Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 61 of 132
CVE-2025-40259UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40259 CVE-2025-40259: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: sg: D...
In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.
Scope: local
bookworm: resolved (fixed in 6.1.159-1)
bullseye: resolved (fixed in 5.10.247-1)
forky: resolved (fi
debian
CVE-2025-40308UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40308 CVE-2025-40308: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: bcsp: receive data only if registered Currently, bcsp_recv() can be called even when the BCSP protocol has not been registered. This leads to a NULL pointer dereference, as shown in the following stack trace: KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f] RIP: 0010:bcsp_rec
debian
CVE-2025-39973UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39973 CVE-2025-39973: linux - In the Linux kernel, the following vulnerability has been resolved: i40e: add v...
In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validation. To address this, introduce an upper boundary check for both Tx and Rx queue lengths. The maximum number of descriptors suppo
debian
CVE-2025-40186UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40186 CVE-2025-40186: linux - In the Linux kernel, the following vulnerability has been resolved: tcp: Don't ...
In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(), which calls tcp_dis
debian
CVE-2025-68363UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68363 CVE-2025-68363: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Check ...
In the Linux kernel, the following vulnerability has been resolved: bpf: Check skb->transport_header is set in bpf_skb_check_mtu The bpf_skb_check_mtu helper needs to use skb->transport_header when the BPF_MTU_CHK_SEGS flag is used: bpf_skb_check_mtu(skb, ifindex, &mtu_len, 0, BPF_MTU_CHK_SEGS) The transport_header is not always set. There is a WARN_ON_ONCE report when CONFI
debian
CVE-2025-68244UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68244 CVE-2025-68244: linux - In the Linux kernel, the following vulnerability has been resolved: drm/i915: A...
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD On completion of i915_vma_pin_ww(), a synchronous variant of dma_fence_work_commit() is called. When pinning a VMA to GGTT address space on a Cherry View family processor, or on a Broxton generation SoC with VTD enabled, i.e., when stop_machi
debian
CVE-2025-71194UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71194 CVE-2025-71194: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ...
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type When wait_current_trans() is called during start_transaction(), it currently waits for a blocked transaction without considering whether the given transaction type actually needs to wait for that particular transaction state. The btr
debian
CVE-2025-40309UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40309 CVE-2025-40309: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_conn_free BUG: KASAN: slab-use-after-free in sco_conn_free net/bluetooth/sco.c:87 [inline] BUG: KASAN: slab-use-after-free in kref_put include/linux/kref.h:65 [inline] BUG: KASAN: slab-use-after-free in sco_conn_put+0xdd/0x410 net/bluetooth/sco.c:107 Write of size 8 at addr fff
debian
CVE-2025-40204UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40204 CVE-2025-40204: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: Fix M...
In the Linux kernel, the following vulnerability has been resolved: sctp: Fix MAC comparison to be constant-time To prevent timing attacks, MACs need to be compared in constant time. Use the appropriate helper function for this.
Scope: local
bookworm: resolved (fixed in 6.1.158-1)
bullseye: resolved (fixed in 5.10.247-1)
forky: resolved (fixed in 6.17.6-1)
sid: resolved (fix
debian
CVE-2025-68369UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68369 CVE-2025-68369: linux - In the Linux kernel, the following vulnerability has been resolved: ntfs3: init...
In the Linux kernel, the following vulnerability has been resolved: ntfs3: init run lock for extend inode After setting the inode mode of $Extend to a regular file, executing the truncate system call will enter the do_truncate() routine, causing the run_lock uninitialized error reported by syzbot. Prior to patch 4e8011ffec79, if the inode mode of $Extend was not set to a reg
debian
CVE-2025-40297UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40297 CVE-2025-40297: linux - In the Linux kernel, the following vulnerability has been resolved: net: bridge...
In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix use-after-free due to MST port state bypass syzbot reported[1] a use-after-free when deleting an expired fdb. It is due to a race condition between learning still happening and a port being deleted, after all its fdbs have been flushed. The port's state has been toggled to disabled so no lea
debian
CVE-2025-40315UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40315 CVE-2025-40315: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget...
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix epfile null pointer access after ep enable. A race condition occurs when ffs_func_eps_enable() runs concurrently with ffs_data_reset(). The ffs_data_clear() called in ffs_data_reset() sets ffs->epfiles to NULL before resetting ffs->eps_count to 0, leading to a NULL pointer dereference
debian
CVE-2025-40269UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40269 CVE-2025-40269: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a...
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential overflow of PCM transfer buffer The PCM stream data in USB-audio driver is transferred over USB URB packet buffers, and each packet size is determined dynamically. The packet sizes are limited by some factors such as wMaxPacketSize USB descriptor. OTOH, in the current code, the
debian
CVE-2025-68787UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68787 CVE-2025-68787: linux - In the Linux kernel, the following vulnerability has been resolved: netrom: Fix...
In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_sendmsg() syzbot reported a memory leak [1]. When function sock_alloc_send_skb() return NULL in nr_output(), the original skb is not freed, which was allocated in nr_sendmsg(). Fix this by freeing it before return. [1] BUG: memory leak unreferenced object 0xffff888129f35500 (siz
debian
CVE-2025-40345UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40345 CVE-2025-40345: linux - In the Linux kernel, the following vulnerability has been resolved: usb: storag...
In the Linux kernel, the following vulnerability has been resolved: usb: storage: sddr55: Reject out-of-bound new_pba Discovered by Atuin - Automated Vulnerability Discovery Engine. new_pba comes from the status packet returned after each write. A bogus device could report values beyond the block count derived from info->capacity, letting the driver walk off the end of pba_t
debian
CVE-2025-40252UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40252 CVE-2025-40252: linux - In the Linux kernel, the following vulnerability has been resolved: net: qlogic...
In the Linux kernel, the following vulnerability has been resolved: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate over 'cqe->len_list[]' using only a zero-length terminator as the stopping condition. If the terminator was missing or malformed, the loop could run past the e
debian
CVE-2025-40190UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40190 CVE-2025-40190: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: guard...
In the Linux kernel, the following vulnerability has been resolved: ext4: guard against EA inode refcount underflow in xattr update syzkaller found a path where ext4_xattr_inode_update_ref() reads an EA inode refcount that is already ref underflow: ref_count=-1 ref_change=-1 EXT4-fs warning: ea_inode dec ref err=-117 Make the invariant explicit: if the current refcount is no
debian
CVE-2025-40277UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40277 CVE-2025-40277: linux - In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx:...
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
Scope: local
bookworm: resolved (fixed in 6.1.159-1)
bullseye: resolved (fixed in 5.10.247-1)
debian
CVE-2025-71192UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71192 CVE-2025-71192: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97:...
In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: fix a double free in snd_ac97_controller_register() If ac97_add_adapter() fails, put_device() is the correct way to drop the device reference. kfree() is not required. Add kfree() if idr_alloc() fails and in ac97_adapter_release() to do the cleanup. Found by code review.
Scope: local
bookworm: re
debian
CVE-2025-68257UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68257 CVE-2025-68257: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: che...
In the Linux kernel, the following vulnerability has been resolved: comedi: check device's attached status in compat ioctls Syzbot identified an issue [1] that crashes kernel, seemingly due to unexistent callback dev->get_valid_routes(). By all means, this should not occur as said callback must always be set to get_zero_valid_routes() in __comedi_device_postconfig(). As the
debian