Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 72 of 132
CVE-2024-26952HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-26952 [HIGH] CVE-2024-26952: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix potencial out-of-bounds when buffer offset is invalid I found potencial out-of-bounds when buffer offset fields of a few requests is invalid. This patch set the minimum value of buffer offset field to ->Buffer offset to validate buffer length.
Scope: local
bookworm: resolved (fixed in 6.1.1
debian
CVE-2024-26954HIGHCVSS 7.1fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-26954 [HIGH] CVE-2024-26954: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16() If ->NameOffset of smb2_create_req is smaller than Buffer offset of smb2_create_req, slab-out-of-bounds read can happen from smb2_open. This patch set the minimum value of the name offset to the buffer offset to validate name length of smb2_cre
debian
CVE-2024-49860HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49860 [HIGH] CVE-2024-49860: linux - In the Linux kernel, the following vulnerability has been resolved: ACPI: sysfs...
In the Linux kernel, the following vulnerability has been resolved: ACPI: sysfs: validate return type of _STR method Only buffer objects are valid return values of _STR. If something else is returned description_show() will access invalid memory.
Scope: local
bookworm: resolved (fixed in 6.1.115-1)
bullseye: resolved (fixed in 5.10.234-1)
forky: resolved (fixed in 6.1
debian
CVE-2024-57798HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-57798 [HIGH] CVE-2024-57798: linux - In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst:...
In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() While receiving an MST up request message from one thread in drm_dp_mst_handle_up_req(), the MST topology could be removed from another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing mst_primary and setting drm_d
debian
CVE-2024-53174HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53174 [HIGH] CVE-2024-53174: linux - In the Linux kernel, the following vulnerability has been resolved: SUNRPC: mak...
In the Linux kernel, the following vulnerability has been resolved: SUNRPC: make sure cache entry active before cache_show The function `c_show` was called with protection from RCU. This only ensures that `cp` will not be freed. Therefore, the reference count for `cp` can drop to zero, which will trigger a refcount use-after-free warning when `cache_get` is called. To
debian
CVE-2024-47670HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-47670 [HIGH] CVE-2024-47670: linux - In the Linux kernel, the following vulnerability has been resolved: ocfs2: add ...
In the Linux kernel, the following vulnerability has been resolved: ocfs2: add bounds checking to ocfs2_xattr_find_entry() Add a paranoia check to make sure it doesn't stray beyond valid memory region containing ocfs2 xattr entries when scanning for a match. It will prevent out-of-bound access in case of crafted images.
Scope: local
bookworm: resolved (fixed in 6.1.11
debian
CVE-2024-47747HIGHCVSS 7.0fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47747 [HIGH] CVE-2024-47747: linux - In the Linux kernel, the following vulnerability has been resolved: net: seeq: ...
In the Linux kernel, the following vulnerability has been resolved: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition In the ether3_probe function, a timer is initialized with a callback function ether3_ledoff, bound to &prev(dev)->timer. Once the timer is started, there is a risk of a race condition if the module or device is removed,
debian
CVE-2024-41028HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41028 [HIGH] CVE-2024-41028: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...
In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_acpi: Fix array out-of-bounds access In order to use toshiba_dmi_quirks[] together with the standard DMI matching functions, it must be terminated by a empty entry. Since this entry is missing, an array out-of-bounds access occurs every time the quirk list is processed. Fix this
debian
CVE-2024-57908HIGHCVSS 7.1fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-57908 [HIGH] CVE-2024-57908: linux - In the Linux kernel, the following vulnerability has been resolved: iio: imu: k...
In the Linux kernel, the following vulnerability has been resolved: iio: imu: kmx61: fix information leak in triggered buffer The 'buffer' local array is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Initialize the array to zero before using
debian
CVE-2024-44940HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-44940 [HIGH] CVE-2024-44940: linux - In the Linux kernel, the following vulnerability has been resolved: fou: remove...
In the Linux kernel, the following vulnerability has been resolved: fou: remove warn in gue_gro_receive on unsupported protocol Drop the WARN_ON_ONCE inn gue_gro_receive if the encapsulated type is not known or does not have a GRO handler. Such a packet is easily constructed. Syzbot generates them and sets off this warning. Remove the warning as it is expected and not
debian
CVE-2024-56640HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56640 [HIGH] CVE-2024-56640: linux - In the Linux kernel, the following vulnerability has been resolved: net/smc: fi...
