Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 7 of 132
CVE-2025-37927HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37927 [HIGH] CVE-2025-37927: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/amd: ...
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid There is a string parsing logic error which can lead to an overflow of hid or uid buffers. Comparing ACPIID_LEN against a total string length doesn't take into account the lengths of individual hid and uid buffers so the check is insuffici
debian
CVE-2025-22004HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-22004 [HIGH] CVE-2025-22004: linux - In the Linux kernel, the following vulnerability has been resolved: net: atm: f...
In the Linux kernel, the following vulnerability has been resolved: net: atm: fix use after free in lec_send() The ->send() operation frees skb so save the length before calling ->send() to avoid a use after free.
Scope: local
bookworm: resolved (fixed in 6.1.133-1)
bullseye: resolved (fixed in 5.10.237-1)
forky: resolved (fixed in 6.12.21-1)
sid: resolved (fixed in 6
debian
CVE-2025-38679HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38679 [HIGH] CVE-2025-38679: linux - In the Linux kernel, the following vulnerability has been resolved: media: venu...
In the Linux kernel, the following vulnerability has been resolved: media: venus: Fix OOB read due to missing payload bound check Currently, The event_seq_changed() handler processes a variable number of properties sent by the firmware. The number of properties is indicated by the firmware and used to iterate over the payload. However, the payload size is not being va
debian
CVE-2025-39869HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39869 [HIGH] CVE-2025-39869: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ...
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map Fix a critical memory allocation bug in edma_setup_from_hw() where queue_priority_map was allocated with insufficient memory. The code declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8), but allocated memory using
debian
CVE-2025-38530HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38530 [HIGH] CVE-2025-38530: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: pcl...
In the Linux kernel, the following vulnerability has been resolved: comedi: pcl812: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: if ((1 options[1]) & board->irq_bits) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requir
debian
CVE-2025-38346HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38346 [HIGH] CVE-2025-38346: linux - In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix...
In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix UAF when lookup kallsym after ftrace disabled The following issue happens with a buggy module: BUG: unable to handle page fault for address: ffffffffc05d0218 PGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0 Oops: Oops: 0000 [#1] SMP KASAN PTI Tainted: [O]=OOT_MODULE, [E]=UNSIG
debian
CVE-2025-38729HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38729 [HIGH] CVE-2025-38729: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a...
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3 power domain descriptors, too UAC3 power domain descriptors need to be verified with its variable bLength for avoiding the unexpected OOB accesses by malicious firmware, too.
Scope: local
bookworm: resolved (fixed in 6.1.153-1)
bullseye: resolved (fixed in 5.10.244-1)
fo
debian
CVE-2025-38286HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38286 [HIGH] CVE-2025-38286: linux - In the Linux kernel, the following vulnerability has been resolved: pinctrl: at...
In the Linux kernel, the following vulnerability has been resolved: pinctrl: at91: Fix possible out-of-boundary access at91_gpio_probe() doesn't check that given OF alias is not available or something went wrong when trying to get it. This might have consequences when accessing gpio_chips array with that value as an index. Note, that BUG() can be compiled out and henc
debian
CVE-2025-68817HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-68817 [HIGH] CVE-2025-68817: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency Under high concurrency, A tree-connection object (tcon) is freed on a disconnect path while another path still holds a reference and later executes *_put()/write on it.
Scope: local
bookworm: resolved (fixed in 6.1.162-1)
bullseye:
debian
CVE-2025-38088HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38088 [HIGH] CVE-2025-38088: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/pow...
In the Linux kernel, the following vulnerability has been resolved: powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap memtrace mmap issue has an out of bounds issue. This patch fixes the by checking that the requested mapping region size should stay within the allocated region size.
Scope: local
bookworm: resolved (fixed in 6.1.147-1)
bullseye: resolv
debian
CVE-2025-37991HIGHCVSS 7.8fixed in linux 6.1.140-1 (bookworm)2025
CVE-2025-37991 [HIGH] CVE-2025-37991: linux - In the Linux kernel, the following vulnerability has been resolved: parisc: Fix...
