Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 67 of 132
CVE-2025-68800UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68800 CVE-2025-68800: linux - In the Linux kernel, the following vulnerability has been resolved: mlxsw: spec... In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats Cited commit added a dedicated mutex (instead of RTNL) to protect the multicast route list, so that it will not change while the driver periodically traverses it in order to update the kernel about multicast route stats that were quer
debian
CVE-2025-39972UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39972 CVE-2025-39972: linux - In the Linux kernel, the following vulnerability has been resolved: i40e: fix i... In the Linux kernel, the following vulnerability has been resolved: i40e: fix idx validation in i40e_validate_queue_map Ensure idx is within range of active/initialized TCs when iterating over vf->ch[idx] in i40e_validate_queue_map(). Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: resolved (fixed in 5.10.247-1) forky: resolved (fixed in 6.16.10-1) sid: resolv
debian
CVE-2025-40193UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40193 CVE-2025-40193: linux - In the Linux kernel, the following vulnerability has been resolved: xtensa: sim... In the Linux kernel, the following vulnerability has been resolved: xtensa: simdisk: add input size check in proc_write_simdisk A malicious user could pass an arbitrarily bad value to memdup_user_nul(), potentially causing kernel crash. This follows the same pattern as commit ee76746387f6 ("netdevsim: prevent bad user input in nsim_dev_health_break_write()") Scope: local boo
debian
CVE-2025-40124UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40124 CVE-2025-40124: linux - In the Linux kernel, the following vulnerability has been resolved: sparc: fix ... In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III Anthony Yznaga tracked down that a BUG_ON in ext4 code with large folios enabled resulted from copy_from_user() returning impossibly large values greater than the size to be copied. This lead to __copy_from_iter() returning imp
debian
CVE-2025-40084UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40084 CVE-2025-40084: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: tran... In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past the declared payload size. Va
debian
CVE-2025-71064UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71064 CVE-2025-71064: linux - In the Linux kernel, the following vulnerability has been resolved: net: hns3: ... In the Linux kernel, the following vulnerability has been resolved: net: hns3: using the num_tqps in the vf driver to apply for resources Currently, hdev->htqp is allocated using hdev->num_tqps, and kinfo->tqp is allocated using kinfo->num_tqps. However, kinfo->num_tqps is set to min(new_tqps, hdev->num_tqps); Therefore, kinfo->num_tqps may be smaller than hdev->num_tqps, wh
debian
CVE-2025-68332UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68332 CVE-2025-68332: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: c6x... In the Linux kernel, the following vulnerability has been resolved: comedi: c6xdigio: Fix invalid PNP driver unregistration The Comedi low-level driver "c6xdigio" seems to be for a parallel port connected device. When the Comedi core calls the driver's Comedi "attach" handler `c6xdigio_attach()` to configure a Comedi to use this driver, it tries to enable the parallel port P
debian
CVE-2025-68776UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68776 CVE-2025-68776: linux - In the Linux kernel, the following vulnerability has been resolved: net/hsr: fi... In the Linux kernel, the following vulnerability has been resolved: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() prp_get_untagged_frame() calls __pskb_copy() to create frame->skb_std but doesn't check if the allocation failed. If __pskb_copy() returns NULL, skb_clone() is called with a NULL pointer, causing a crash: Oops: general protection fault, probab
debian
CVE-2025-40304UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40304 CVE-2025-40304: linux - In the Linux kernel, the following vulnerability has been resolved: fbdev: Add ... In the Linux kernel, the following vulnerability has been resolved: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds Add bounds checking to prevent writes past framebuffer boundaries when rendering text near screen edges. Return early if the Y position is off-screen and clip image height to screen boundary. Break from the rendering loop if the X position
debian
CVE-2025-40322UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40322 CVE-2025-40322: linux - In the Linux kernel, the following vulnerability has been resolved: fbdev: bitb... In the Linux kernel, the following vulnerability has been resolved: fbdev: bitblit: bound-check glyph index in bit_putcs* bit_putcs_aligned()/unaligned() derived the glyph pointer from the character value masked by 0xff/0x1ff, which may exceed the actual font's glyph count and read past the end of the built-in font array. Clamp the index to the actual glyph count before comp
debian
