Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 78 of 132
CVE-2024-56675HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56675 [HIGH] CVE-2024-56675: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UA...
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors Uprobes always use bpf_prog_run_array_uprobe() under tasks-trace-RCU protection. But it is possible to attach a non-sleepable BPF program to a uprobe, and non-sleepable BPF programs are freed via normal RCU (see __bpf_prog_put_noref()). This
debian
CVE-2024-41091HIGHCVSS 7.1fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41091 [HIGH] CVE-2024-41091: linux - In the Linux kernel, the following vulnerability has been resolved: tun: add mi...
In the Linux kernel, the following vulnerability has been resolved: tun: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tun_xdp_one() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tun_xdp_one-->eth_type_trans() may access the Ethernet head
debian
CVE-2024-47695HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47695 [HIGH] CVE-2024-47695: linux - In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs-c...
In the Linux kernel, the following vulnerability has been resolved: RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds In the function init_conns(), after the create_con() and create_cm() for loop if something fails. In the cleanup for loop after the destroy tag, we access out of bound memory because cid is set to clt_path->s.con_num. This commits resets the ci
debian
CVE-2024-57791HIGHCVSS 7.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-57791 [HIGH] CVE-2024-57791: linux - In the Linux kernel, the following vulnerability has been resolved: net/smc: ch...
In the Linux kernel, the following vulnerability has been resolved: net/smc: check return value of sock_recvmsg when draining clc data When receiving clc msg, the field length in smc_clc_msg_hdr indicates the length of msg should be received from network and the value should not be fully trusted as it is from the network. Once the value of length exceeds the value of
debian
CVE-2024-46747HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46747 [HIGH] CVE-2024-46747: linux - In the Linux kernel, the following vulnerability has been resolved: HID: cougar...
In the Linux kernel, the following vulnerability has been resolved: HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup report_fixup for the Cougar 500k Gaming Keyboard was not verifying that the report descriptor size was correct before accessing it
Scope: local
bookworm: resolved (fixed in 6.1.112-1)
bullseye: resolved (fixed in 5.10.226-1)
forky: resolv
debian
CVE-2024-46858HIGHCVSS 7.0fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46858 [HIGH] CVE-2024-46858: linux - In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: ...
In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: Fix uaf in __timer_delete_sync There are two paths to access mptcp_pm_del_add_timer, result in a race condition: CPU1 CPU2 ==== ==== net_rx_action napi_poll netlink_sendmsg __napi_poll netlink_unicast process_backlog netlink_unicast_kernel __netif_receive_skb genl_rcv __netif_receive_skb_on
debian
CVE-2024-56604HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56604 [HIGH] CVE-2024-56604: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc() bt_sock_alloc() attaches allocated sk object to the provided sock object. If rfcomm_dlc_alloc() fails, we release the sk object, but leave the dangling pointer in the sock object, which may cause use-after-free. Fix this by sw
debian
CVE-2024-41090HIGHCVSS 7.1fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41090 [HIGH] CVE-2024-41090: linux - In the Linux kernel, the following vulnerability has been resolved: tap: add mi...
In the Linux kernel, the following vulnerability has been resolved: tap: add missing verification for short frame The cited commit missed to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assu
debian
CVE-2024-53170HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-53170 [HIGH] CVE-2024-53170: linux - In the Linux kernel, the following vulnerability has been resolved: block: fix ...
In the Linux kernel, the following vulnerability has been resolved: block: fix uaf for flush rq while iterating tags blk_mq_clear_flush_rq_mapping() is not called during scsi probe, by checking blk_queue_init_done(). However, QUEUE_FLAG_INIT_DONE is cleared in del_gendisk by commit aec89dc5d421 ("block: keep q_usage_counter in atomic mode after del_gendisk"), hence fo
debian
CVE-2024-49889HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49889 [HIGH] CVE-2024-49889: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: avoid...