In the Linux kernel, the following vulnerability has been resolved: parisc: Fix double SIGFPE crash Camm noticed that on parisc a SIGFPE exception will crash an application with a second SIGFPE in the signal handler. Dave analyzed it, and it happens because glibc uses a double-word floating-point store to atomically update function descriptors. As a result of lazy bin
debian
CVE-2025-39839HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39839 [HIGH] CVE-2025-39839: linux - In the Linux kernel, the following vulnerability has been resolved: batman-adv:...
In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix OOB read/write in network-coding decode batadv_nc_skb_decode_packet() trusts coded_len and checks only against skb->len. XOR starts at sizeof(struct batadv_unicast_packet), reducing payload headroom, and the source skb length is not verified, allowing an out-of-bounds read and a small
debian
CVE-2025-39691HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39691 [HIGH] CVE-2025-39691: linux - In the Linux kernel, the following vulnerability has been resolved: fs/buffer: ...
In the Linux kernel, the following vulnerability has been resolved: fs/buffer: fix use-after-free when call bh_read() helper There's issue as follows: BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110 Read of size 8 at addr ffffc9000168f7f8 by task swapper/3/0 CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64 Hardware name: QEM
debian
CVE-2025-38529HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38529 [HIGH] CVE-2025-38529: linux - In the Linux kernel, the following vulnerability has been resolved: comedi: aio...
In the Linux kernel, the following vulnerability has been resolved: comedi: aio_iiro_16: Fix bit shift out of bounds When checking for a supported IRQ number, the following test is used: if ((1 options[1]) & 0xdcfc) { However, `it->options[i]` is an unchecked `int` value from userspace, so the shift amount could be negative or out of bounds. Fix the test by requiring
debian
CVE-2025-38108HIGHCVSS 7.0fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38108 [HIGH] CVE-2025-38108: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ...
In the Linux kernel, the following vulnerability has been resolved: net_sched: red: fix a race in __red_change() Gerrard Tai reported a race condition in RED, whenever SFQ perturb timer fires at the wrong time. The race is as follows: CPU 0 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root | | [5]: lock root | [6]: rehash | [7]: qdisc_tree_reduce_b
debian
CVE-2025-38348HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38348 [HIGH] CVE-2025-38348: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: p54: ...
In the Linux kernel, the following vulnerability has been resolved: wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback() Robert Morris reported: |If a malicious USB device pretends to be an Intersil p54 wifi |interface and generates an eeprom_readback message with a large |eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the |message beyond the e
debian
CVE-2025-39866HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39866 [HIGH] CVE-2025-39866: linux - In the Linux kernel, the following vulnerability has been resolved: fs: writeba...
In the Linux kernel, the following vulnerability has been resolved: fs: writeback: fix use-after-free in __mark_inode_dirty() An use-after-free issue occurred when __mark_inode_dirty() get the bdi_writeback that was in the progress of switching. CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1 ...... pstate: 60400005 (nZCv daif +PAN -UAO -TCO
debian
CVE-2025-38652HIGHCVSS 7.1fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38652 [HIGH] CVE-2025-38652: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t...
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid out-of-boundary access in devs.path - touch /mnt/f2fs/012345678901234567890123456789012345678901234567890123 - truncate -s $((1024*1024*1024)) \ /mnt/f2fs/012345678901234567890123456789012345678901234567890123 - touch /mnt/f2fs/file - truncate -s $((1024*1024*1024)) /mnt/f2fs/file -
debian
CVE-2025-38320HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38320 [HIGH] CVE-2025-38320: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/ptrac...
In the Linux kernel, the following vulnerability has been resolved: arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() KASAN reports a stack-out-of-bounds read in regs_get_kernel_stack_nth(). Call Trace: [ 97.283505] BUG: KASAN: stack-out-of-bounds in regs_get_kernel_stack_nth+0xa8/0xc8 [ 97.284677] Read of size 8 at addr ffff800089277c10 by tas
debian
CVE-2025-21785HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21785 [HIGH] CVE-2025-21785: linux - In the Linux kernel, the following vulnerability has been resolved: arm64: cach...
In the Linux kernel, the following vulnerability has been resolved: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array The loop that detects/populates cache information already has a bounds check on the array size but does not account for cache levels with separate data/instructions cache. Fix this by incrementing the index for any populated leaf (instead
debian