Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 62 of 132
CVE-2025-68772UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68772 CVE-2025-68772: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t... In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid updating compression context during writeback Bai, Shuangpeng reported a bug as below: Oops: divide error: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 11441 Comm: syz.0.46 Not tainted 6.17.0 #1 PREEMPT(full) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 RIP
debian
CVE-2025-40087UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40087 CVE-2025-40087: linux - In the Linux kernel, the following vulnerability has been resolved: NFSD: Defin... In the Linux kernel, the following vulnerability has been resolved: NFSD: Define a proc_layoutcommit for the FlexFiles layout type Avoid a crash if a pNFS client should happen to send a LAYOUTCOMMIT operation on a FlexFiles layout. Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: resolved (fixed in 5.10.247-1) forky: resolved (fixed in 6.17.6-1) sid: resolved (
debian
CVE-2025-40319UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40319 CVE-2025-40319: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Sync p... In the Linux kernel, the following vulnerability has been resolved: bpf: Sync pending IRQ work before freeing ring buffer Fix a race where irq_work can be queued in bpf_ringbuf_commit() but the ring buffer is freed before the work executes. In the syzbot reproducer, a BPF program attached to sched_switch triggers bpf_ringbuf_commit(), queuing an irq_work. If the ring buffer
debian
CVE-2025-68301UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68301 CVE-2025-68301: linux - In the Linux kernel, the following vulnerability has been resolved: net: atlant... In the Linux kernel, the following vulnerability has been resolved: net: atlantic: fix fragment overflow handling in RX path The atlantic driver can receive packets with more than MAX_SKB_FRAGS (17) fragments when handling large multi-descriptor packets. This causes an out-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic. The issue occurs because the drive
debian
CVE-2025-68291UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68291 CVE-2025-68291: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: Init... In the Linux kernel, the following vulnerability has been resolved: mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose(). syzbot reported divide-by-zero in __tcp_select_window() by MPTCP socket. [0] We had a similar issue for the bare TCP and fixed in commit 499350a5a6e7 ("tcp: initialize rcv_mss to TCP_MIN_MSS instead of 0"). Let's apply
debian
CVE-2025-40125UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40125 CVE-2025-40125: linux - In the Linux kernel, the following vulnerability has been resolved: blk-mq: che... In the Linux kernel, the following vulnerability has been resolved: blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx In __blk_mq_update_nr_hw_queues() the return value of blk_mq_sysfs_register_hctxs() is not checked. If sysfs creation for hctx fails, later changing the number of hw_queues or removing disk will trigger the following warning: kern
debian
CVE-2025-68321UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68321 CVE-2025-68321: linux - In the Linux kernel, the following vulnerability has been resolved: page_pool: ... In the Linux kernel, the following vulnerability has been resolved: page_pool: always add GFP_NOWARN for ATOMIC allocations Driver authors often forget to add GFP_NOWARN for page allocation from the datapath. This is annoying to users as OOMs are a fact of life, and we pretty much expect network Rx to hit page allocation failures during OOM. Make page pool add GFP_NOWARN for
debian
CVE-2025-68266UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68266 CVE-2025-68266: linux - In the Linux kernel, the following vulnerability has been resolved: bfs: Recons... In the Linux kernel, the following vulnerability has been resolved: bfs: Reconstruct file type when loading from disk syzbot is reporting that S_IFMT bits of inode->i_mode can become bogus when the S_IFMT bits of the 32bits "mode" field loaded from disk are corrupted or when the 32bits "attributes" field loaded from disk are corrupted. A documentation says that BFS uses only
debian
CVE-2025-68185UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68185 CVE-2025-68185: linux - In the Linux kernel, the following vulnerability has been resolved: nfs4_setup_... In the Linux kernel, the following vulnerability has been resolved: nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing Theoretically it's an oopsable race, but I don't believe one can manage to hit it on real hardware; might become doable on a KVM, but it still won't be easy to attack. Anyway, it's easy to deal with - since xdr_encode_hyper() is
debian
CVE-2025-40123UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40123 CVE-2025-40123: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Enforc... In the Linux kernel, the following vulnerability has been resolved: bpf: Enforce expected_attach_type for tailcall compatibility Yinhao et al. recently reported: Our fuzzer tool discovered an uninitialized pointer issue in the bpf_prog_test_run_xdp() function within the Linux kernel's BPF subsystem. This leads to a NULL pointer dereference when a BPF program attempts to defe
