Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 9 of 132
CVE-2025-21812HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21812 [HIGH] CVE-2025-21812: linux - In the Linux kernel, the following vulnerability has been resolved: ax25: rcu p... In the Linux kernel, the following vulnerability has been resolved: ax25: rcu protect dev->ax25_ptr syzbot found a lockdep issue [1]. We should remove ax25 RTNL dependency in ax25_setsockopt() This should also fix a variety of possible UAF in ax25. [1] WARNING: possible circular locking dependency detected 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0 Not tainted ------
debian
CVE-2025-39689HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39689 [HIGH] CVE-2025-39689: linux - In the Linux kernel, the following vulnerability has been resolved: ftrace: Als... In the Linux kernel, the following vulnerability has been resolved: ftrace: Also allocate and copy hash for reading of filter files Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds the pointer to the global tracer hash to its iterator. Unlike the writer that allocates a copy of the hash, the reader keeps the pointer to the filter hashes. This
debian
CVE-2025-21763HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21763 [HIGH] CVE-2025-21763: linux - In the Linux kernel, the following vulnerability has been resolved: neighbour: ... In the Linux kernel, the following vulnerability has been resolved: neighbour: use RCU protection in __neigh_notify() __neigh_notify() can be called without RTNL or RCU protection. Use RCU protection to avoid potential UAF. Scope: local bookworm: resolved (fixed in 6.1.129-1) bullseye: resolved (fixed in 5.10.237-1) forky: resolved (fixed in 6.12.16-1) sid: resolved (
debian
CVE-2025-21999HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21999 [HIGH] CVE-2025-21999: linux - In the Linux kernel, the following vulnerability has been resolved: proc: fix U... In the Linux kernel, the following vulnerability has been resolved: proc: fix UAF in proc_get_inode() Fix race between rmmod and /proc/XXX's inode instantiation. The bug is that pde->proc_ops don't belong to /proc, it belongs to a module, therefore dereferencing it after /proc entry has been registered is a bug unless use_pde/unuse_pde() pair has been used. use_pde/un
debian
CVE-2025-21928HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21928 [HIGH] CVE-2025-21928: linux - In the Linux kernel, the following vulnerability has been resolved: HID: intel-... In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() The system can experience a random crash a few minutes after the driver is removed. This issue occurs due to improper handling of memory freeing in the ishtp_hid_remove() function. The function currently frees the `driver_data` directl
debian
CVE-2025-39826HIGHCVSS 7.0fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39826 [HIGH] CVE-2025-39826: linux - In the Linux kernel, the following vulnerability has been resolved: net: rose: ... In the Linux kernel, the following vulnerability has been resolved: net: rose: convert 'use' field to refcount_t The 'use' field in struct rose_neigh is used as a reference counter but lacks atomicity. This can lead to race conditions where a rose_neigh structure is freed while still being referenced by other code paths. For example, when rose_neigh->use becomes zero
debian
CVE-2025-38111HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38111 [HIGH] CVE-2025-38111: linux - In the Linux kernel, the following vulnerability has been resolved: net/mdiobus... In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support
debian
CVE-2025-38180HIGHCVSS 7.8fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38180 [HIGH] CVE-2025-38180: linux - In the Linux kernel, the following vulnerability has been resolved: net: atm: f... In the Linux kernel, the following vulnerability has been resolved: net: atm: fix /proc/net/atm/lec handling /proc/net/atm/lec must ensure safety against dev_lec[] changes. It appears it had dev_put() calls without prior dev_hold(), leading to imbalance and UAF. Scope: local bookworm: resolved (fixed in 6.1.147-1) bullseye: resolved (fixed in 5.10.244-1) forky: resolv
debian
CVE-2025-22079HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-22079 [HIGH] CVE-2025-22079: linux - In the Linux kernel, the following vulnerability has been resolved: ocfs2: vali... In the Linux kernel, the following vulnerability has been resolved: ocfs2: validate l_tree_depth to avoid out-of-bounds access The l_tree_depth field is 16-bit (__le16), but the actual maximum depth is limited to OCFS2_MAX_PATH_DEPTH. Add a check to prevent out-of-bounds access if l_tree_depth has an invalid value, which may occur when reading from a corrupted mounted
debian
CVE-2025-38708HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-38708 [HIGH] CVE-2025-38708: linux - In the Linux kernel, the following vulnerability has been resolved: drbd: add m... In the Linux kernel, the following vulnerability has been resolved: drbd: add missing kref_get in handle_write_conflicts With `two-primaries` enabled, DRBD tries to detect "concurrent" writes and handle write conflicts, so that even if you write to the same sector simultaneously on both nodes, they end up with the identical data once the writes are completed. In handl
debian
CVE-2025-39828HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39828 [HIGH] CVE-2025-39828: linux - In the Linux kernel, the following vulnerability has been resolved: atm: atmtcp... In the Linux kernel, the following vulnerability has been resolved: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). syzbot reported the splat below. [0] When atmtcp_v_open() or atmtcp_v_close() is called via connect() or close(), atmtcp_send_control() is called to send an in-kernel special message. The message has ATMTCP_HDR_MAGIC in atmtcp_control.hdr.
