Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 63 of 132
CVE-2025-68819UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68819 CVE-2025-68819: linux - In the Linux kernel, the following vulnerability has been resolved: media: dvb-... In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() rlen value is a user-controlled value, but dtv5100_i2c_msg() does not check the size of the rlen value. Therefore, if it is set to a value larger than sizeof(st->data), an out-of-bounds vuln occurs for st->data. Therefore, we need to add proper
debian
CVE-2025-40019UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40019 CVE-2025-40019: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: ess... In the Linux kernel, the following vulnerability has been resolved: crypto: essiv - Check ssize for decryption and in-place encryption Move the ssize check to the start in essiv_aead_crypt so that it's also checked for decryption and in-place encryption. Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: resolved (fixed in 5.10.247-1) forky: resolved (fixed in 6.
debian
CVE-2025-40103UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40103 CVE-2025-40103: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client... In the Linux kernel, the following vulnerability has been resolved: smb: client: Fix refcount leak for cifs_sb_tlink Fix three refcount inconsistency issues related to `cifs_sb_tlink`. Comments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be called after successful calls to `cifs_sb_tlink()`. Three calls fail to update refcount accordingly, leading to possible
debian
CVE-2025-39980UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39980 CVE-2025-39980: linux - In the Linux kernel, the following vulnerability has been resolved: nexthop: Fo... In the Linux kernel, the following vulnerability has been resolved: nexthop: Forbid FDB status change while nexthop is in a group The kernel forbids the creation of non-FDB nexthop groups with FDB nexthops: # ip nexthop add id 1 via 192.0.2.1 fdb # ip nexthop add id 2 group 1 Error: Non FDB nexthop group cannot have fdb nexthops. And vice versa: # ip nexthop add id 3 via 192
debian
CVE-2025-39998UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39998 CVE-2025-39998: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: targe... In the Linux kernel, the following vulnerability has been resolved: scsi: target: target_core_configfs: Add length check to avoid buffer overflow A buffer overflow arises from the usage of snprintf to write into the buffer "buf" in target_lu_gp_members_show function located in /drivers/target/target_core_configfs.c. This buffer is allocated with size LU_GROUP_NAME_BUF (256 b
debian
CVE-2025-40279UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40279 CVE-2025-40279: linux - In the Linux kernel, the following vulnerability has been resolved: net: sched:... In the Linux kernel, the following vulnerability has been resolved: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak In tcf_connmark_dump(), the variable 'opt' was partially initialized using a designatied initializer. While the padding bytes are reamined uninitialized. nla_put() copies the entire structure into a netlink message, these uninitialized byt
debian
CVE-2025-68798UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68798 CVE-2025-68798: linux - In the Linux kernel, the following vulnerability has been resolved: perf/x86/am... In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: Check event before enable to avoid GPF On AMD machines cpuc->events[idx] can become NULL in a subtle race condition with NMI->throttle->x86_pmu_stop(). Check event for NULL in amd_pmu_enable_all() before enable to avoid a GPF. This appears to be an AMD only issue. Syzkaller reported a GPF in am
debian
CVE-2025-40020UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40020 CVE-2025-40020: linux - In the Linux kernel, the following vulnerability has been resolved: can: peak_u... In the Linux kernel, the following vulnerability has been resolved: can: peak_usb: fix shift-out-of-bounds issue Explicitly uses a 64-bit constant when the number of bits used for its shifting is 32 (which is the case for PC CAN FD interfaces supported by this driver). [mkl: update subject, apply manually] Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: resolv
debian
CVE-2025-40043UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40043 CVE-2025-40043: linux - In the Linux kernel, the following vulnerability has been resolved: net: nfc: n... In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Add parameter validation for packet data Syzbot reported an uninitialized value bug in nci_init_req, which was introduced by commit 5aca7966d2a7 ("Merge tag 'perf-tools-fixes-for-v6.17-2025-09-16' of git://git.kernel.org/pub/scm/linux/kernel/git/perf/perf-tools"). This bug arises due to very l
debian
CVE-2025-40214UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40214 CVE-2025-40214: linux - In the Linux kernel, the following vulnerability has been resolved: af_unix: In... In the Linux kernel, the following vulnerability has been resolved: af_unix: Initialise scc_index in unix_add_edge(). Quang Le reported that the AF_UNIX GC could garbage-collect a receive queue of an alive in-flight socket, with a nice repro. The repro consists of three stages. 1) 1-a. Create a single cyclic reference with many sockets 1-b. close() all sockets 1-c. Trigger G