debian
CVE-2025-68746UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68746 CVE-2025-68746: linux - In the Linux kernel, the following vulnerability has been resolved: spi: tegra2... In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Fix timeout handling When the CPU that the QSPI interrupt handler runs on (typically CPU 0) is excessively busy, it can lead to rare cases of the IRQ thread not running before the transfer timeout is reached. While handling the timeouts, any pending transfers are cleaned up and the messag
debian
CVE-2025-40107UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40107 CVE-2025-40107: linux - In the Linux kernel, the following vulnerability has been resolved: can: hi311x... In the Linux kernel, the following vulnerability has been resolved: can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled This issue is similar to the vulnerability in the `mcp251x` driver, which was fixed in commit 03c427147b2d ("can: mcp251x: fix resume from sleep before interface was brought up"). In the `hi311x` driver, when the
debian
CVE-2025-39969UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39969 CVE-2025-39969: linux - In the Linux kernel, the following vulnerability has been resolved: i40e: fix v... In the Linux kernel, the following vulnerability has been resolved: i40e: fix validation of VF state in get resources VF state I40E_VF_STATE_ACTIVE is not the only state in which VF is actually active so it should not be used to determine if a VF is allowed to obtain resources. Use I40E_VF_STATE_RESOURCES_LOADED that is set only in i40e_vc_get_vf_resources_msg() and cleared
debian
CVE-2025-68803UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68803 CVE-2025-68803: linux - In the Linux kernel, the following vulnerability has been resolved: NFSD: NFSv4... In the Linux kernel, the following vulnerability has been resolved: NFSD: NFSv4 file creation neglects setting ACL An NFSv4 client that sets an ACL with a named principal during file creation retrieves the ACL afterwards, and finds that it is only a default ACL (based on the mode bits) and not the ACL that was requested during file creation. This violates RFC 8881 section 6.
debian
CVE-2025-68344UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68344 CVE-2025-68344: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: wavef... In the Linux kernel, the following vulnerability has been resolved: ALSA: wavefront: Fix integer overflow in sample size validation The wavefront_send_sample() function has an integer overflow issue when validating sample size. The header->size field is u32 but gets cast to int for comparison with dev->freemem Fix by using unsigned comparison to avoid integer overflow. Scope
debian
CVE-2025-68362UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68362 CVE-2025-68362: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtl81... In the Linux kernel, the following vulnerability has been resolved: wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() The rtl8187_rx_cb() calculates the rx descriptor header address by subtracting its size from the skb tail pointer. However, it does not validate if the received packet (skb->len from urb->actual_length) is large enough to contain this
debian
CVE-2025-40042UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40042 CVE-2025-40042: linux - In the Linux kernel, the following vulnerability has been resolved: tracing: Fi... In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference There is a critical race condition in kprobe initialization that can lead to NULL pointer dereference and kernel crash. [1135630.084782] Unable to handle kernel paging request at virtual address 0000710a04630000 ... [113563
debian
CVE-2025-40254UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40254 CVE-2025-40254: linux - In the Linux kernel, the following vulnerability has been resolved: net: openvs... In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The validation of the set(nsh(...)) action is completely wrong. It runs through the nsh_key_put_from_nlattr() function that is the same function that validates NSH keys for the flow match and the push_nsh() action. However, the set(nsh(...
debian
CVE-2025-68177UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68177 CVE-2025-68177: linux - In the Linux kernel, the following vulnerability has been resolved: cpufreq/lon... In the Linux kernel, the following vulnerability has been resolved: cpufreq/longhaul: handle NULL policy in longhaul_exit longhaul_exit() was calling cpufreq_cpu_get(0) without checking for a NULL policy pointer. On some systems, this could lead to a NULL dereference and a kernel warning or panic. This patch adds a check using unlikely() and returns early if the policy is NU
debian
CVE-2025-68256UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68256 CVE-2025-68256: linux - In the Linux kernel, the following vulnerability has been resolved: staging: rt... In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser The Information Element (IE) parser rtw_get_ie() trusted the length byte of each IE without validating that the IE body (len bytes after the 2-byte header) fits inside the remaining frame buffer. A malformed frame can advertise an IE length la
debian