Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 80 of 132
CVE-2024-35963HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-35963 [HIGH] CVE-2024-35963: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sock: Fix not validating setsockopt user input Check user input length before copying data.
Scope: local
bookworm: resolved (fixed in 6.1.115-1)
bullseye: resolved
forky: resolved (fixed in 6.8.9-1)
sid: resolved (fixed in 6.8.9-1)
trixie: resolved (fixed in 6.8.9-1)
debian
CVE-2024-50007HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50007 [HIGH] CVE-2024-50007: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: asihp...
In the Linux kernel, the following vulnerability has been resolved: ALSA: asihpi: Fix potential OOB array access ASIHPI driver stores some values in the static array upon a response from the driver, and its index depends on the firmware. We shouldn't trust it blindly. This patch adds a sanity check of the array index to fit in the array size.
Scope: local
bookworm: re
debian
CVE-2024-49894HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49894 [HIGH] CVE-2024-49894: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index out of bounds in degamma hardware format translation Fixes index out of bounds issue in `cm_helper_translate_curve_to_degamma_hw_format` function. The issue could occur when the index 'i' exceeds the number of transfer function points (TRANSFER_FUNC_POINTS). The fix adds a c
debian
CVE-2024-50264HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50264 [HIGH] CVE-2024-50264: linux - In the Linux kernel, the following vulnerability has been resolved: vsock/virti...
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans During loopback communication, a dangling pointer can be created in vsk->trans, potentially leading to a Use-After-Free condition. This issue is resolved by initializing vsk->trans to NULL.
Scope: local
bookworm: resolved (fi
debian
CVE-2024-47682HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47682 [HIGH] CVE-2024-47682: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: sd: F...
In the Linux kernel, the following vulnerability has been resolved: scsi: sd: Fix off-by-one error in sd_read_block_characteristics() Ff the device returns page 0xb1 with length 8 (happens with qemu v2.x, for example), sd_read_block_characteristics() may attempt an out-of-bounds memory access when accessing the zoned field at offset 8.
Scope: local
bookworm: resolved
debian
CVE-2024-46853HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46853 [HIGH] CVE-2024-46853: linux - In the Linux kernel, the following vulnerability has been resolved: spi: nxp-fs...
In the Linux kernel, the following vulnerability has been resolved: spi: nxp-fspi: fix the KASAN report out-of-bounds bug Change the memcpy length to fix the out-of-bounds issue when writing the data that is not 4 byte aligned to TX FIFO. To reproduce the issue, write 3 bytes data to NOR chip. dd if=3b of=/dev/mtd0 [ 36.926103] ========================================
debian
CVE-2024-53214HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53214 [HIGH] CVE-2024-53214: linux - In the Linux kernel, the following vulnerability has been resolved: vfio/pci: P...
In the Linux kernel, the following vulnerability has been resolved: vfio/pci: Properly hide first-in-list PCIe extended capability There are cases where a PCIe extended capability should be hidden from the user. For example, an unknown capability (i.e., capability with ID greater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally chosen to be hidden from t
debian
CVE-2024-57876HIGHCVSS 7.0fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-57876 [HIGH] CVE-2024-57876: linux - In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst:...
In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Fix resetting msg rx state after topology removal If the MST topology is removed during the reception of an MST down reply or MST up request sideband message, the drm_dp_mst_topology_mgr::up_req_recv/down_rep_recv states could be reset from one thread via drm_dp_mst_topology_mgr_set_mst(fa
debian
CVE-2024-44998HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-44998 [HIGH] CVE-2024-44998: linux - In the Linux kernel, the following vulnerability has been resolved: atm: idt772...
In the Linux kernel, the following vulnerability has been resolved: atm: idt77252: prevent use after free in dequeue_rx() We can't dereference "skb" after calling vcc->push() because the skb is released.
Scope: local
bookworm: resolved (fixed in 6.1.112-1)
bullseye: resolved (fixed in 5.10.226-1)
forky: resolved (fixed in 6.10.7-1)
sid: resolved (fixed in 6.10.7-1)
tr
debian
CVE-2024-57979HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2024
CVE-2024-57979 [HIGH] CVE-2024-57979: linux - In the Linux kernel, the following vulnerability has been resolved: pps: Fix a ...
