Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 8 of 132
CVE-2025-39743HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39743 [HIGH] CVE-2025-39743: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: trunca...
In the Linux kernel, the following vulnerability has been resolved: jfs: truncate good inode pages when hard link is 0 The fileset value of the inode copy from the disk by the reproducer is AGGR_RESERVED_I. When executing evict, its hard link number is 0, so its inode pages are not truncated. This causes the bugon to be triggered when executing clear_inode() because n
debian
CVE-2025-38183HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38183 [HIGH] CVE-2025-38183: linux - In the Linux kernel, the following vulnerability has been resolved: net: lan743...
In the Linux kernel, the following vulnerability has been resolved: net: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get() Before calling lan743x_ptp_io_event_clock_get(), the 'channel' value is checked against the maximum value of PCI11X1X_PTP_IO_MAX_CHANNELS(8). This seems correct and aligns with the PTP interrupt status register (PTP_IN
debian
CVE-2025-38685HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38685 [HIGH] CVE-2025-38685: linux - In the Linux kernel, the following vulnerability has been resolved: fbdev: Fix ...
In the Linux kernel, the following vulnerability has been resolved: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit This issue triggers when a userspace program does an ioctl FBIOPUT_CON2FBMAP by passing console number and frame buffer number. Ideally this maps console to frame buffer and updates the screen if console is visible. As part of mapping it has to
debian
CVE-2025-38666HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38666 [HIGH] CVE-2025-38666: linux - In the Linux kernel, the following vulnerability has been resolved: net: applet...
In the Linux kernel, the following vulnerability has been resolved: net: appletalk: Fix use-after-free in AARP proxy probe The AARP proxy‐probe routine (aarp_proxy_probe_network) sends a probe, releases the aarp_lock, sleeps, then re-acquires the lock. During that window an expire timer thread (__aarp_expire_timer) can remove and kfree() the same entry, leading to a u
debian
CVE-2025-38403HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38403 [HIGH] CVE-2025-38403: linux - In the Linux kernel, the following vulnerability has been resolved: vsock/vmci:...
In the Linux kernel, the following vulnerability has been resolved: vsock/vmci: Clear the vmci transport packet properly when initializing it In vmci_transport_packet_init memset the vmci_transport_packet before populating the fields to avoid any uninitialised data being left in the structure.
Scope: local
bookworm: resolved (fixed in 6.1.147-1)
bullseye: resolved (fi
debian
CVE-2025-71133HIGHCVSS 7.1fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-71133 [HIGH] CVE-2025-71133: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma:...
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: avoid invalid read in irdma_net_event irdma_net_event() should not dereference anything from "neigh" (alias "ptr") until it has checked that the event is NETEVENT_NEIGH_UPDATE. Other events come with different structures pointed to by "ptr" and they may be smaller than struct neighbour. Mo
debian
CVE-2025-38713HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38713 [HIGH] CVE-2025-38713: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi...
In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() The hfsplus_readdir() method is capable to crash by calling hfsplus_uni2asc(): [ 667.121659][ T9805] ================================================================== [ 667.122651][ T9805] BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0x90
debian
CVE-2025-39944HIGHCVSS 7.8fixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39944 [HIGH] CVE-2025-39944: linux - In the Linux kernel, the following vulnerability has been resolved: octeontx2-p...
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() The original code relies on cancel_delayed_work() in otx2_ptp_destroy(), which does not ensure that the delayed work item synctstamp_work has fully completed if it was already running. This leads to use-after-free scenarios where otx2_ptp is
debian
CVE-2025-71238HIGHCVSS 7.8fixed in linux 6.1.164-1 (bookworm)2025
CVE-2025-71238 [HIGH] CVE-2025-71238: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: qla2x...
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page [5353358.825196] P
debian
CVE-2025-38428HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38428 [HIGH] CVE-2025-38428: linux - In the Linux kernel, the following vulnerability has been resolved: Input: ims-...
In the Linux kernel, the following vulnerability has been resolved: Input: ims-pcu - check record size in ims_pcu_flash_firmware() The "len" variable comes from the firmware and we generally do trust firmware, but it's always better to double check. If the "len" is too large it could result in memory corruption when we do "memcpy(fragment->data, rec->data, len);"
Scop
debian
CVE-2025-40082HIGHCVSS 7.1fixed in linux 6.1.164-1 (bookworm)2025
CVE-2025-40082 [HIGH] CVE-2025-40082: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi...
