Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 74 of 132
CVE-2024-46725HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46725 [HIGH] CVE-2024-46725: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds write warning Check the ring type value to fix the out-of-bounds write warning
Scope: local
bookworm: resolved (fixed in 6.1.112-1)
bullseye: resolved (fixed in 5.10.226-1)
forky: resolved (fixed in 6.10.9-1)
sid: resolved (fixed in 6.10.9-1)
trixie: resolved (fixed in 6.
debian
CVE-2024-58034HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2024
CVE-2024-58034 [HIGH] CVE-2024-58034: linux - In the Linux kernel, the following vulnerability has been resolved: memory: teg...
In the Linux kernel, the following vulnerability has been resolved: memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_code() As of_find_node_by_name() release the reference of the argument device node, tegra_emc_find_node_by_ram_code() releases some device nodes while still in use, resulting in possible UAFs. According to the bindings and
debian
CVE-2024-41070HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41070 [HIGH] CVE-2024-41070: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: PPC: B...
In the Linux kernel, the following vulnerability has been resolved: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() Al reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group(). It looks up `stt` from tablefd, but then continues to use it after doing fdput() on the returned fd. After the fdput() the tablefd is free to be clo
debian
CVE-2024-36978HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-36978 [HIGH] CVE-2024-36978: linux - In the Linux kernel, the following vulnerability has been resolved: net: sched:...
In the Linux kernel, the following vulnerability has been resolved: net: sched: sch_multiq: fix possible OOB write in multiq_tune() q->bands will be assigned to qopt->bands to execute subsequent code logic after kmalloc. So the old q->bands should not be used in kmalloc. Otherwise, an out-of-bounds write will occur.
Scope: local
bookworm: resolved (fixed in 6.1.99-1)
debian
CVE-2024-50063HIGHCVSS 7.8fixed in linux 6.1.135-1 (bookworm)2024
CVE-2024-50063 [HIGH] CVE-2024-50063: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Preven...
In the Linux kernel, the following vulnerability has been resolved: bpf: Prevent tail call between progs attached to different hooks bpf progs can be attached to kernel functions, and the attached functions can take different parameters or return different return values. If prog attached to one kernel function tail calls prog attached to another kernel function, the c
debian
CVE-2024-42314HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-42314 [HIGH] CVE-2024-42314: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ...
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix extent map use-after-free when adding pages to compressed bio At add_ra_bio_pages() we are accessing the extent map to calculate 'add_size' after we dropped our reference on the extent map, resulting in a use-after-free. Fix this by computing 'add_size' before dropping our extent map refere
debian
CVE-2024-41087HIGHCVSS 7.8fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-41087 [HIGH] CVE-2024-41087: linux - In the Linux kernel, the following vulnerability has been resolved: ata: libata...
In the Linux kernel, the following vulnerability has been resolved: ata: libata-core: Fix double free on error If e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump to the err_out label, which will call devres_release_group(). devres_release_group() will trigger a call to ata_host_release(). ata_host_release() calls kfree(host), so executing the kf
debian
CVE-2024-37078HIGHCVSS 7.1fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-37078 [HIGH] CVE-2024-37078: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix...
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential kernel bug due to lack of writeback flag waiting Destructive writes to a block device on which nilfs2 is mounted can cause a kernel bug in the folio/page writeback start routine or writeback end routine (__folio_start_writeback in the log below): kernel BUG at mm/page-writeback.c
debian
CVE-2024-27397HIGHCVSS 7.0fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-27397 [HIGH] CVE-2024-27397: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a timestamp field at the beginning of the transaction, store it in the nftables per-netns area. Update set backend .insert, .deactivate and sync gc path to use the timestamp, this avoids that an element expires while control plan
debian
CVE-2024-50121HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-50121 [HIGH] CVE-2024-50121: linux - In the Linux kernel, the following vulnerability has been resolved: nfsd: cance...
In the Linux kernel, the following vulnerability has been resolved: nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net In the normal case, when we excute `echo 0 > /proc/fs/nfsd/threads`, the function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will release all resources related to the hashed `nfs4_client`. If the `nfsd_client_shrinke
debian
CVE-2024-57929HIGHCVSS 7.1fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-57929 [HIGH] CVE-2024-57929: linux - In the Linux kernel, the following vulnerability has been resolved: dm array: f...
