Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 66 of 132
CVE-2025-40363UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40363 CVE-2025-40363: linux - In the Linux kernel, the following vulnerability has been resolved: net: ipv6: ... In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix field-spanning memcpy warning in AH output Fix field-spanning memcpy warnings in ah6_output() and ah6_output_done() where extension headers are copied to/from IPv6 address fields, triggering fortify-string warnings about writes beyond the 16-byte address fields. memcpy: detected field-spanning
debian
CVE-2025-68290UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68290 CVE-2025-68290: linux - In the Linux kernel, the following vulnerability has been resolved: most: usb: ... In the Linux kernel, the following vulnerability has been resolved: most: usb: fix double free on late probe failure The MOST subsystem has a non-standard registration function which frees the interface on registration failures and on deregistration. This unsurprisingly leads to bugs in the MOST drivers, and a couple of recent changes turned a reference underflow and use-aft
debian
CVE-2025-40272UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40272 CVE-2025-40272: linux - In the Linux kernel, the following vulnerability has been resolved: mm/secretme... In the Linux kernel, the following vulnerability has been resolved: mm/secretmem: fix use-after-free race in fault handler When a page fault occurs in a secret memory file created with `memfd_secret(2)`, the kernel will allocate a new folio for it, mark the underlying page as not-present in the direct map, and add it to the file mapping. If two tasks cause a fault in the sam
debian
CVE-2025-68289UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68289 CVE-2025-68289: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget... In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_eem: Fix memory leak in eem_unwrap The existing code did not handle the failure case of usb_ep_queue in the command path, potentially leading to memory leaks. Improve error handling to free all allocated resources on usb_ep_queue failure. This patch continues to use goto logic for error handli
debian
CVE-2025-68767UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68767 CVE-2025-68767: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: Ve... In the Linux kernel, the following vulnerability has been resolved: hfsplus: Verify inode mode when loading from disk syzbot is reporting that S_IFMT bits of inode->i_mode can become bogus when the S_IFMT bits of the 16bits "mode" field loaded from disk are corrupted. According to [1], the permissions field was treated as reserved in Mac OS 8 and 9. According to [2], the res
debian
CVE-2025-68345UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68345 CVE-2025-68345: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: ... In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() The acpi_get_first_physical_node() function can return NULL, in which case the get_device() function also returns NULL, but this value is then dereferenced without checking,so add a check to prevent a crash. Found by Linux Verificati
debian
CVE-2025-68246UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68246 CVE-2025-68246: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: clos... In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP connection limit is exceeded in ksmbd_kthread_fn(), the code sets ret = -EAGAIN and continues the accept loop without closing the just-accepted socket. That leaks one socket per rejected attempt from a single IP and enables a t
debian
CVE-2025-40301UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40301 CVE-2025-40301: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_event: validate skb length for unknown CC opcode In hci_cmd_complete_evt(), if the command complete event has an unknown opcode, we assume the first byte of the remaining skb->data contains the return status. However, parameter data has previously been pulled in hci_event_func(), which may lea
debian
CVE-2025-68191UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68191 CVE-2025-68191: linux - In the Linux kernel, the following vulnerability has been resolved: udp_tunnel:... In the Linux kernel, the following vulnerability has been resolved: udp_tunnel: use netdev_warn() instead of netdev_WARN() netdev_WARN() uses WARN/WARN_ON to print a backtrace along with file and line information. In this case, udp_tunnel_nic_register() returning an error is just a failed operation, not a kernel bug. udp_tunnel_nic_register() can fail due to a memory allocat
debian
CVE-2025-68354UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68354 CVE-2025-68354: linux - In the Linux kernel, the following vulnerability has been resolved: regulator: ... In the Linux kernel, the following vulnerability has been resolved: regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex regulator_supply_alias_list was accessed without any locking in regulator_supply_alias(), regulator_register_supply_alias(), and regulator_unregister_supply_alias(). Concurrent registration, unregistration and lookups can race, le
debian
CVE-2025-40127UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40127 CVE-2025-40127: linux - In the Linux kernel, the following vulnerability has been resolved: hwrng: ks-s... In the Linux kernel, the following vulnerability has been resolved: hwrng: ks-sa - fix division by zero in ks_sa_rng_init Fix division by zero in ks_sa_rng_init caused by missing clock pointer initialization. The clk_get_rate() call is performed on an uninitialized clk pointer, resulting in division by zero when calculating delay values. Add clock initialization code before
debian
CVE-2025-40126UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40126 CVE-2025-40126: linux - In the Linux kernel, the following vulnerability has been resolved: sparc: fix ... In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and calculate the remaining bytes left to copy using the cur
debian
CVE-2025-68813UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68813 CVE-2025-68813: linux - In the Linux kernel, the following vulnerability has been resolved: ipvs: fix i... In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure() without ensuring skb->dev is set, leading to a NULL pointer dereference in fib_compute_spec_dst() when ipv4_link_failure() attempts to send ICMP destination unreachable messages. The issue em
debian
CVE-2025-68284UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68284 CVE-2025-68284: linux - In the Linux kernel, the following vulnerability has been resolved: libceph: pr... In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() The len field originates from untrusted network packets. Boundary checks have been added to prevent potential out-of-bounds writes when decrypting the connection secret or processing service tickets. [ idryomov: changelog ] Scope: l
debian
CVE-2025-68335UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68335 CVE-2025-68335: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: pcl... In the Linux kernel, the following vulnerability has been resolved: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() Syzbot identified an issue [1] in pcl818_ai_cancel(), which stems from the fact that in case of early device detach via pcl818_detach(), subdevice dev->read_subdev may not have initialized its pointer to &struct comedi_async as intended. Thus, any such
debian
CVE-2025-40258UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40258 CVE-2025-40258: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix ... In the Linux kernel, the following vulnerability has been resolved: mptcp: fix race condition in mptcp_schedule_work() syzbot reported use-after-free in mptcp_schedule_work() [1] Issue here is that mptcp_schedule_work() schedules a work, then gets a refcount on sk->sk_refcnt if the work was scheduled. This refcount will be released by mptcp_worker(). [A] if (schedule_work(..
debian
CVE-2025-68194UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68194 CVE-2025-68194: linux - In the Linux kernel, the following vulnerability has been resolved: media: imon... In the Linux kernel, the following vulnerability has been resolved: media: imon: make send_packet() more robust syzbot is reporting that imon has three problems which result in hung tasks due to forever holding device lock [1]. First problem is that when usb_rx_callback_intf0() once got -EPROTO error after ictx->dev_present_intf0 became true, usb_rx_callback_intf0() resubmit
debian
CVE-2025-40092UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40092 CVE-2025-40092: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget... In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: Refactor bind path to use __free() After an bind/unbind cycle, the ncm->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error handlin
debian
CVE-2025-40068UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40068 CVE-2025-40068: linux - In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: ... In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: Fix integer overflow in run_unpack() The MFT record relative to the file being opened contains its runlist, an array containing information about the file's location on the physical disk. Analysis of all Call Stack paths showed that the values of the runlist array, from which LCNs are calculated,
debian
CVE-2025-71069UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71069 CVE-2025-71069: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: inval... In the Linux kernel, the following vulnerability has been resolved: f2fs: invalidate dentry cache on failed whiteout creation F2FS can mount filesystems with corrupted directory depth values that get runtime-clamped to MAX_DIR_HASH_DEPTH. When RENAME_WHITEOUT operations are performed on such directories, f2fs_rename performs directory modifications (updating target entry and
debian