Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 107 of 132
CVE-2024-42240MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-42240 [MEDIUM] CVE-2024-42240: linux - In the Linux kernel, the following vulnerability has been resolved: x86/bhi: Av...
In the Linux kernel, the following vulnerability has been resolved: x86/bhi: Avoid warning in #DB handler due to BHI mitigation When BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set then entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the clear_bhb_loop() before the TF flag is cleared. This causes the #DB handler (exc_debug_kernel()
debian
CVE-2024-46805MEDIUMCVSS 5.5fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46805 [MEDIUM] CVE-2024-46805: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix the waring dereferencing hive Check the amdgpu_hive_info *hive that maybe is NULL.
Scope: local
bookworm: resolved (fixed in 6.1.112-1)
bullseye: resolved
forky: resolved (fixed in 6.10.9-1)
sid: resolved (fixed in 6.10.9-1)
trixie: resolved (fixed in 6.10.9-1)
debian
CVE-2024-56681MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56681 [MEDIUM] CVE-2024-56681: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: bcm...
In the Linux kernel, the following vulnerability has been resolved: crypto: bcm - add error check in the ahash_hmac_init function The ahash_init functions may return fails. The ahash_hmac_init should not return ok when ahash_init returns error. For an example, ahash_init will return -ENOMEM when allocation memory is error.
Scope: local
bookworm: resolved (fixed in 6
debian
CVE-2024-56688MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56688 [MEDIUM] CVE-2024-56688: linux - In the Linux kernel, the following vulnerability has been resolved: sunrpc: cle...
In the Linux kernel, the following vulnerability has been resolved: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport Since transport->sock has been set to NULL during reset transport, XPRT_SOCK_UPD_TIMEOUT also needs to be cleared. Otherwise, the xs_tcp_set_socket_timeouts() may be triggered in xs_tcp_send_request() to dereference the transport->sock that ha
debian
CVE-2024-43823MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-43823 [MEDIUM] CVE-2024-43823: linux - In the Linux kernel, the following vulnerability has been resolved: PCI: keysto...
In the Linux kernel, the following vulnerability has been resolved: PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() If IORESOURCE_MEM is not provided in Device Tree due to any error, resource_list_first_type() will return NULL and pci_parse_request_of_pci_ranges() will just emit a warning. This will cause a NULL pointer
debian
CVE-2024-56774MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56774 [MEDIUM] CVE-2024-56774: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: add ...
In the Linux kernel, the following vulnerability has been resolved: btrfs: add a sanity check for btrfs root in btrfs_search_slot() Syzbot reports a null-ptr-deref in btrfs_search_slot(). The reproducer is using rescue=ibadroots, and the extent tree root is corrupted thus the extent tree is NULL. When scrub tries to search the extent tree to gather the needed extent
debian
CVE-2024-53131MEDIUMCVSS 5.5fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-53131 [MEDIUM] CVE-2024-53131: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix...
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints". This series fixes null pointer dereference bugs that occur when using nilfs2 and two block-related tracepoints. This patch (of 2): It has been reported that when using "bl
debian
CVE-2024-44935MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-44935 [MEDIUM] CVE-2024-44935: linux - In the Linux kernel, the following vulnerability has been resolved: sctp: Fix n...
In the Linux kernel, the following vulnerability has been resolved: sctp: Fix null-ptr-deref in reuseport_add_sock(). syzbot reported a null-ptr-deref while accessing sk2->sk_reuseport_cb in reuseport_add_sock(). [0] The repro first creates a listener with SO_REUSEPORT. Then, it creates another listener on the same port and concurrently closes the first listener. Th
debian
CVE-2024-50138MEDIUMCVSS 5.5fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50138 [MEDIUM] CVE-2024-50138: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Use ra...
In the Linux kernel, the following vulnerability has been resolved: bpf: Use raw_spinlock_t in ringbuf The function __bpf_ringbuf_reserve is invoked from a tracepoint, which disables preemption. Using spinlock_t in this context can lead to a "sleep in atomic" warning in the RT variant. This issue is illustrated in the example below: BUG: sleeping function called fro
debian
CVE-2024-53220MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53220 [MEDIUM] CVE-2024-53220: linux - In the Linux kernel, the following vulnerability has been resolved: f2fs: fix t...
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to account dirty data in __get_secs_required() It will trigger system panic w/ testcase in [1]: ------------[ cut here ]------------ kernel BUG at fs/f2fs/segment.c:2752! RIP: 0010:new_curseg+0xc81/0x2110 Call Trace: f2fs_allocate_data_block+0x1c91/0x4540 do_write_page+0x163/0xdf0 f2fs_out
debian
CVE-2024-56687MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56687 [MEDIUM] CVE-2024-56687: linux - In the Linux kernel, the following vulnerability has been resolved: usb: musb: ...