In the Linux kernel, the following vulnerability has been resolved: dm array: fix releasing a faulty array block twice in dm_array_cursor_end When dm_bm_read_lock() fails due to locking or checksum errors, it releases the faulty block implicitly while leaving an invalid output pointer behind. The caller of dm_bm_read_lock() should not operate on this invalid dm_block
debian
CVE-2024-42092HIGHCVSS 7.8fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42092 [HIGH] CVE-2024-42092: linux - In the Linux kernel, the following vulnerability has been resolved: gpio: davin...
In the Linux kernel, the following vulnerability has been resolved: gpio: davinci: Validate the obtained number of IRQs Value of pdata->gpio_unbanked is taken from Device Tree. In case of broken DT due to any error this value can be any. Without this value validation there can be out of chips->irqs array boundaries access in davinci_gpio_probe(). Validate the obtained
debian
CVE-2024-49895HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49895 [HIGH] CVE-2024-49895: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation This commit addresses a potential index out of bounds issue in the `cm3_helper_translate_curve_to_degamma_hw_format` function in the DCN30 color management module. The issue could occur when the index 'i' exceeds the
debian
CVE-2024-56678HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56678 [HIGH] CVE-2024-56678: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/mm/...
In the Linux kernel, the following vulnerability has been resolved: powerpc/mm/fault: Fix kfence page fault reporting copy_from_kernel_nofault() can be called when doing read of /proc/kcore. /proc/kcore can have some unmapped kfence objects which when read via copy_from_kernel_nofault() can cause page faults. Since *_nofault() functions define their own fixup table fo
debian
CVE-2024-58240HIGHCVSS 7.8fixed in linux 6.1.153-1 (bookworm)2024
CVE-2024-58240 [HIGH] CVE-2024-58240: linux - In the Linux kernel, the following vulnerability has been resolved: tls: separa...
In the Linux kernel, the following vulnerability has been resolved: tls: separate no-async decryption request handling from async If we're not doing async, the handling is much simpler. There's no reference counting, we just need to wait for the completion to wake us up and return its result. We should preferably also use a separate crypto_wait. I'm not seeing a UAF a
debian
CVE-2024-50268HIGHCVSS 7.1fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50268 [HIGH] CVE-2024-50268: linux - In the Linux kernel, the following vulnerability has been resolved: usb: typec:...
In the Linux kernel, the following vulnerability has been resolved: usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() The "*cmd" variable can be controlled by the user via debugfs. That means "new_cam" can be as high as 255 while the size of the uc->updated[] array is UCSI_MAX_ALTMODES (30). The call tree is: ucsi_cmd() // val comes from sim
debian
CVE-2024-46830HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46830 [HIGH] CVE-2024-46830: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: x86: A...
In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS Grab kvm->srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly leave nested VMX/SVM if SMM mode is being toggled, and leaving nested VMX reads guest memory. Note, kvm_vcpu_ioctl_x86_set_vcpu_events() can also be called from KVM_RU
debian
CVE-2024-50124HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50124 [HIGH] CVE-2024-50124: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix UAF on iso_sock_timeout conn->sk maybe have been unlinked/freed while waiting for iso_conn_lock so this checks if the conn->sk is still valid by checking if it part of iso_sk_list.
Scope: local
bookworm: resolved (fixed in 6.1.115-1)
bullseye: resolved
forky: resolved (fixed in 6.1
debian
CVE-2024-50083HIGHCVSS 7.5fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50083 [HIGH] CVE-2024-50083: linux - In the Linux kernel, the following vulnerability has been resolved: tcp: fix mp...
In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5227 at net/mptcp/protocol.c:695 __mptcp_move_skbs_fro
debian
CVE-2024-50261HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50261 [HIGH] CVE-2024-50261: linux - In the Linux kernel, the following vulnerability has been resolved: macsec: Fix...
In the Linux kernel, the following vulnerability has been resolved: macsec: Fix use-after-free while sending the offloading packet KASAN reports the following UAF. The metadata_dst, which is used to store the SCI value for macsec offload, is already freed by metadata_dst_free() in macsec_free_netdev(), while driver still use it for sending the packet. To fix this issu
debian