Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 73 of 132
CVE-2024-46798HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46798 [HIGH] CVE-2024-46798: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: dapm:... In the Linux kernel, the following vulnerability has been resolved: ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object When using kernel with the following extra config, - CONFIG_KASAN=y - CONFIG_KASAN_GENERIC=y - CONFIG_KASAN_INLINE=y - CONFIG_KASAN_VMALLOC=y - CONFIG_FRAME_WARN=4096 kernel detects that snd_pcm_suspend_all() access a freed 'snd_soc_pcm_runtime' objec
debian
CVE-2024-58054HIGHCVSS 7.1fixed in linux 6.1.129-1 (bookworm)2024
CVE-2024-58054 [HIGH] CVE-2024-58054: linux - In the Linux kernel, the following vulnerability has been resolved: staging: me... In the Linux kernel, the following vulnerability has been resolved: staging: media: max96712: fix kernel oops when removing module The following kernel oops is thrown when trying to remove the max96712 module: Unable to handle kernel paging request at virtual address 00007375746174db Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits S
debian
CVE-2024-42138HIGHCVSS 7.8fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42138 [HIGH] CVE-2024-42138: linux - In the Linux kernel, the following vulnerability has been resolved: mlxsw: core... In the Linux kernel, the following vulnerability has been resolved: mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file In case of invalid INI file mlxsw_linecard_types_init() deallocates memory but doesn't reset pointer to NULL and returns 0. In case of any error occurred after mlxsw_linecard_types_init() call, mlxsw_linecards_init() cal
debian
CVE-2024-57907HIGHCVSS 7.1fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-57907 [HIGH] CVE-2024-57907: linux - In the Linux kernel, the following vulnerability has been resolved: iio: adc: r... In the Linux kernel, the following vulnerability has been resolved: iio: adc: rockchip_saradc: fix information leak in triggered buffer The 'data' local struct is used to push data to user space from a triggered buffer, but it does not set values for inactive channels, as it only uses iio_for_each_active_channel() to assign new values. Initialize the struct to zero be
debian
CVE-2024-46743HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46743 [HIGH] CVE-2024-46743: linux - In the Linux kernel, the following vulnerability has been resolved: of/irq: Pre... In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk When of_irq_parse_raw() is invoked with a device address smaller than the interrupt parent node (from #address-cells property), KASAN detects the following out-of-bounds read when populating the initial match table (dyndbg="func o
debian
CVE-2024-46800HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46800 [HIGH] CVE-2024-46800: linux - In the Linux kernel, the following vulnerability has been resolved: sch/netem: ... In the Linux kernel, the following vulnerability has been resolved: sch/netem: fix use after free in netem_dequeue If netem_dequeue() enqueues packet to inner qdisc and that qdisc returns __NET_XMIT_STOLEN. The packet is dropped but qdisc_tree_reduce_backlog() is not called to update the parent's q.qlen, leading to the similar use-after-free as Commit e04991a48dbaf382
debian
CVE-2024-53197HIGHCVSS 7.8KEVfixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53197 [HIGH] CVE-2024-53197: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a... In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices A bogus device can provide a bNumConfigurations value that exceeds the initial value used in usb_get_configuration for allocating dev->config. This can lead to out-of-bounds accesses later, e.g. in usb_destroy_configurati
debian
CVE-2024-47659HIGHCVSS 8.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-47659 [HIGH] CVE-2024-47659: linux - In the Linux kernel, the following vulnerability has been resolved: smack: tcp:... In the Linux kernel, the following vulnerability has been resolved: smack: tcp: ipv4, fix incorrect labeling Currently, Smack mirrors the label of incoming tcp/ipv4 connections: when a label 'foo' connects to a label 'bar' with tcp/ipv4, 'foo' always gets 'foo' in returned ipv4 packets. So, 1) returned packets are incorrectly labeled ('foo' instead of 'bar') 2) 'bar'
debian
CVE-2024-58069HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2024
CVE-2024-58069 [HIGH] CVE-2024-58069: linux - In the Linux kernel, the following vulnerability has been resolved: rtc: pcf850... In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interface supports variable buffer sizes, while the regmap interface operates with fixed-size storage. If an nvmem client uses a buffer size less than 4 bytes, regmap_read will write out of bounds as it expects the buffer to point
debian
CVE-2024-56626HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56626 [HIGH] CVE-2024-56626: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ... In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write An offset from client could be a negative value, It could allows to write data outside the bounds of the allocated buffer. Note that this issue is coming when setting 'vfs objects = streams_xattr parameter' in ksmbd.conf. Scope: local bookworm:
