Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 68 of 132
CVE-2025-68237UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68237 CVE-2025-68237: linux - In the Linux kernel, the following vulnerability has been resolved: mtdchar: fi... In the Linux kernel, the following vulnerability has been resolved: mtdchar: fix integer overflow in read/write ioctls The "req.start" and "req.len" variables are u64 values that come from the user at the start of the function. We mask away the high 32 bits of "req.len" so that's capped at U32_MAX but the "req.start" variable can go up to U64_MAX which means that the additio
debian
CVE-2025-40095UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40095 CVE-2025-40095: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget... In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_rndis: Refactor bind path to use __free() After an bind/unbind cycle, the rndis->notify_req is left stale. If a subsequent bind fails, the unified error label attempts to free this stale request, leading to a NULL pointer dereference when accessing ep->ops->free_request. Refactor the error han
debian
CVE-2025-40044UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40044 CVE-2025-40044: linux - In the Linux kernel, the following vulnerability has been resolved: fs: udf: fi... In the Linux kernel, the following vulnerability has been resolved: fs: udf: fix OOB read in lengthAllocDescs handling When parsing Allocation Extent Descriptor, lengthAllocDescs comes from on-disk data and must be validated against the block size. Crafted or corrupted images may set lengthAllocDescs so that the total descriptor length (sizeof(allocExtDesc) + lengthAllocDesc
debian
CVE-2025-40264UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40264 CVE-2025-40264: linux - In the Linux kernel, the following vulnerability has been resolved: be2net: pas... In the Linux kernel, the following vulnerability has been resolved: be2net: pass wrb_params in case of OS2BMC be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL at be_send_pkt_to_bmc() call site. This may lead to dereferencing a NULL pointer when processing a workaround for specific packet, as commit bc0c3405abbb ("be2net: fix a Tx stall bug caused by
debian
CVE-2025-68728UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68728 CVE-2025-68728: linux - In the Linux kernel, the following vulnerability has been resolved: ntfs3: fix ... In the Linux kernel, the following vulnerability has been resolved: ntfs3: fix uninit memory after failed mi_read in mi_format_new Fix a KMSAN un-init bug found by syzkaller. ntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be uptodate. We do not bring the buffer uptodate before setting it as uptodate. If the buffer were to not be uptodate, it could mean
debian
CVE-2025-40141UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40141 CVE-2025-40141: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix possible UAF on iso_conn_free This attempt to fix similar issue to sco_conn_free where if the conn->sk is not set to NULL may lead to UAF on iso_conn_free. Scope: local bookworm: resolved (fixed in 6.1.158-1) bullseye: resolved forky: resolved (fixed in 6.17.6-1) sid: resolved (fixed in 6
debian
CVE-2025-68176UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68176 CVE-2025-68176: linux - In the Linux kernel, the following vulnerability has been resolved: PCI: cadenc... In the Linux kernel, the following vulnerability has been resolved: PCI: cadence: Check for the existence of cdns_pcie::ops before using it cdns_pcie::ops might not be populated by all the Cadence glue drivers. This is going to be true for the upcoming Sophgo platform which doesn't set the ops. Hence, add a check to prevent NULL pointer dereference. [mani: reworded subject a
debian
CVE-2025-68310UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68310 CVE-2025-68310: linux - In the Linux kernel, the following vulnerability has been resolved: s390/pci: A... In the Linux kernel, the following vulnerability has been resolved: s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump Do not block PCI config accesses through pci_cfg_access_lock() when executing the s390 variant of PCI error recovery: Acquire just device_lock() instead of pci_dev_lock() as powerpc's EEH and generig PCI AER processing do. During error recov
debian
CVE-2025-40341UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40341 CVE-2025-40341: linux - In the Linux kernel, the following vulnerability has been resolved: futex: Don'... In the Linux kernel, the following vulnerability has been resolved: futex: Don't leak robust_list pointer on exec race sys_get_robust_list() and compat_get_robust_list() use ptrace_may_access() to check if the calling task is allowed to access another task's robust_list pointer. This check is racy against a concurrent exec() in the target process. During exec(), a task may t
debian
