Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 79 of 132
CVE-2024-46815HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46815 [HIGH] CVE-2024-46815: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] [WHY & HOW] num_valid_sets needs to be checked to avoid a negative index when accessing reader_wm_sets[num_valid_sets - 1]. This fixes an OVERRUN issue reported by Coverity. Scope: local bookworm: resolved (fixed in 6.1.112-1) bul
debian
CVE-2024-35964HIGHCVSS 7.1fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-35964 [HIGH] CVE-2024-35964: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix not validating setsockopt user input Check user input length before copying data. Scope: local bookworm: resolved (fixed in 6.1.119-1) bullseye: resolved forky: resolved (fixed in 6.8.9-1) sid: resolved (fixed in 6.8.9-1) trixie: resolved (fixed in 6.8.9-1)
debian
CVE-2024-56600HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56600 [HIGH] CVE-2024-56600: linux - In the Linux kernel, the following vulnerability has been resolved: net: inet6:... In the Linux kernel, the following vulnerability has been resolved: net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear th
debian
CVE-2024-50115HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50115 [HIGH] CVE-2024-50115: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: ... In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory Ignore nCR3[4:0] when loading PDPTEs from memory for nested SVM, as bits 4:0 of CR3 are ignored when PAE paging is used, and thus VMRUN doesn't enforce 32-byte alignment of nCR3. In the absolute worst case scenario, failure to ignore bits 4:0
debian
CVE-2024-39494HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39494 [HIGH] CVE-2024-39494: linux - In the Linux kernel, the following vulnerability has been resolved: ima: Fix us... In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on rename and the earlier value can be freed; there are conditions sufficient to stabilize it (->d_lock on dentry, ->d_lock on its parent, ->i_rwsem exclusive on the parent's inode, rename_lock), but none of those are met at any
debian
CVE-2024-50150HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50150 [HIGH] CVE-2024-50150: linux - In the Linux kernel, the following vulnerability has been resolved: usb: typec:... In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmode should keep reference to parent The altmode device release refers to its parent device, but without keeping a reference to it. When registering the altmode, get a reference to the parent and put it in the release function. Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, w
debian
CVE-2024-41051HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41051 [HIGH] CVE-2024-41051: linux - In the Linux kernel, the following vulnerability has been resolved: cachefiles:... In the Linux kernel, the following vulnerability has been resolved: cachefiles: wait for ondemand_object_worker to finish when dropping object When queuing ondemand_object_worker() to re-open the object, cachefiles_object is not pinned. The cachefiles_object may be freed when the pending read request is completed intentionally and the related erofs is umounted. If ond
debian
CVE-2024-41057HIGHCVSS 7.0fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41057 [HIGH] CVE-2024-41057: linux - In the Linux kernel, the following vulnerability has been resolved: cachefiles:... In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() We got the following issue in our fault injection stress test: ================================================================== BUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600 Read of size 8 at addr ffff888
debian
CVE-2024-58014HIGHCVSS 7.1fixed in linux 6.1.129-1 (bookworm)2024
CVE-2024-58014 [HIGH] CVE-2024-58014: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: brcms... In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() In 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN() instead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access. Compile tested only. Found by Linux Verification Center (linuxtesting.org) with SVACE. Scop
debian
CVE-2024-47723HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47723 [HIGH] CVE-2024-47723: linux - In the Linux kernel, the following vulnerability has been resolved: jfs: fix ou... In the Linux kernel, the following vulnerability has been resolved: jfs: fix out-of-bounds in dbNextAG() and diAlloc() In dbNextAG() , there is no check for the case where bmp->db_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount(). And in dbNextAG(), a check for the case wh
debian
CVE-2024-57850HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-57850 [HIGH] CVE-2024-57850: linux - In the Linux kernel, the following vulnerability has been resolved: jffs2: Prev... In the Linux kernel, the following vulnerability has been resolved: jffs2: Prevent rtime decompress memory corruption The rtime decompression routine does not fully check bounds during the entirety of the decompression pass and can corrupt memory outside the decompression buffer if the compressed data is corrupted. This adds the required check to prevent this failure
debian
CVE-2024-56708HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56708 [HIGH] CVE-2024-56708: linux - In the Linux kernel, the following vulnerability has been resolved: EDAC/igen6:... In the Linux kernel, the following vulnerability has been resolved: EDAC/igen6: Avoid segmentation fault on module unload The segmentation fault happens because: During modprobe: 1. In igen6_probe(), igen6_pvt will be allocated with kzalloc() 2. In igen6_register_mci(), mci->pvt_info will point to &igen6_pvt->imc[mc] During rmmod: 1. In mci_release() in edac_mc.c, it
debian
CVE-2024-53141HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53141 [HIGH] CVE-2024-53141: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: add missing range check in bitmap_ip_uadt When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing and it seems that the vulnerability occ
debian
CVE-2024-53103HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-53103 [HIGH] CVE-2024-53103: linux - In the Linux kernel, the following vulnerability has been resolved: hv_sock: In... In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer When hvs is released, there is a possibility that vsk->trans may not be initialized to NULL, which could lead to a dangling pointer. This issue is resolved by initializing vsk->trans to NULL. Scope: local bookworm: resolved (fixed
debian
CVE-2024-46722HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46722 [HIGH] CVE-2024-46722: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:... In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix mc_data out-of-bounds read warning Clear warning that read mc_data[i-1] may out-of-bounds. Scope: local bookworm: resolved (fixed in 6.1.112-1) bullseye: resolved (fixed in 5.10.226-1) forky: resolved (fixed in 6.10.9-1) sid: resolved (fixed in 6.10.9-1) trixie: resolved (fixed in 6.10
debian
CVE-2024-49950HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-49950 [HIGH] CVE-2024-49950: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkal
debian
CVE-2024-49996HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-49996 [HIGH] CVE-2024-49996: linux - In the Linux kernel, the following vulnerability has been resolved: cifs: Fix b... In the Linux kernel, the following vulnerability has been resolved: cifs: Fix buffer overflow when parsing NFS reparse points ReparseDataLength is sum of the InodeType size and DataBuffer size. So to get DataBuffer size it is needed to subtract InodeType's size from ReparseDataLength. Function cifs_strndup_from_utf16() is currentlly accessing buf->DataBuffer at positi
debian
CVE-2024-46814HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46814 [HIGH] CVE-2024-46814: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Check msg_id before processing transcation [WHY & HOW] HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid array index, and it needs checking before used. This fixes 4 OVERRUN issues reported by Coverity. Scope: local bookworm: resolved (fixed in 6.1.112-1) bullseye:
debian
CVE-2024-43877HIGHCVSS 7.1fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-43877 [HIGH] CVE-2024-43877: linux - In the Linux kernel, the following vulnerability has been resolved: media: pci:... In the Linux kernel, the following vulnerability has been resolved: media: pci: ivtv: Add check for DMA map result In case DMA fails, 'dma->SG_length' is 0. This value is later used to access 'dma->SGarray[dma->SG_length - 1]', which will cause out of bounds access. Add check to return early on invalid value. Adjust warnings accordingly. Found by Linux Verification Ce
debian
CVE-2024-40940HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40940 [HIGH] CVE-2024-40940: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: F... In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail In case of flow rule creation fail in mlx5_lag_create_port_sel_table(), instead of previously created rules, the tainted pointer is deleted deveral times. Fix this bug by using correct flow rules pointers. Found by Linux Verifica
debian