Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 59 of 132
CVE-2025-68769UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68769 CVE-2025-68769: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix r... In the Linux kernel, the following vulnerability has been resolved: f2fs: fix return value of f2fs_recover_fsync_data() With below scripts, it will trigger panic in f2fs: mkfs.f2fs -f /dev/vdd mount /dev/vdd /mnt/f2fs touch /mnt/f2fs/foo sync echo 111 >> /mnt/f2fs/foo f2fs_io fsync /mnt/f2fs/foo f2fs_io shutdown 2 /mnt/f2fs umount /mnt/f2fs mount -o ro,norecovery /dev/vdd /m
debian
CVE-2025-68254UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68254 CVE-2025-68254: linux - In the Linux kernel, the following vulnerability has been resolved: staging: rt... In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing The Extended Supported Rates (ESR) IE handling in OnBeacon accessed *(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these offsets lie within the received frame buffer. A malformed beacon with an ESR IE positioned at the end of
debian
CVE-2025-40211UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40211 CVE-2025-40211: linux - In the Linux kernel, the following vulnerability has been resolved: ACPI: video... In the Linux kernel, the following vulnerability has been resolved: ACPI: video: Fix use-after-free in acpi_video_switch_brightness() The switch_brightness_work delayed work accesses device->brightness and device->backlight, freed by acpi_video_dev_unregister_backlight() during device removal. If the work executes after acpi_video_bus_unregister_backlight() frees these resou
debian
CVE-2025-71066UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71066 CVE-2025-71066: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ... In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change [email protected] says: The vulnerability is a race condition between `ets_qdisc_dequeue` and `ets_qdisc_change`. It leads to UAF on `struct Qdisc` object. Attacker requires the capability to create new user
debian
CVE-2025-40262UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40262 CVE-2025-40262: linux - In the Linux kernel, the following vulnerability has been resolved: Input: imx_... In the Linux kernel, the following vulnerability has been resolved: Input: imx_sc_key - fix memory corruption on unload This is supposed to be "priv" but we accidentally pass "&priv" which is an address in the stack and so it will lead to memory corruption when the imx_sc_key_action() function is called. Remove the &. Scope: local bookworm: resolved (fixed in 6.1.159-1) bull
debian
CVE-2025-68238UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68238 CVE-2025-68238: linux - In the Linux kernel, the following vulnerability has been resolved: mtd: rawnan... In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: cadence: fix DMA device NULL pointer dereference The DMA device pointer `dma_dev` was being dereferenced before ensuring that `cdns_ctrl->dmac` is properly initialized. Move the assignment of `dma_dev` after successfully acquiring the DMA channel to ensure the pointer is valid before use. Scope
debian
CVE-2025-40022UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40022 CVE-2025-40022: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: af_... In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix incorrect boolean values in af_alg_ctx Commit 1b34cbbf4f01 ("crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg") changed some fields from bool to 1-bit bitfields of type u32. However, some assignments to these fields, specifically 'more' and 'merge', assign values greater tha
debian
CVE-2025-40053UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40053 CVE-2025-40053: linux - In the Linux kernel, the following vulnerability has been resolved: net: dlink:... In the Linux kernel, the following vulnerability has been resolved: net: dlink: handle copy_thresh allocation failure The driver did not handle failure of `netdev_alloc_skb_ip_align()`. If the allocation failed, dereferencing `skb->protocol` could lead to a NULL pointer dereference. This patch tries to allocate `skb`. If the allocation fails, it falls back to the normal path
debian
CVE-2025-40085UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40085 CVE-2025-40085: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a... In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card In try_to_register_card(), the return value of usb_ifnum_to_if() is passed directly to usb_interface_claimed() without a NULL check, which will lead to a NULL pointer dereference when creating an invalid USB audio device. Fix this by adding
debian
CVE-2025-39995UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39995 CVE-2025-39995: linux - In the Linux kernel, the following vulnerability has been resolved: media: i2c:... In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe The state->timer is a cyclic timer that schedules work_i2c_poll and delayed_work_enable_hotplug, while rearming itself. Using timer_delete() fails to guarantee the timer isn't still running when destroyed, similarly cancel_delayed_