debian
CVE-2025-39824HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2025
CVE-2025-39824 [HIGH] CVE-2025-39824: linux - In the Linux kernel, the following vulnerability has been resolved: HID: asus: ... In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLAIMED_INPUT validation After hid_hw_start() is called hidinput_connect() will eventually be called to set up the device with the input layer since the HID_CONNECT_DEFAULT connect mask is used. During hidinput_connect() all input and output reports are processed and corresp
debian
CVE-2025-22083HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-22083 [HIGH] CVE-2025-22083: linux - In the Linux kernel, the following vulnerability has been resolved: vhost-scsi:... In the Linux kernel, the following vulnerability has been resolved: vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint If vhost_scsi_set_endpoint is called multiple times without a vhost_scsi_clear_endpoint between them, we can hit multiple bugs found by Haoran Zhang: 1. Use-after-free when no tpgs are found: This fixes a use after free that occurs
debian
CVE-2025-21855HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21855 [HIGH] CVE-2025-21855: linux - In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Do... In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS Previously, after successfully flushing the xmit buffer to VIOS, the tx_bytes stat was incremented by the length of the skb. It is invalid to access the skb memory after sending the buffer to the VIOS because, at any point after sending, the VIOS can
debian
CVE-2025-21753HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2025
CVE-2025-21753 [HIGH] CVE-2025-21753: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ... In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when attempting to join an aborted transaction When we are trying to join the current transaction and if it's aborted, we read its 'aborted' field after unlocking fs_info->trans_lock and without holding any extra reference count on it. This means that a concurrent task that i
debian
CVE-2025-39871HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2025
CVE-2025-39871 [HIGH] CVE-2025-39871: linux - In the Linux kernel, the following vulnerability has been resolved: dmaengine: ... In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Remove improper idxd_free The call to idxd_free() introduces a duplicate put_device() leading to a reference count underflow: refcount_t: underflow; use-after-free. WARNING: CPU: 15 PID: 4428 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110 ... Call Trace: idxd_remove+0xe4/0x120
debian
CVE-2025-37752HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-37752 [HIGH] CVE-2025-37752: linux - In the Linux kernel, the following vulnerability has been resolved: net_sched: ... In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit i
debian
CVE-2025-38249HIGHCVSS 7.1fixed in linux 6.1.147-1 (bookworm)2025
CVE-2025-38249 [HIGH] CVE-2025-38249: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a... In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3() In snd_usb_get_audioformat_uac3(), the length value returned from snd_usb_ctl_msg() is used directly for memory allocation without validation. This length is controlled by the USB device. The allocated buffer is cast to a uac3_c
debian
CVE-2025-22126HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2025
CVE-2025-22126 [HIGH] CVE-2025-22126: linux - In the Linux kernel, the following vulnerability has been resolved: md: fix mdd... In the Linux kernel, the following vulnerability has been resolved: md: fix mddev uaf while iterating all_mddevs list While iterating all_mddevs list from md_notify_reboot() and md_exit(), list_for_each_entry_safe is used, and this can race with deletint the next mddev, causing UAF: t1: spin_lock //list_for_each_entry_safe(mddev, n, ...) mddev_get(mddev1) // assume md
debian
CVE-2025-21993HIGHCVSS 7.1fixed in linux 6.1.133-1 (bookworm)2025
CVE-2025-21993 [HIGH] CVE-2025-21993: linux - In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft:... In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() When performing an iSCSI boot using IPv6, iscsistart still reads the /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix length is 64, this causes the shift exponent to become negative, triggering a UBSAN warni
debian
Debian Linux-6.1 vulnerabilities | cvebase