CVE-2025-68343UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68343 CVE-2025-68343: linux - In the Linux kernel, the following vulnerability has been resolved: can: gs_usb... In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header The driver expects to receive a struct gs_host_frame in gs_usb_receive_bulk_callback(). Use struct_group to describe the header of the struct gs_host_frame and check that we have at least received the header before acces
debian
CVE-2025-39996UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39996 CVE-2025-39996: linux - In the Linux kernel, the following vulnerability has been resolved: media: b2c2... In the Linux kernel, the following vulnerability has been resolved: media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove The original code uses cancel_delayed_work() in flexcop_pci_remove(), which does not guarantee that the delayed work item irq_check_work has fully completed if it was already running. This leads to use-after-free scenarios where
debian
CVE-2025-68286UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68286 CVE-2025-68286: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check NULL before accessing [WHAT] IGT kms_cursor_legacy's long-nonblocking-modeset-vs-cursor-atomic fails with NULL pointer dereference. This can be reproduced with both an eDP panel and a DP monitors connected. BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor
debian
CVE-2025-68780UNKNOWNfixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68780 CVE-2025-68780: linux - In the Linux kernel, the following vulnerability has been resolved: sched/deadl... In the Linux kernel, the following vulnerability has been resolved: sched/deadline: only set free_cpus for online runqueues Commit 16b269436b72 ("sched/deadline: Modify cpudl::free_cpus to reflect rd->online") introduced the cpudl_set/clear_freecpu functions to allow the cpu_dl::free_cpus mask to be manipulated by the deadline scheduler class rq_on/offline callbacks so the m
debian
CVE-2025-40121UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40121 CVE-2025-40121: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel... In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver just ignores and leaves as is, which may lead to unepxected results like OOB access. This patch adds the sanity check and corrects the input mapping to the certain defaul
debian
CVE-2025-68327UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68327 CVE-2025-68327: linux - In the Linux kernel, the following vulnerability has been resolved: usb: renesa... In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: Fix synchronous external abort on unbind A synchronous external abort occurs on the Renesas RZ/G3S SoC if unbind is executed after the configuration sequence described above: modprobe usb_f_ecm modprobe libcomposite modprobe configfs cd /sys/kernel/config/usb_gadget mkdir -p g1 cd g1 echo
debian
CVE-2025-40331UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40331 CVE-2025-40331: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: Preve... In the Linux kernel, the following vulnerability has been resolved: sctp: Prevent TOCTOU out-of-bounds write For the following path not holding the sock lock, sctp_diag_dump() -> sctp_for_each_endpoint() -> sctp_ep_dump() make sure not to exceed bounds in case the address list has grown between buffer allocation (time-of-check) and write (time-of-use). Scope: local bookworm:
debian
CVE-2025-68285UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68285 CVE-2025-68285: linux - In the Linux kernel, the following vulnerability has been resolved: libceph: fi... In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately after freeing the old one
debian
CVE-2025-40293UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-40293 CVE-2025-40293: linux - In the Linux kernel, the following vulnerability has been resolved: iommufd: Do... In the Linux kernel, the following vulnerability has been resolved: iommufd: Don't overflow during division for dirty tracking If pgshift is 63 then BITS_PER_TYPE(*bitmap->bitmap) * pgsize will overflow to 0 and this triggers divide by 0. In this case the index should just be 0, so reorganize things to divide by shift and avoid hitting any overflows. Scope: local bookworm: r
debian
CVE-2025-68287UNKNOWNfixed in linux 6.1.159-1 (bookworm)2025
CVE-2025-68287 CVE-2025-68287: linux - In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: ... In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths This patch addresses a race condition caused by unsynchronized execution of multiple call paths invoking `dwc3_remove_requests()`, leading to premature freeing of USB requests and subsequent crashes. Three distinct execution p
debian
CVE-2025-40178UNKNOWNfixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-40178 CVE-2025-40178: linux - In the Linux kernel, the following vulnerability has been resolved: pid: Add a ... In the Linux kernel, the following vulnerability has been resolved: pid: Add a judgment for ns null in pid_nr_ns __task_pid_nr_ns ns = task_active_pid_ns(current); pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns); if (pid && ns->level level) { Sometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns. For example: Unable to ha
debian