debian
CVE-2024-56628HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56628 [HIGH] CVE-2024-56628: linux - In the Linux kernel, the following vulnerability has been resolved: LoongArch: ... In the Linux kernel, the following vulnerability has been resolved: LoongArch: Add architecture specific huge_pte_clear() When executing mm selftests run_vmtests.sh, there is such an error: BUG: Bad page state in process uffd-unit-tests pfn:00000 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x0 flags: 0xffff0000002000(reserved|node=0|zone=0|lastc
debian
CVE-2024-46738HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46738 [HIGH] CVE-2024-46738: linux - In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix u... In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix use-after-free when removing resource in vmci_resource_remove() When removing a resource from vmci_resource_table in vmci_resource_remove(), the search is performed using the resource handle by comparing context and resource fields. It is possible though to create two resources with differen
debian
CVE-2024-57838HIGHCVSS 7.1fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-57838 [HIGH] CVE-2024-57838: linux - In the Linux kernel, the following vulnerability has been resolved: s390/entry:... In the Linux kernel, the following vulnerability has been resolved: s390/entry: Mark IRQ entries to fix stack depot warnings The stack depot filters out everything outside of the top interrupt context as an uninteresting or irrelevant part of the stack traces. This helps with stack trace de-duplication, avoiding an explosion of saved stack traces that share the same I
debian
CVE-2024-53227HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53227 [HIGH] CVE-2024-53227: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: ... In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Fix use-after-free in bfad_im_module_exit() BUG: KASAN: slab-use-after-free in __lock_acquire+0x2aca/0x3a20 Read of size 8 at addr ffff8881082d80c8 by task modprobe/25303 Call Trace: dump_stack_lvl+0x95/0xe0 print_report+0xcb/0x620 kasan_report+0xbd/0xf0 __lock_acquire+0x2aca/0x3a20 lock_ac
debian
CVE-2024-53155HIGHCVSS 7.1fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53155 [HIGH] CVE-2024-53155: linux - In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix ... In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix uninitialized value in ocfs2_file_read_iter() Syzbot has reported the following KMSAN splat: BUG: KMSAN: uninit-value in ocfs2_file_read_iter+0x9a4/0xf80 ocfs2_file_read_iter+0x9a4/0xf80 __io_read+0x8d4/0x20f0 io_read+0x3e/0xf0 io_issue_sqe+0x42b/0x22c0 io_wq_submit_work+0xaf9/0xdc0 io_work
debian
CVE-2024-50033HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50033 [HIGH] CVE-2024-50033: linux - In the Linux kernel, the following vulnerability has been resolved: slip: make ... In the Linux kernel, the following vulnerability has been resolved: slip: make slhc_remember() more robust against malicious packets syzbot found that slhc_remember() was missing checks against malicious packets [1]. slhc_remember() only checked the size of the packet was at least 20, which is not good enough. We need to make sure the packet includes the IPv4 and TCP
debian
CVE-2024-44977HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-44977 [HIGH] CVE-2024-44977: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:... In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Validate TA binary size Add TA binary size validation to avoid OOB write. (cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442) Scope: local bookworm: resolved (fixed in 6.1.112-1) bullseye: resolved forky: resolved (fixed in 6.10.7-1) sid: resolved (fixed in 6.10.7-1) trixi
debian
CVE-2024-56650HIGHCVSS 7.1fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56650 [HIGH] CVE-2024-56650: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN: BUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70 Read of size 1 at addr ffff8881022da0c8 by task repro/5879 ... Call Trace: dump_stack_lvl+0x241/0x360 ? __pfx_dump_stack_lvl+0x10/0x10 ? _
debian
CVE-2024-50262HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50262 [HIGH] CVE-2024-50262: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix ou... In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key() trie_get_next_key() allocates a node stack with size trie->max_prefixlen, while it writes (trie->max_prefixlen + 1) nodes to the stack when it has full paths from the root to leaves. For example, consider a trie with max_prefixlen is 8, and the nodes
debian
CVE-2024-39496HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39496 [HIGH] CVE-2024-39496: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: zone... In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a zone's info during creation of a block group, we can race with a device replace operation and then trigger a use-after-free on the device that was just replaced (source device of the replace operation). This happens because
debian