Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 60 of 132
CVE-2025-40153UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40153 CVE-2025-40153: linux - In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb...
In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: avoid soft lockup when mprotect to large memory area When calling mprotect() to a large hugetlb memory area in our customer's workload (~300GB hugetlb memory), soft lockup was observed: watchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916] CPU: 98 PID: 126916 Comm: t2_new_sysv
debian
CVE-2025-40006UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40006 CVE-2025-40006: linux - In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb:...
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix folio is still mapped when deleted Migration may be raced with fallocating hole. remove_inode_single_folio will unmap the folio if the folio is still mapped. However, it's called without folio lock. If the folio is migrated and the mapped pte has been converted to migration entry, folio_mappe
debian
CVE-2025-68796UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68796 CVE-2025-68796: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t...
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid updating zero-sized extent in extent cache As syzbot reported: F2FS-fs (loop0): __update_extent_tree_range: extent len is zero, type: 0, extent [0, 0, 0], age [0, 0] ------------[ cut here ]------------ kernel BUG at fs/f2fs/extent_cache.c:678! Oops: invalid opcode: 0000 [#1] SMP KASAN NOP
debian
CVE-2025-40001UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40001 CVE-2025-40001: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: mvsas...
In the Linux kernel, the following vulnerability has been resolved: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue During the detaching of Marvell's SAS/SATA controller, the original code calls cancel_delayed_work() in mvs_free() to cancel the delayed work item mwq->work_q. However, if mwq->work_q is already running, the cancel_delayed_work() may fail to cancel it. T
debian
CVE-2025-68740UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68740 CVE-2025-68740: linux - In the Linux kernel, the following vulnerability has been resolved: ima: Handle...
In the Linux kernel, the following vulnerability has been resolved: ima: Handle error code returned by ima_filter_rule_match() In ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to the rule being NULL, the function incorrectly skips the 'if (!rc)' check and sets 'result = true'. The LSM rule is considered a match, causing extra files to be measured by IMA.
debian
CVE-2025-40202UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40202 CVE-2025-40202: linux - In the Linux kernel, the following vulnerability has been resolved: ipmi: Rewor...
In the Linux kernel, the following vulnerability has been resolved: ipmi: Rework user message limit handling The limit on the number of user messages had a number of issues, improper counting in some cases and a use after free. Restructure how this is all done to handle more in the receive message allocation routine, so all refcouting and user message limit counts are done i
debian
CVE-2025-40285UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40285 CVE-2025-40285: linux - In the Linux kernel, the following vulnerability has been resolved: smb/server:...
In the Linux kernel, the following vulnerability has been resolved: smb/server: fix possible refcount leak in smb2_sess_setup() Reference count of ksmbd_session will leak when session need reconnect. Fix this by adding the missing ksmbd_user_session_put().
Scope: local
bookworm: resolved (fixed in 6.1.159-1)
bullseye: resolved
forky: resolved (fixed in 6.17.9-1)
sid: resolve
debian
CVE-2025-40115UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40115 CVE-2025-40115: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3s...
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() During mpt3sas_transport_port_remove(), messages were logged with dev_printk() against &mpt3sas_port->port->dev. At this point the SAS transport device may already be partially unregistered or freed, leading to a crash when accessing its s
debian
CVE-2025-68783UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68783 CVE-2025-68783: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-m...
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: validate meter packet indices get_meter_levels_from_urb() parses the 64-byte meter packets sent by the device and fills the per-channel arrays meter_level[], comp_level[] and master_level[] in struct snd_us16x08_meter_store. Currently the function derives the channel index directly
debian
CVE-2025-40032UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40032 CVE-2025-40032: linux - In the Linux kernel, the following vulnerability has been resolved: PCI: endpoi...
In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release The fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be NULL even after EPF initialization. Then it is prudent to check that they have non-NULL values before releasing the channels. Add the checks in pci_epf_test_cle
debian
CVE-2025-68814UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68814 CVE-2025-68814: linux - In the Linux kernel, the following vulnerability has been resolved: io_uring: f...
