Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 82 of 132
CVE-2024-46836HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46836 [HIGH] CVE-2024-46836: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget... In the Linux kernel, the following vulnerability has been resolved: usb: gadget: aspeed_udc: validate endpoint index for ast udc We should verify the bound of the array to assure that host may not manipulate the index to point past endpoint array. Found by static analysis. Scope: local bookworm: resolved (fixed in 6.1.112-1) bullseye: resolved forky: resolved (fixed i
debian
CVE-2024-46871HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46871 [HIGH] CVE-2024-46871: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX [Why & How] It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller number to create array dmub_callback & dmub_thread_offload has potential to access item out of array bound. Fix it. Scope: local bo
debian
CVE-2024-56633HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56633 [HIGH] CVE-2024-56633: linux - In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Fi... In the Linux kernel, the following vulnerability has been resolved: tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg The current sk memory accounting logic in __SK_REDIRECT is pre-uncharging tosend bytes, which is either msg->sg.size or a smaller value apply_bytes. Potential problems with this strategy are as follows: - If the actual sent bytes are smaller th
debian
CVE-2024-46854HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46854 [HIGH] CVE-2024-46854: linux - In the Linux kernel, the following vulnerability has been resolved: net: dpaa: ... In the Linux kernel, the following vulnerability has been resolved: net: dpaa: Pad packets to ETH_ZLEN When sending packets under 60 bytes, up to three bytes of the buffer following the data may be leaked. Avoid this by extending all packets to ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be reproduced by running $ ping -s 11 destination Scope: lo
debian
CVE-2024-58072HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2024
CVE-2024-58072 [HIGH] CVE-2024-58072: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwi... In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe
debian
CVE-2024-50128HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50128 [HIGH] CVE-2024-50128: linux - In the Linux kernel, the following vulnerability has been resolved: net: wwan: ... In the Linux kernel, the following vulnerability has been resolved: net: wwan: fix global oob in wwan_rtnl_policy The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to a global out-of-bounds read when parsing the netlink attributes. Exactly same bug cause as the oob fixed in commit b33fb5b801c6 ("net: qualcomm: rmnet: fix global oob in rmnet_policy"
debian
CVE-2024-57904HIGHCVSS 7.8fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-57904 [HIGH] CVE-2024-57904: linux - In the Linux kernel, the following vulnerability has been resolved: iio: adc: a... In the Linux kernel, the following vulnerability has been resolved: iio: adc: at91: call input_free_device() on allocated iio_dev Current implementation of at91_ts_register() calls input_free_deivce() on st->ts_input, however, the err label can be reached before the allocated iio_dev is stored to st->ts_input. Thus call input_free_device() on input instead of st->ts_i
debian
CVE-2024-53082HIGHCVSS 7.1fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-53082 [HIGH] CVE-2024-53082: linux - In the Linux kernel, the following vulnerability has been resolved: virtio_net:... In the Linux kernel, the following vulnerability has been resolved: virtio_net: Add hash_key_length check Add hash_key_length check in virtnet_probe() to avoid possible out of bound errors when setting/reading the hash key. Scope: local bookworm: resolved (fixed in 6.1.119-1) bullseye: resolved forky: resolved (fixed in 6.11.9-1) sid: resolved (fixed in 6.11.9-1) trix
debian
CVE-2024-39499HIGHCVSS 7.1fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39499 [HIGH] CVE-2024-39499: linux - In the Linux kernel, the following vulnerability has been resolved: vmci: preve... In the Linux kernel, the following vulnerability has been resolved: vmci: prevent speculation leaks by sanitizing event in event_deliver() Coverity spotted that event_msg is controlled by user-space, event_msg->event_data.event is passed to event_deliver() and used as an index without sanitization. This change ensures that the event index is sanitized to mitigate any
debian
CVE-2024-50151HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50151 [HIGH] CVE-2024-50151: linux - In the Linux kernel, the following vulnerability has been resolved: smb: client... In the Linux kernel, the following vulnerability has been resolved: smb: client: fix OOBs when building SMB2_IOCTL request When using encryption, either enforced by the server or when using 'seal' mount option, the client will squash all compound request buffers down for encryption into a single iov in smb2_set_next_command(). SMB2_ioctl_init() allocates a small buffe
debian
CVE-2024-41042HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41042 [HIGH] CVE-2024-41042: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prefer nft_chain_validate nft_chain_validate already performs loop detection because a cycle will result in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE). It also follows maps via ->validate callback in nft_lookup, so there appears no reason to iterate the maps again.
