Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 64 of 132
CVE-2025-40342UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40342 CVE-2025-40342: linux - In the Linux kernel, the following vulnerability has been resolved: nvme-fc: us... In the Linux kernel, the following vulnerability has been resolved: nvme-fc: use lock accessing port_state and rport state nvme_fc_unregister_remote removes the remote port on a lport object at any point in time when there is no active association. This races with with the reconnect logic, because nvme_fc_create_association is not taking a lock to check the port_state and at
debian
CVE-2025-40118UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40118 CVE-2025-40118: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: pm80x... In the Linux kernel, the following vulnerability has been resolved: scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod Since commit f7b705c238d1 ("scsi: pm80xx: Set phy_attached to zero when device is gone") UBSAN reports: UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17 index 28 is out of range for type 'pm8001_phy [16]' on rmmod when using a
debian
CVE-2025-68795UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68795 CVE-2025-68795: linux - In the Linux kernel, the following vulnerability has been resolved: ethtool: Av... In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command operates across three ioctl calls: ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and ETHTOOL_GSTATS for the values. If the number of stats changes between these calls (e.g., due to device reconfiguration), us
debian
CVE-2025-40360UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40360 CVE-2025-40360: linux - In the Linux kernel, the following vulnerability has been resolved: drm/sysfb: ... In the Linux kernel, the following vulnerability has been resolved: drm/sysfb: Do not dereference NULL pointer in plane reset The plane state in __drm_gem_reset_shadow_plane() can be NULL. Do not deref that pointer, but forward NULL to the other plane-reset helpers. Clears plane->state to NULL. v2: - fix typo in commit description (Javier) Scope: local bookworm: resolved (fi
debian
CVE-2025-68757UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68757 CVE-2025-68757: linux - In the Linux kernel, the following vulnerability has been resolved: drm/vgem-fe... In the Linux kernel, the following vulnerability has been resolved: drm/vgem-fence: Fix potential deadlock on release A timer that expires a vgem fence automatically in 10 seconds is now released with timer_delete_sync() from fence->ops.release() called on last dma_fence_put(). In some scenarios, it can run in IRQ context, which is not safe unless TIMER_IRQSAFE is used. One
debian
CVE-2025-40183UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40183 CVE-2025-40183: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix me... In the Linux kernel, the following vulnerability has been resolved: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} Cilium has a BPF egress gateway feature which forces outgoing K8s Pod traffic to pass through dedicated egress gateways which then SNAT the traffic in order to interact with stable IPs outside the cluster. The traffic is directed to the gateway via vxlan
debian
CVE-2025-68732UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68732 CVE-2025-68732: linux - In the Linux kernel, the following vulnerability has been resolved: gpu: host1x... In the Linux kernel, the following vulnerability has been resolved: gpu: host1x: Fix race in syncpt alloc/free Fix race condition between host1x_syncpt_alloc() and host1x_syncpt_put() by using kref_put_mutex() instead of kref_put() + manual mutex locking. This ensures no thread can acquire the syncpt_mutex after the refcount drops to zero but before syncpt_release acquires i
debian
CVE-2025-68777UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68777 CVE-2025-68777: linux - In the Linux kernel, the following vulnerability has been resolved: Input: ti_a... In the Linux kernel, the following vulnerability has been resolved: Input: ti_am335x_tsc - fix off-by-one error in wire_order validation The current validation 'wire_order[i] > ARRAY_SIZE(config_pins)' allows wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds access when used as index in 'config_pins[wire_order[i]]'. Since config_pins has 4 elements (
debian
CVE-2025-40176UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40176 CVE-2025-40176: linux - In the Linux kernel, the following vulnerability has been resolved: tls: wait f... In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decryption can lead to various issues (UAF on the skb, writing into
debian
CVE-2025-68774UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68774 CVE-2025-68774: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi... In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create When sync() and link() are called concurrently, both threads may enter hfs_bnode_find() without finding the node in the hash table and proceed to create it. Thread A: hfsplus_write_inode() -> hfsplus_write_system_inode() -> hfs_btree_write() -> hfs_b
debian
CVE-2025-40200UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40200 CVE-2025-40200: linux - In the Linux kernel, the following vulnerability has been resolved: Squashfs: r... In the Linux kernel, the following vulnerability has been resolved: Squashfs: reject negative file sizes in squashfs_read_inode() Syskaller reports a "WARNING in ovl_copy_up_file" in overlayfs. This warning is ultimately caused because the underlying Squashfs file system returns a file with a negative file size. This commit checks for a negative file size and returns EINVAL.