In the Linux kernel, the following vulnerability has been resolved: ext4: avoid use-after-free in ext4_ext_show_leaf() In ext4_find_extent(), path may be freed by error or be reallocated, so using a previously saved *ppath may have been freed and thus may trigger use-after-free, as follows: ext4_split_extent path = *ppath; ext4_split_extent_at(ppath) path = ext4_find_
debian
CVE-2024-42094HIGHCVSS 7.1fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42094 [HIGH] CVE-2024-42094: linux - In the Linux kernel, the following vulnerability has been resolved: net/iucv: A...
In the Linux kernel, the following vulnerability has been resolved: net/iucv: Avoid explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack is not recommended since it can cause potential stack overflow. Instead, kernel code should always use *cpumask_var API(s) to allocate cpumask var in config-n
debian
CVE-2024-56596HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56596 [HIGH] CVE-2024-56596: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: fix ar...
In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in jfs_readdir The stbl might contain some invalid values. Added a check to return error code in that case.
Scope: local
bookworm: resolved (fixed in 6.1.123-1)
bullseye: resolved (fixed in 5.10.234-1)
forky: resolved (fixed in 6.12.5-1)
sid: resolved (fixed in 6.12.
debian
CVE-2024-40939HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40939 [HIGH] CVE-2024-40939: linux - In the Linux kernel, the following vulnerability has been resolved: net: wwan: ...
In the Linux kernel, the following vulnerability has been resolved: net: wwan: iosm: Fix tainted pointer delete is case of region creation fail In case of region creation fail in ipc_devlink_create_region(), previously created regions delete process starts from tainted pointer which actually holds error code value. Fix this bug by decreasing region index before delete
debian
CVE-2024-56598HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56598 [HIGH] CVE-2024-56598: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: array-...
In the Linux kernel, the following vulnerability has been resolved: jfs: array-index-out-of-bounds fix in dtReadFirst The value of stbl can be sometimes out of bounds due to a bad filesystem. Added a check with appopriate return of error code in that case.
Scope: local
bookworm: resolved (fixed in 6.1.123-1)
bullseye: resolved (fixed in 5.10.234-1)
forky: resolved (fi
debian
CVE-2024-42313HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-42313 [HIGH] CVE-2024-42313: linux - In the Linux kernel, the following vulnerability has been resolved: media: venu...
In the Linux kernel, the following vulnerability has been resolved: media: venus: fix use after free in vdec_close There appears to be a possible use after free with vdec_close(). The firmware will add buffer release work to the work queue through HFI callbacks as a normal part of decoding. Randomly closing the decoder device from userspace during normal decoding can
debian
CVE-2024-39503HIGHCVSS 7.0fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39503 [HIGH] CVE-2024-39503: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type Lion Ackermann reported that there is a race condition between namespace cleanup in ipset and the garbage collection of the list:set type. The namespace cleanup can destroy the list:set type of sets while the gc of the se
debian
CVE-2024-56672HIGHCVSS 7.0fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56672 [HIGH] CVE-2024-56672: linux - In the Linux kernel, the following vulnerability has been resolved: blk-cgroup:...
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: =============================
debian
CVE-2024-46724HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46724 [HIGH] CVE-2024-46724: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number Check the fb_channel_number range to avoid the array out-of-bounds read error
Scope: local
bookworm: resolved (fixed in 6.1.112-1)
bullseye: resolved (fixed in 5.10.226-1)
forky: resolved (fixed in 6.10.9-1)
sid: resolved (fixed in 6.10.9-1)
debian
CVE-2024-46723HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46723 [HIGH] CVE-2024-46723: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ucode out-of-bounds read warning Clear warning that read ucode[] may out-of-bounds.
Scope: local
bookworm: resolved (fixed in 6.1.112-1)
bullseye: resolved (fixed in 5.10.226-1)
forky: resolved (fixed in 6.10.9-1)
sid: resolved (fixed in 6.10.9-1)
trixie: resolved (fixed in 6.10.9-1)
debian
CVE-2024-56608HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-56608 [HIGH] CVE-2024-56608: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create' An issue was identified in the dcn21_link_encoder_create function where an out-of-bounds access could occur when the hpd_source index was used to reference the link_enc_hpd_regs array. This array has a fixed size and the index wa
debian