CVE-2025-40013UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40013 CVE-2025-40013: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom:... In the Linux kernel, the following vulnerability has been resolved: ASoC: qcom: audioreach: fix potential null pointer dereference It is possible that the topology parsing function audioreach_widget_load_module_common() could return NULL or an error pointer. Add missing NULL check so that we do not dereference it. Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye
debian
CVE-2025-68797UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68797 CVE-2025-68797: linux - In the Linux kernel, the following vulnerability has been resolved: char: appli... In the Linux kernel, the following vulnerability has been resolved: char: applicom: fix NULL pointer dereference in ac_ioctl Discovered by Atuin - Automated Vulnerability Discovery Engine. In ac_ioctl, the validation of IndexCard and the check for a valid RamIO pointer are skipped when cmd is 6. However, the function unconditionally executes readb(apbs[IndexCard].RamIO + VER
debian
CVE-2025-68771UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68771 CVE-2025-68771: linux - In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix ... In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2_find_victim_chain syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the `cl_next_free_rec` field of the allocation chain list (next free slot in the chain list) is 0, triggring the BUG_ON(!cl->cl_next_free_rec) condition in ocfs2_find_victim_chain() and panickin
debian
CVE-2025-68346UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68346 CVE-2025-68346: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: dice:... In the Linux kernel, the following vulnerability has been resolved: ALSA: dice: fix buffer overflow in detect_stream_formats() The function detect_stream_formats() reads the stream_count value directly from a FireWire device without validating it. This can lead to out-of-bounds writes when a malicious device provides a stream_count value greater than MAX_STREAMS. Fix by appl
debian
CVE-2025-68331UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68331 CVE-2025-68331: linux - In the Linux kernel, the following vulnerability has been resolved: usb: uas: f... In the Linux kernel, the following vulnerability has been resolved: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer When a UAS device is unplugged during data transfer, there is a probability of a system panic occurring. The root cause is an access to an invalid memory address during URB callback handling. Specifically, this happe
debian
CVE-2025-68786UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68786 CVE-2025-68786: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: skip... In the Linux kernel, the following vulnerability has been resolved: ksmbd: skip lock-range check on equal size to avoid size==0 underflow When size equals the current i_size (including 0), the code used to call check_lock_range(filp, i_size, size - 1, WRITE), which computes `size - 1` and can underflow for size==0. Skip the equal case. Scope: local bookworm: resolved (fixed
debian
CVE-2025-40010UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40010 CVE-2025-40010: linux - In the Linux kernel, the following vulnerability has been resolved: afs: Fix po... In the Linux kernel, the following vulnerability has been resolved: afs: Fix potential null pointer dereference in afs_put_server afs_put_server() accessed server->debug_id before the NULL check, which could lead to a null pointer dereference. Move the debug_id assignment, ensuring we never dereference a NULL server pointer. Scope: local bookworm: resolved (fixed in 6.1.158-
debian
CVE-2025-68308UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68308 CVE-2025-68308: linux - In the Linux kernel, the following vulnerability has been resolved: can: kvaser... In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: leaf: Fix potential infinite loop in command parsers The `kvaser_usb_leaf_wait_cmd()` and `kvaser_usb_leaf_read_bulk_callback` functions contain logic to zero-length commands. These commands are used to align data to the USB endpoint's wMaxPacketSize boundary. The driver attempts to skip the
debian
CVE-2025-40035UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40035 CVE-2025-40035: linux - In the Linux kernel, the following vulnerability has been resolved: Input: uinp... In the Linux kernel, the following vulnerability has been resolved: Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak Struct ff_effect_compat is embedded twice inside uinput_ff_upload_compat, contains internal padding. In particular, there is a hole after struct ff_replay to satisfy alignment requirements for the following union member. Without clear
debian
CVE-2025-68724UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68724 CVE-2025-68724: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: asy... In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check_add_overflow() to guard against potential integer overflows when adding the binary blob lengths and the size of an asymmetric_key_id structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a possible buffer overflo
debian