In the Linux kernel, the following vulnerability has been resolved: net/smc: fix LGR and link use-after-free issue We encountered a LGR/link use-after-free issue, which manifested as the LGR/link refcnt reaching 0 early and entering the clear process, making resource access unsafe. refcount_t: addition on 0; use-after-free. WARNING: CPU: 14 PID: 107447 at lib/refcount
debian
CVE-2024-41069HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41069 [HIGH] CVE-2024-41069: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: topol...
In the Linux kernel, the following vulnerability has been resolved: ASoC: topology: Fix references to freed memory Most users after parsing a topology file, release memory used by it, so having pointer references directly into topology file contents is wrong. Use devm_kmemdup(), to allocate memory as needed.
Scope: local
bookworm: resolved (fixed in 6.1.106-1)
bullsey
debian
CVE-2024-42301HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-42301 [HIGH] CVE-2024-42301: linux - In the Linux kernel, the following vulnerability has been resolved: dev/parport...
In the Linux kernel, the following vulnerability has been resolved: dev/parport: fix the array out-of-bounds risk Fixed array out-of-bounds issues caused by sprintf by replacing it with snprintf for safer data copying, ensuring the destination buffer is not overflowed. Below is the stack trace I encountered during the actual issue: [ 66.575408s] [pid:5118,cpu4,QThread
debian
CVE-2024-40903HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40903 [HIGH] CVE-2024-40903: linux - In the Linux kernel, the following vulnerability has been resolved: usb: typec:...
In the Linux kernel, the following vulnerability has been resolved: usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps There could be a potential use-after-free case in tcpm_register_source_caps(). This could happen when: * new (say invalid) source caps are advertised * the existing source caps are unregistered * tcpm_register_source_caps() returns
debian
CVE-2024-26982HIGHCVSS 7.1fixed in linux 6.1.133-1 (bookworm)2024
CVE-2024-26982 [HIGH] CVE-2024-26982: linux - In the Linux kernel, the following vulnerability has been resolved: Squashfs: c...
In the Linux kernel, the following vulnerability has been resolved: Squashfs: check the inode number is not the invalid value of zero Syskiller has produced an out of bounds access in fill_meta_index(). That out of bounds access is ultimately caused because the inode has an inode number with the invalid value of zero, which was not checked. The reason this causes the
debian
CVE-2024-50155HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50155 [HIGH] CVE-2024-50155: linux - In the Linux kernel, the following vulnerability has been resolved: netdevsim: ...
In the Linux kernel, the following vulnerability has been resolved: netdevsim: use cond_resched() in nsim_dev_trap_report_work() I am still seeing many syzbot reports hinting that syzbot might fool nsim_dev_trap_report_work() with hundreds of ports [1] Lets use cond_resched(), and system_unbound_wq instead of implicit system_wq. [1] INFO: task syz-executor:20633 block
debian
CVE-2024-50035HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50035 [HIGH] CVE-2024-50035: linux - In the Linux kernel, the following vulnerability has been resolved: ppp: fix pp...
In the Linux kernel, the following vulnerability has been resolved: ppp: fix ppp_async_encode() illegal access syzbot reported an issue in ppp_async_encode() [1] In this case, pppoe_sendmsg() is called with a zero size. Then ppp_async_encode() is called with an empty skb. BUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline] BUG: KMSAN:
debian
CVE-2024-50067HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50067 [HIGH] CVE-2024-50067: linux - In the Linux kernel, the following vulnerability has been resolved: uprobe: avo...
In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetch args into a percpu buffer, and then copy to ring buffer to avoid non-atomic context problem. Sometimes user-space strings, arrays can be very large, but the size of percpu buffer is only page size. And store_trace_args()
debian
CVE-2024-40900HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40900 [HIGH] CVE-2024-40900: linux - In the Linux kernel, the following vulnerability has been resolved: cachefiles:...
In the Linux kernel, the following vulnerability has been resolved: cachefiles: remove requests from xarray during flushing requests Even with CACHEFILES_DEAD set, we can still read the requests, so in the following concurrency the request may be used after it has been freed: mount | daemon_thread1 | daemon_thread2 -----------------------------------------------------
debian
CVE-2024-44974HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-44974 [HIGH] CVE-2024-44974: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: ...
In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: avoid possible UaF when selecting endp select_local_address() and select_signal_address() both select an endpoint entry from the list inside an RCU protected section, but return a reference to it, to be read later on. If the entry is dereferenced after the RCU unlock, reading info could cau
debian