In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consistent use-after-free in sys_exit() from gpsd when rebooting: pps pps1: removed ------------[ cut here ]------------ kobject: '(null)' (00000000db4bec24): is not initialized, yet kobject_put() is being called. WARNING: CPU: 2
debian
CVE-2024-56551HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-56551 [HIGH] CVE-2024-56551: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu:...
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [ +0.000016] H
debian
CVE-2024-57951HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-57951 [HIGH] CVE-2024-57951: linux - In the Linux kernel, the following vulnerability has been resolved: hrtimers: H...
In the Linux kernel, the following vulnerability has been resolved: hrtimers: Handle CPU state correctly on hotplug Consider a scenario where a CPU transitions from CPUHP_ONLINE to halfway through a CPU hotunplug down to CPUHP_HRTIMERS_PREPARE, and then back to CPUHP_ONLINE: Since hrtimers_prepare_cpu() does not run, cpu_base.hres_active remains set to 1 throughout. H
debian
CVE-2024-46774HIGHCVSS 7.1fixed in linux 6.1.135-1 (bookworm)2024
CVE-2024-46774 [HIGH] CVE-2024-46774: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/rta...
In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() Smatch warns: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential spectre issue 'args.args' [r] (local cap) The 'nargs' and 'nret' locals come directly from a user-supplied buffer and are used as indexes into a small stack-
debian
CVE-2024-53165HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53165 [HIGH] CVE-2024-53165: linux - In the Linux kernel, the following vulnerability has been resolved: sh: intc: F...
In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let's only add it to the list after everything has succeeded.
Scope: local
bookworm: resolved (f
debian
CVE-2024-50126HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50126 [HIGH] CVE-2024-50126: linux - In the Linux kernel, the following vulnerability has been resolved: net: sched:...
In the Linux kernel, the following vulnerability has been resolved: net: sched: use RCU read-side critical section in taprio_dump() Fix possible use-after-free in 'taprio_dump()' by adding RCU read-side critical section there. Never seen on x86 but found on a KASAN-enabled arm64 system when investigating https://syzkaller.appspot.com/bug?extid=b65e0af58423fc8a73aa: [T
debian
CVE-2024-39469HIGHCVSS 7.1fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39469 [HIGH] CVE-2024-39469: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix...
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext2 implementation, and if the folio/page cannot be read or nilfs_check_folio() fails, it will falsely determine the directo
debian
CVE-2024-40929HIGHCVSS 7.1fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40929 [HIGH] CVE-2024-40929: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwi...
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids In some versions of cfg80211, the ssids poinet might be a valid one even though n_ssids is 0. Accessing the pointer in this case will cuase an out-of-bound access. Fix this by checking n_ssids first.
Scope: local
bookworm: resolved (fixed in
debian
CVE-2024-57887HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-57887 [HIGH] CVE-2024-57887: linux - In the Linux kernel, the following vulnerability has been resolved: drm: adv751...
In the Linux kernel, the following vulnerability has been resolved: drm: adv7511: Fix use-after-free in adv7533_attach_dsi() The host_node pointer was assigned and freed in adv7533_parse_dt(), and later, adv7533_attach_dsi() uses the same. Fix this use-after-free issue by dropping of_node_put() in adv7533_parse_dt() and calling of_node_put() in error path of probe() a
debian
CVE-2024-53208HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53208 [HIGH] CVE-2024-53208: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353 Read of size 8 at addr ffff888029b4dd18 by task k
debian
CVE-2024-49981HIGHCVSS 7.0fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49981 [HIGH] CVE-2024-49981: linux - In the Linux kernel, the following vulnerability has been resolved: media: venu...
In the Linux kernel, the following vulnerability has been resolved: media: venus: fix use after free bug in venus_remove due to race condition in venus_probe, core->work is bound with venus_sys_error_handler, which is used to handle error. The code use core->sys_err_done to make sync work. The core->work is started in venus_event_notify. If we call venus_remove, there
debian