In the Linux kernel, the following vulnerability has been resolved: io_uring: fix filename leak in __io_openat_prep() __io_openat_prep() allocates a struct filename using getname(). However, for the condition of the file being installed in the fixed file table as well as having O_CLOEXEC flag set, the function returns early. At that point, the request doesn't have REQ_F_NEED
debian
CVE-2025-68727UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68727 CVE-2025-68727: linux - In the Linux kernel, the following vulnerability has been resolved: ntfs3: Fix ...
In the Linux kernel, the following vulnerability has been resolved: ntfs3: Fix uninit buffer allocated by __getname() Fix uninit errors caused after buffer allocation given to 'de'; by initializing the buffer with zeroes. The fix was found by using KMSAN.
Scope: local
bookworm: resolved (fixed in 6.1.162-1)
bullseye: resolved
forky: resolved (fixed in 6.17.13-1)
sid: resolve
debian
CVE-2025-68328UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68328 CVE-2025-68328: linux - In the Linux kernel, the following vulnerability has been resolved: firmware: s...
In the Linux kernel, the following vulnerability has been resolved: firmware: stratix10-svc: fix bug in saving controller data Fix the incorrect usage of platform_set_drvdata and dev_set_drvdata. They both are of the same data and overrides each other. This resulted in the rmmod of the svc driver to fail and throw a kernel panic for kthread_stop and fifo free.
Scope: local
b
debian
CVE-2025-40018UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40018 CVE-2025-40018: linux - In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer...
In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer ip_vs_ftp unregister during netns cleanup On the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp before connections with valid cp->app pointers are flushed, leading to a use-after-free. Fix this by introducing a global `exiting_module` flag, set to true in ip_vs_ftp_exit() before
debian
CVE-2025-68227UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68227 CVE-2025-68227: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: Fix ...
In the Linux kernel, the following vulnerability has been resolved: mptcp: Fix proto fallback detection with BPF The sockmap feature allows bpf syscall from userspace, or based on bpf sockops, replacing the sk_prot of sockets during protocol stack processing with sockmap's custom read/write interfaces. ''' tcp_rcv_state_process() syn_recv_sock()/subflow_syn_recv_sock() tcp_i
debian
CVE-2025-68325UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68325 CVE-2025-68325: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop In cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen and backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes that the parent qdisc will enqueue the current packet. However, this assumption breaks when cake_enqueu
debian
CVE-2025-68371UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68371 CVE-2025-68371: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: smart...
In the Linux kernel, the following vulnerability has been resolved: scsi: smartpqi: Fix device resources accessed after device removal Correct possible race conditions during device removal. Previously, a scheduled work item to reset a LUN could still execute after the device was removed, leading to use-after-free and other resource access issues. This race condition occurs
debian
CVE-2025-40140UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40140 CVE-2025-40140: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: R...
In the Linux kernel, the following vulnerability has been resolved: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast syzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb. This is the sequence of events that leads to the warning: rtl8150_start_xmit() { netif_stop_queue(); usb_submit_urb(dev->tx_urb); } rtl8150_set_multicast() { netif_stop_queue();
debian
CVE-2025-68204UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68204 CVE-2025-68204: linux - In the Linux kernel, the following vulnerability has been resolved: pmdomain: a...
In the Linux kernel, the following vulnerability has been resolved: pmdomain: arm: scmi: Fix genpd leak on provider registration failure If of_genpd_add_provider_onecell() fails during probe, the previously created generic power domains are not removed, leading to a memory leak and potential kernel crash later in genpd_debug_add(). Add proper error handling to unwind the ini
debian
CVE-2025-40201UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40201 CVE-2025-40201: linux - In the Linux kernel, the following vulnerability has been resolved: kernel/sys....
In the Linux kernel, the following vulnerability has been resolved: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths The usage of task_lock(tsk->group_leader) in sys_prlimit64()->do_prlimit() path is very broken. sys_prlimit64() does get_task_struct(tsk) but this only protects task_struct itself. If tsk != current and tsk is not a lea
debian