnerability has been resolved: Input: pega... In the Linux kernel, the following vulnerability has been resolved: Input: pegasus-notetaker - fix potential out-of-bounds access In the pegasus_notetaker driver, the pegasus_probe() function allocates the URB transfer buffer using the wMaxPacketSize value from the endpoint descriptor. An attacker can use a malicious USB descriptor to force the allocation of a very small buf
debian
CVE-2025-40271UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40271 CVE-2025-40271: linux - In the Linux kernel, the following vulnerability has been resolved: fs/proc: fi... In the Linux kernel, the following vulnerability has been resolved: fs/proc: fix uaf in proc_readdir_de() Pde is erased from subdir rbtree through rb_erase(), but not set the node to EMPTY, which may result in uaf access. We should use RB_CLEAR_NODE() set the erased node to EMPTY, then pde_subdir_next() will return NULL to avoid uaf access. We found an uaf issue while using
debian
CVE-2025-68821UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68821 CVE-2025-68821: linux - In the Linux kernel, the following vulnerability has been resolved: fuse: fix r... In the Linux kernel, the following vulnerability has been resolved: fuse: fix readahead reclaim deadlock Commit e26ee4efbc79 ("fuse: allocate ff->release_args only if release is needed") skips allocating ff->release_args if the server does not implement open. However in doing so, fuse_prepare_release() now skips grabbing the reference on the inode, which makes it possible fo
debian
CVE-2025-68264UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68264 CVE-2025-68264: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: refre... In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_size can become stale between the initial size check and when ext4_update_inline_data()/ext4_create_inline_data() use it. Although ext4_get_max_inline_size() reads the correct value at the time of the check, concurrent xattr opera
debian
CVE-2025-68347UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68347 CVE-2025-68347: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: firew... In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events The DSP event handling code in hwdep_read() could write more bytes to the user buffer than requested, when a user provides a buffer smaller than the event header size (8 bytes). Fix by using min_t() to clamp the copy size, This ensures we
debian
CVE-2025-68372UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68372 CVE-2025-68372: linux - In the Linux kernel, the following vulnerability has been resolved: nbd: defer ... In the Linux kernel, the following vulnerability has been resolved: nbd: defer config put in recv_work There is one uaf issue in recv_work when running NBD_CLEAR_SOCK and NBD_CMD_RECONFIGURE: nbd_genl_connect // conf_ref=2 (connect and recv_work A) nbd_open // conf_ref=3 recv_work A done // conf_ref=2 NBD_CLEAR_SOCK // conf_ref=1 nbd_genl_reconfigure // conf_ref=2 (trigger r
debian
CVE-2025-68255UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68255 CVE-2025-68255: linux - In the Linux kernel, the following vulnerability has been resolved: staging: rt... In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing The Supported Rates IE length from an incoming Association Request frame was used directly as the memcpy() length when copying into a fixed-size 16-byte stack buffer (supportRate). A malicious station can advertise an IE length larger tha
debian
CVE-2025-40156UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40156 CVE-2025-40156: linux - In the Linux kernel, the following vulnerability has been resolved: PM / devfre... In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid. Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: r
debian
CVE-2025-68330UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68330 CVE-2025-68330: linux - In the Linux kernel, the following vulnerability has been resolved: iio: accel:... In the Linux kernel, the following vulnerability has been resolved: iio: accel: bmc150: Fix irq assumption regression The code in bmc150-accel-core.c unconditionally calls bmc150_accel_set_interrupt() in the iio_buffer_setup_ops, such as on the runtime PM resume path giving a kernel splat like this if the device has no interrupts: Unable to handle kernel NULL pointer derefer
debian
CVE-2025-40112UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40112 CVE-2025-40112: linux - In the Linux kernel, the following vulnerability has been resolved: sparc: fix ... In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the curren
debian
CVE-2025-40194UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40194 CVE-2025-40194: linux - In the Linux kernel, the following vulnerability has been resolved: cpufreq: in... In the Linux kernel, the following vulnerability has been resolved: cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() The cpufreq_cpu_put() call in update_qos_request() takes place too early because the latter subsequently calls freq_qos_update_request() that indirectly accesses the policy object in question through the QoS request object passed to it
debian
CVE-2025-68366UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68366 CVE-2025-68366: linux - In the Linux kernel, the following vulnerability has been resolved: nbd: defer ... In the Linux kernel, the following vulnerability has been resolved: nbd: defer config unlock in nbd_genl_connect There is one use-after-free warning when running NBD_CMD_CONNECT and NBD_CLEAR_SOCK: nbd_genl_connect nbd_alloc_and_init_config // config_refs=1 nbd_start_device // config_refs=2 set NBD_RT_HAS_CONFIG_REF open nbd // config_refs=3 recv_work done // config_refs=2 N
debian
CVE-2025-40197UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40197 CVE-2025-40197: linux - In the Linux kernel, the following vulnerability has been resolved: media: mc: ... In the Linux kernel, the following vulnerability has been resolved: media: mc: Clear minor number before put device The device minor should not be cleared after the device is released. Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: resolved (fixed in 5.10.247-1) forky: resolved (fixed in 6.17.6-1) sid: resolved (fixed in 6.17.6-1) trixie: resolved (fixed in 6
debian
CVE-2025-68229UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68229 CVE-2025-68229: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: targe... In the Linux kernel, the following vulnerability has been resolved: scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() If the allocation of tl_hba->sh fails in tcm_loop_driver_probe() and we attempt to dereference it in tcm_loop_tpg_address_show() we will get a segfault, see below for an example. So, check tl_hba->sh before dereferencing it. Unable to alloca
debian
CVE-2025-40280UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40280 CVE-2025-40280: linux - In the Linux kernel, the following vulnerability has been resolved: tipc: Fix u... In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free in tipc_mon_reinit_self(). syzbot reported use-after-free of tipc_net(net)->monitors[] in tipc_mon_reinit_self(). [0] The array is protected by RTNL, but tipc_mon_reinit_self() iterates over it without RTNL. tipc_mon_reinit_self() is called from tipc_net_finalize(), which is always u
debian
CVE-2025-40171UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40171 CVE-2025-40171: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: m... In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than one async command to be in flight from __nvmet_fc_send_ls_req. For each command, a tgtport reference is taken. In the current code, only one put work item is queued at a time, which results in a leaked reference. To fix this, move
debian
CVE-2025-40062UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40062 CVE-2025-40062: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: his... In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs When the initialization of qm->debug.acc_diff_reg fails, the probe process does not exit. However, after qm->debug.qm_diff_regs is freed, it is not set to NULL. This can lead to a double free when the remove process attempts to free it again. Therefor
debian
CVE-2025-40306UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40306 CVE-2025-40306: linux - In the Linux kernel, the following vulnerability has been resolved: orangefs: f... In the Linux kernel, the following vulnerability has been resolved: orangefs: fix xattr related buffer overflow... Willy Tarreau forwarded me a message from Disclosure with the following warning: > The helper `xattr_key()` uses the pointer variable in the loop condition > rather than dereferencing it. As `key` is incremented, it remains non-NULL > (until it runs into unmappe
debian