In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix hardware lockup on first Rx endpoint request There is a possibility that a request's callback could be invoked from usb_ep_queue() (call trace below, supplemented with missing calls): req->complete from usb_gadget_giveback_request (drivers/usb/gadget/udc/core.c:999) usb_gadget_givebac
debian
CVE-2024-46719MEDIUMCVSS 5.5fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46719 [MEDIUM] CVE-2024-46719: linux - In the Linux kernel, the following vulnerability has been resolved: usb: typec:...
In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Fix null pointer dereference in trace ucsi_register_altmode checks IS_ERR for the alt pointer and treats NULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled, ucsi_register_displayport returns NULL which causes a NULL pointer dereference in trace. Rather than return NULL, cal
debian
CVE-2024-42305MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-42305 [MEDIUM] CVE-2024-42305: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: check...
In the Linux kernel, the following vulnerability has been resolved: ext4: check dot and dotdot of dx_root before making dir indexed Syzbot reports a issue as follows: ============================================ BUG: unable to handle page fault for address: ffffed11022e24fe PGD 23ffee067 P4D 23ffee067 PUD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 PID: 507
debian
CVE-2024-36357MEDIUMCVSS 5.6fixed in amd64-microcode 3.20251202.1 (forky)2024
CVE-2024-36357 [MEDIUM] CVE-2024-36357: amd64-microcode - A transient execution vulnerability in some AMD processors may allow an attacker...
A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 3.20251202.1)
sid: resolved (fixed in 3.20251202.1)
trixie: open
debian
CVE-2024-43833MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-43833 [MEDIUM] CVE-2024-43833: linux - In the Linux kernel, the following vulnerability has been resolved: media: v4l:...
In the Linux kernel, the following vulnerability has been resolved: media: v4l: async: Fix NULL pointer dereference in adding ancillary links In v4l2_async_create_ancillary_links(), ancillary links are created for lens and flash sub-devices. These are sub-device to sub-device links and if the async notifier is related to a V4L2 device, the source sub-device of the a
debian
CVE-2024-53113MEDIUMCVSS 5.5fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-53113 [MEDIUM] CVE-2024-53113: linux - In the Linux kernel, the following vulnerability has been resolved: mm: fix NUL...
In the Linux kernel, the following vulnerability has been resolved: mm: fix NULL pointer dereference in alloc_pages_bulk_noprof We triggered a NULL pointer dereference for ac.preferred_zoneref->zone in alloc_pages_bulk_noprof() when the task is migrated between cpusets. When cpuset is enabled, in prepare_alloc_pages(), ac->nodemask may be ¤t->mems_allowed. when firs
debian
CVE-2024-50006MEDIUMCVSS 4.7fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50006 [MEDIUM] CVE-2024-50006: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix i...
In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate() Fuzzing reports a possible deadlock in jbd2_log_wait_commit. This issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require synchronous updates because the file descriptor is opened with O_SYNC. This can lead to the jbd2_journal_stop(
debian
CVE-2024-49968MEDIUMCVSS 5.5fixed in linux 6.1.162-1 (bookworm)2024
CVE-2024-49968 [MEDIUM] CVE-2024-49968: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: files...
In the Linux kernel, the following vulnerability has been resolved: ext4: filesystems without casefold feature cannot be mounted with siphash When mounting the ext4 filesystem, if the default hash version is set to DX_HASH_SIPHASH but the casefold feature is not set, exit the mounting.
Scope: local
bookworm: resolved (fixed in 6.1.162-1)
bullseye: resolved
forky: re
debian
CVE-2024-42085MEDIUMCVSS 5.5fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42085 [MEDIUM] CVE-2024-42085: linux - In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: ...
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock When config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system to enter suspend status with below command: echo mem > /sys/power/state There will be a deadlock issue occurring. Detailed invoking path as be
debian
CVE-2024-53097MEDIUMCVSS 5.5fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-53097 [MEDIUM] CVE-2024-53097: linux - In the Linux kernel, the following vulnerability has been resolved: mm: kreallo...
In the Linux kernel, the following vulnerability has been resolved: mm: krealloc: Fix MTE false alarm in __do_krealloc This patch addresses an issue introduced by commit 1a83a716ec233 ("mm: krealloc: consider spare memory for __GFP_ZERO") which causes MTE (Memory Tagging Extension) to falsely report a slab-out-of-bounds error. The problem occurs when zeroing out spa
debian