In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186 Read of size 2 at addr ffff8880289ef218 by task syz.6.248/14290 CPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(full) Hardware name: Q
debian
CVE-2025-39967HIGHCVSS 7.8fixed in linux 6.1.158-1 (bookworm)2025
CVE-2025-39967 [HIGH] CVE-2025-39967: linux - In the Linux kernel, the following vulnerability has been resolved: fbcon: fix ...
In the Linux kernel, the following vulnerability has been resolved: fbcon: fix integer overflow in fbcon_do_set_font Fix integer overflow vulnerabilities in fbcon_do_set_font() where font size calculations could overflow when handling user-controlled font parameters. The vulnerabilities occur when: 1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount mult
debian
CVE-2025-38146HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38146 [HIGH] CVE-2025-38146: linux - In the Linux kernel, the following vulnerability has been resolved: net: openvs...
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: Fix the dead loop of MPLS parse The unexpected MPLS packet may not end with the bottom label stack. When there are many stacks, The label count value has wrapped around. A dead loop occurs, soft lockup/CPU stuck finally. stack backtrace: UBSAN: array-index-out-of-bounds in /build/lin
debian
CVE-2025-38211HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38211 [HIGH] CVE-2025-38211: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: ...
In the Linux kernel, the following vulnerability has been resolved: RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last deref") simplified cm_id resource management by freeing cm_id once all references to the cm_id were removed. The references are removed either upon completion of iw_c
debian
CVE-2025-38230HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38230 [HIGH] CVE-2025-38230: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: valida...
In the Linux kernel, the following vulnerability has been resolved: jfs: validate AG parameters in dbMount() to prevent crashes Validate db_agheight, db_agwidth, and db_agstart in dbMount to catch corrupted metadata early and avoid undefined behavior in dbAllocAG. Limits are derived from L2LPERCTL, LPERCTL/MAXAG, and CTLTREESIZE: - agheight: 0 to L2LPERCTL/2 (0 to 5)
debian
CVE-2025-39806HIGHCVSS 7.1fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39806 [HIGH] CVE-2025-39806: linux - In the Linux kernel, the following vulnerability has been resolved: HID: multit...
In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() A malicious HID device can trigger a slab out-of-bounds during mt_report_fixup() by passing in report descriptor smaller than 607 bytes. mt_report_fixup() attempts to patch byte offset 607 of the descriptor with 0x25 by first checking
debian
CVE-2025-38548HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38548 [HIGH] CVE-2025-38548: linux - In the Linux kernel, the following vulnerability has been resolved: hwmon: (cor...
In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate the size of the received input buffer Add buffer_recv_size to store the size of the received bytes. Validate buffer_recv_size in send_usb_cmd().
Scope: local
bookworm: resolved (fixed in 6.1.147-1)
bullseye: resolved (fixed in 5.10.244-1)
forky: resolved (fixed in 6.16.3
debian
CVE-2025-38618HIGHCVSS 7.8fixed in linux 6.1.148-1 (bookworm)2025
CVE-2025-38618 [HIGH] CVE-2025-38618: linux - In the Linux kernel, the following vulnerability has been resolved: vsock: Do n...
In the Linux kernel, the following vulnerability has been resolved: vsock: Do not allow binding to VMADDR_PORT_ANY It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can cause a use-after-free when a connection is made to the bound socket. The socket returned by accept() also has port VMADDR_PORT_ANY but is not on the list of unbound sockets. Binding it w
debian
CVE-2025-37789HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37789 [HIGH] CVE-2025-37789: linux - In the Linux kernel, the following vulnerability has been resolved: net: openvs...
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.
Scope: local
bookworm: resolved (fixed in 6.1.135-1)
bullseye: resolved (fixed in 5.10.237-1)
forky: res
debian
CVE-2025-38153HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38153 [HIGH] CVE-2025-38153: linux - In the Linux kernel, the following vulnerability has been resolved: net: usb: a...
In the Linux kernel, the following vulnerability has been resolved: net: usb: aqc111: fix error handling of usbnet read calls Syzkaller, courtesy of syzbot, identified an error (see report [1]) in aqc111 driver, caused by incomplete sanitation of usb read calls' results. This problem is quite similar to the one fixed in commit 920a9fa27e78 ("net: asix: add proper erro
debian