debian
CVE-2025-40187UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40187 CVE-2025-40187: linux - In the Linux kernel, the following vulnerability has been resolved: net/sctp: f... In the Linux kernel, the following vulnerability has been resolved: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() If new_asoc->peer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0 and sctp_ulpevent_make_authkey() returns 0, then the variable ai_ev remains zero and the zero will be dereferenced in the sctp_ulpevent_free() function. Scope: local b
debian
CVE-2025-68245UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68245 CVE-2025-68245: linux - In the Linux kernel, the following vulnerability has been resolved: net: netpol... In the Linux kernel, the following vulnerability has been resolved: net: netpoll: fix incorrect refcount handling causing incorrect cleanup commit efa95b01da18 ("netpoll: fix use after free") incorrectly ignored the refcount and prematurely set dev->npinfo to NULL during netpoll cleanup, leading to improper behavior and memory leaks. Scenario causing lack of proper cleanup:
debian
CVE-2025-68171UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68171 CVE-2025-68171: linux - In the Linux kernel, the following vulnerability has been resolved: x86/fpu: En... In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Ensure XFD state on signal delivery Sean reported [1] the following splat when running KVM tests: WARNING: CPU: 232 PID: 15391 at xfd_validate_state+0x65/0x70 Call Trace: fpu__clear_user_states+0x9c/0x100 arch_do_signal_or_restart+0x142/0x210 exit_to_user_mode_loop+0x55/0x100 do_syscall_64+0x205/0x2
debian
CVE-2025-40323UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40323 CVE-2025-40323: linux - In the Linux kernel, the following vulnerability has been resolved: fbcon: Set ... In the Linux kernel, the following vulnerability has been resolved: fbcon: Set fb_display[i]->mode to NULL when the mode is released Recently, we discovered the following issue through syzkaller: BUG: KASAN: slab-use-after-free in fb_mode_is_equal+0x285/0x2f0 Read of size 4 at addr ff11000001b3c69c by task syz.xxx ... Call Trace: dump_stack_lvl+0xab/0xe0 print_address_descri
debian
CVE-2025-68804UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68804 CVE-2025-68804: linux - In the Linux kernel, the following vulnerability has been resolved: platform/ch... In the Linux kernel, the following vulnerability has been resolved: platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver After unbinding the driver, another kthread `cros_ec_console_log_work` is still accessing the device, resulting an UAF and crash. The driver doesn't unregister the EC device in .remove() which should shutdown sub-devices synchronously. Fix it. Sc
debian
CVE-2025-39971UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39971 CVE-2025-39971: linux - In the Linux kernel, the following vulnerability has been resolved: i40e: fix i... In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in config queues msg Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_vc_config_queues_msg(). Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: resolved (fixed in 5.10.247-1) forky: resolved (fixed in 6.16.10-1) sid: resolved (
debian
CVE-2025-40282UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40282 CVE-2025-40282: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: 6lowpan: reset link-local header on ipv6 recv path Bluetooth 6lowpan.c netdev has header_ops, so it must set link-local header for RX skb, otherwise things crash, eg. with AF_PACKET SOCK_RAW Add missing skb_reset_mac_header() for uncompressed ipv6 RX path. For the compressed one, it is done in low
debian
CVE-2025-68259UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68259 CVE-2025-68259: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: D... In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn instruction, discard the exception and retry the instruction if the code stream is changed (e.g. by a different vCPU) between when the CPU executes the instruction and w
debian
CVE-2025-40027UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40027 CVE-2025-40027: linux - In the Linux kernel, the following vulnerability has been resolved: net/9p: fix... In the Linux kernel, the following vulnerability has been resolved: net/9p: fix double req put in p9_fd_cancelled Syzkaller reports a KASAN issue as below: general protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f] CPU: 0 PID: 5083 Comm: sy
debian
CVE-2025-40173UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40173 CVE-2025-40173: linux - In the Linux kernel, the following vulnerability has been resolved: net/ip6_tun... In the Linux kernel, the following vulnerability has been resolved: net/ip6_tunnel: Prevent perpetual tunnel growth Similarly to ipv4 tunnel, ipv6 version updates dev->needed_headroom, too. While ipv4 tunnel headroom adjustment growth was limited in commit 5ae1e9922bbd ("net: ip_tunnel: prevent perpetual headroom growth"), ipv6 tunnel yet increases the headroom without any c
debian