debian
CVE-2024-44999HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-44999 [HIGH] CVE-2024-44999: linux - In the Linux kernel, the following vulnerability has been resolved: gtp: pull n... In the Linux kernel, the following vulnerability has been resolved: gtp: pull network headers in gtp_dev_xmit() syzbot/KMSAN reported use of uninit-value in get_dev_xmit() [1] We must make sure the IPv4 or Ipv6 header is pulled in skb->head before accessing fields in them. Use pskb_inet_may_pull() to fix this issue. [1] BUG: KMSAN: uninit-value in ipv6_pdp_find driver
debian
CVE-2024-36973HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-36973 [HIGH] CVE-2024-36973: linux - In the Linux kernel, the following vulnerability has been resolved: misc: micro... In the Linux kernel, the following vulnerability has been resolved: misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe() When auxiliary_device_add() returns error and then calls auxiliary_device_uninit(), callback function gp_auxiliary_device_release() calls ida_free() and kfree(aux_device_wrapper) to free memory. We should't call the
debian
CVE-2024-47742HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47742 [HIGH] CVE-2024-47742: linux - In the Linux kernel, the following vulnerability has been resolved: firmware_lo... In the Linux kernel, the following vulnerability has been resolved: firmware_loader: Block path traversal Most firmware names are hardcoded strings, or are constructed from fairly constrained format strings where the dynamic parts are just some hex numbers or such. However, there are a couple codepaths in the kernel where firmware file names contain string components
debian
CVE-2024-44949HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-44949 [HIGH] CVE-2024-44949: linux - In the Linux kernel, the following vulnerability has been resolved: parisc: fix... In the Linux kernel, the following vulnerability has been resolved: parisc: fix a possible DMA corruption ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be possible that two unrelated 16-byte allocations share a cache line. If one of these allocations is written using DMA and the other is written using cached write, the value that was written with DM
debian
CVE-2024-41046HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41046 [HIGH] CVE-2024-41046: linux - In the Linux kernel, the following vulnerability has been resolved: net: ethern... In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times. Scope: local bookworm: resolved (fixed in 6.1.106-1) bullseye: resolved (fixed in 5.10.223-1) forky: resolved (fixed i
debian
CVE-2024-46674HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46674 [HIGH] CVE-2024-46674: linux - In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: ... In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: st: fix probed platform device ref count on probe error path The probe function never performs any paltform device allocation, thus error path "undo_platform_dev_alloc" is entirely bogus. It drops the reference count from the platform device being probed. If error path is triggered, this wi
debian
CVE-2024-46812HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46812 [HIGH] CVE-2024-46812: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis... In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration [Why] Coverity reports Memory - illegal accesses. [How] Skip inactive planes. Scope: local bookworm: resolved (fixed in 6.1.112-1) bullseye: resolved (fixed in 5.10.237-1) forky: resolved (fixed in 6.10.9-1) sid: resolved (
debian
CVE-2024-39510HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39510 [HIGH] CVE-2024-39510: linux - In the Linux kernel, the following vulnerability has been resolved: cachefiles:... In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read() We got the following issue in a fuzz test of randomly issuing the restore command: ================================================================== BUG: KASAN: slab-use-after-free in cachefiles_ondemand_daemon_read+0xb41/0xb60
debian
CVE-2024-46821HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46821 [HIGH] CVE-2024-46821: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm:... In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Fix negative array index read Avoid using the negative values for clk_idex as an index into an array pptable->DpmDescriptor. V2: fix clk_index return check (Tim Huang) Scope: local bookworm: resolved (fixed in 6.1.112-1) bullseye: resolved (fixed in 5.10.237-1) forky: resolved (fixed in 6.
debian