debian
CVE-2025-40094UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40094 CVE-2025-40094: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget... In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_acm: Refactor bind path to use __free() After an bind/unbind cycle, the acm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handlin
debian
CVE-2025-40314UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40314 CVE-2025-40314: linux - In the Linux kernel, the following vulnerability has been resolved: usb: cdns3:... In the Linux kernel, the following vulnerability has been resolved: usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget In the __cdnsp_gadget_init() and cdnsp_gadget_exit() functions, the gadget structure (pdev->gadget) was freed before its endpoints. The endpoints are linked via the ep_list in the gadget structure. Freeing the gadget fir
debian
CVE-2025-40120UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40120 CVE-2025-40120: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: a... In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock Prevent USB runtime PM (autosuspend) for AX88772* in bind. usbnet enables runtime PM (autosuspend) by default, so disabling it via the usb_driver flag is ineffective. On AX88772B, autosuspend shows no measurable power saving with current driv
debian
CVE-2025-71197UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71197 CVE-2025-71197: linux - In the Linux kernel, the following vulnerability has been resolved: w1: therm: ... In the Linux kernel, the following vulnerability has been resolved: w1: therm: Fix off-by-one buffer overflow in alarms_store The sysfs buffer passed to alarms_store() is allocated with 'size + 1' bytes and a NUL terminator is appended. However, the 'size' argument does not account for this extra byte. The original code then allocated 'size' bytes and used strcpy() to copy '
debian
CVE-2025-68364UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68364 CVE-2025-68364: linux - In the Linux kernel, the following vulnerability has been resolved: ocfs2: rela... In the Linux kernel, the following vulnerability has been resolved: ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() In '__ocfs2_move_extent()', relax 'BUG()' to 'ocfs2_error()' just to avoid crashing the whole kernel due to a filesystem corruption. Scope: local bookworm: resolved (fixed in 6.1.162-1) bullseye: resolved (fixed in 5.10.249-1) forky: resolved (fixe
debian
CVE-2025-68758UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68758 CVE-2025-68758: linux - In the Linux kernel, the following vulnerability has been resolved: backlight: ... In the Linux kernel, the following vulnerability has been resolved: backlight: led-bl: Add devlink to supplier LEDs LED Backlight is a consumer of one or multiple LED class devices, but devlink is currently unable to create correct supplier-producer links when the supplier is a class device. It creates instead a link where the supplier is the parent of the expected device. O
debian
CVE-2025-40281UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40281 CVE-2025-40281: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: preve... In the Linux kernel, the following vulnerability has been resolved: sctp: prevent possible shift-out-of-bounds in sctp_transport_update_rto syzbot reported a possible shift-out-of-bounds [1] Blamed commit added rto_alpha_max and rto_beta_max set to 1000. It is unclear if some sctp users are setting very large rto_alpha and/or rto_beta. In order to prevent user regression, pe
debian
CVE-2025-40273UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40273 CVE-2025-40273: linux - In the Linux kernel, the following vulnerability has been resolved: NFSD: free ... In the Linux kernel, the following vulnerability has been resolved: NFSD: free copynotify stateid in nfs4_free_ol_stateid() Typically copynotify stateid is freed either when parent's stateid is being close/freed or in nfsd4_laundromat if the stateid hasn't been used in a lease period. However, in case when the server got an OPEN (which created a parent stateid), followed by
debian
CVE-2025-40321UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40321 CVE-2025-40321: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: brcmf... In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode Currently, whenever there is a need to transmit an Action frame, the brcmfmac driver always uses the P2P vif to send the "actframe" IOVAR to firmware. The P2P interfaces were available when wpa_supplicant is managing the wlan interfa
debian
CVE-2025-40008UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40008 CVE-2025-40008: linux - In the Linux kernel, the following vulnerability has been resolved: kmsan: fix ... In the Linux kernel, the following vulnerability has been resolved: kmsan: fix out-of-bounds access to shadow memory Running sha224_kunit on a KMSAN-enabled kernel results in a crash in kmsan_internal_set_shadow_origin(): BUG: unable to handle page fault for address: ffffbc3840291000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 18
debian