debian
CVE-2025-40288UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40288 CVE-2025-40288: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:... In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices Previously, APU platforms (and other scenarios with uninitialized VRAM managers) triggered a NULL pointer dereference in `ttm_resource_manager_usage()`. The root cause is not that the `struct ttm_resource_manager *man` pointer itself is N
debian
CVE-2025-68336UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68336 CVE-2025-68336: linux - In the Linux kernel, the following vulnerability has been resolved: locking/spi... In the Linux kernel, the following vulnerability has been resolved: locking/spinlock/debug: Fix data-race in do_raw_write_lock KCSAN reports: BUG: KCSAN: data-race in do_raw_write_lock / do_raw_write_lock write (marked) to 0xffff800009cf504c of 4 bytes by task 1102 on cpu 1: do_raw_write_lock+0x120/0x204 _raw_write_lock_irq do_exit call_usermodehelper_exec_async ret_from_for
debian
CVE-2025-68303UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68303 CVE-2025-68303: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8... In the Linux kernel, the following vulnerability has been resolved: platform/x86: intel: punit_ipc: fix memory corruption This passes the address of the pointer "&punit_ipcdev" when the intent was to pass the pointer itself "punit_ipcdev" (without the ampersand). This means that the: complete(&ipcdev->cmd_complete); in intel_punit_ioc() will write to a wrong memory address c
debian
CVE-2025-40313UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40313 CVE-2025-40313: linux - In the Linux kernel, the following vulnerability has been resolved: ntfs3: pret... In the Linux kernel, the following vulnerability has been resolved: ntfs3: pretend $Extend records as regular files Since commit af153bb63a33 ("vfs: catch invalid modes in may_open()") requires any inode be one of S_IFDIR/S_IFLNK/S_IFREG/S_IFCHR/S_IFBLK/ S_IFIFO/S_IFSOCK type, use S_IFREG for $Extend records. Scope: local bookworm: resolved (fixed in 6.1.159-1) bullseye: res
debian
CVE-2025-40049UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40049 CVE-2025-40049: linux - In the Linux kernel, the following vulnerability has been resolved: Squashfs: f... In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in squashfs_get_parent Syzkaller reports a "KMSAN: uninit-value in squashfs_get_parent" bug. This is caused by open_by_handle_at() being called with a file handle containing an invalid parent inode number. In particular the inode number is that of a symbolic link, rather than a dir
debian
CVE-2025-40248UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40248 CVE-2025-40248: linux - In the Linux kernel, the following vulnerability has been resolved: vsock: Igno... In the Linux kernel, the following vulnerability has been resolved: vsock: Ignore signal/timeout on connect() if already established During connect(), acting on a signal/timeout by disconnecting an already established socket leads to several issues: 1. connect() invoking vsock_transport_cancel_pkt() -> virtio_transport_purge_skbs() may race with sendmsg() invoking virtio_tra
debian
CVE-2025-40317UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40317 CVE-2025-40317: linux - In the Linux kernel, the following vulnerability has been resolved: regmap: sli... In the Linux kernel, the following vulnerability has been resolved: regmap: slimbus: fix bus_context pointer in regmap init calls Commit 4e65bda8273c ("ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()") revealed the problem in the slimbus regmap. That commit breaks audio playback, for instance, on sdm845 Thundercomm Dragonboard 845c board: Unable to handle ker
debian
CVE-2025-68785UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68785 CVE-2025-68785: linux - In the Linux kernel, the following vulnerability has been resolved: net: openvs... In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_nsh() action structure looks like this: OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...)) The outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK'ed by the nla_for_each_nested() inside __ovs_nla_copy_actions().
debian
CVE-2025-40275UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40275 CVE-2025-40275: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a... In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd In snd_usb_create_streams(), for UAC version 3 devices, the Interface Association Descriptor (IAD) is retrieved via usb_ifnum_to_if(). If this call fails, a fallback routine attempts to obtain the IAD from the next interface and set
debian