Debian Linux-6.1 vulnerabilities

2,634 known vulnerabilities affecting debian/linux-6.1.

Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317

Vulnerabilities

Page 83 of 132
CVE-2024-50257HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50257 [HIGH] CVE-2024-50257: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ... In the Linux kernel, the following vulnerability has been resolved: netfilter: Fix use-after-free in get_info() ip6table_nat module unload has refcnt warning for UAF. call trace is: WARNING: CPU: 1 PID: 379 at kernel/module/main.c:853 module_put+0x6f/0x80 Modules linked in: ip6table_nat(-) CPU: 1 UID: 0 PID: 379 Comm: ip6tables Not tainted 6.12.0-rc4-00047-gc2ee9f594d
debian
CVE-2024-49882HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49882 [HIGH] CVE-2024-49882: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix d... In the Linux kernel, the following vulnerability has been resolved: ext4: fix double brelse() the buffer of the extents path In ext4_ext_try_to_merge_up(), set path[1].p_bh to NULL after it has been released, otherwise it may be released twice. An example of what triggers this is as follows: split2 map split1 |--------|-------|--------| ext4_ext_map_blocks ext4_ext_ha
debian
CVE-2024-53237HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53237 [HIGH] CVE-2024-53237: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: fix use-after-free in device_for_each_child() Syzbot has reported the following KASAN splat: BUG: KASAN: slab-use-after-free in device_for_each_child+0x18f/0x1a0 Read of size 8 at addr ffff88801f605308 by task kbnepd bnep0/4980 CPU: 0 UID: 0 PID: 4980 Comm: kbnepd bnep0 Not tainted 6.12.0-r
debian
CVE-2024-56658HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56658 [HIGH] CVE-2024-56658: linux - In the Linux kernel, the following vulnerability has been resolved: net: defer ... In the Linux kernel, the following vulnerability has been resolved: net: defer final 'struct net' free in netns dismantle Ilya reported a slab-use-after-free in dst_destroy [1] Issue is in xfrm6_net_init() and xfrm4_net_init() : They copy xfrm[46]_dst_ops_template into net->xfrm.xfrm[46]_dst_ops. But net structure might be freed before all the dst callbacks are called
debian
CVE-2024-50230HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50230 [HIGH] CVE-2024-50230: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix... In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix kernel bug due to missing clearing of checked flag Syzbot reported that in directory operations after nilfs2 detects filesystem corruption and degrades to read-only, __block_write_begin_int(), which is called to prepare block writes, may fail the BUG_ON check for accesses exceeding the fol
debian
CVE-2024-50301HIGHCVSS 7.1fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50301 [HIGH] CVE-2024-50301: linux - In the Linux kernel, the following vulnerability has been resolved: security/ke... In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission KASAN reports an out of bounds read: BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36 BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline] BUG: KASAN: slab-out-of-bounds in key_task_permission+0x3
debian
CVE-2024-49982HIGHCVSS 7.0fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49982 [HIGH] CVE-2024-49982: linux - In the Linux kernel, the following vulnerability has been resolved: aoe: fix th... In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free. Then Nicolai St
debian
CVE-2024-40920HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40920 [HIGH] CVE-2024-40920: linux - In the Linux kernel, the following vulnerability has been resolved: net: bridge... In the Linux kernel, the following vulnerability has been resolved: net: bridge: mst: fix suspicious rcu usage in br_mst_set_state I converted br_mst_set_state to RCU to avoid a vlan use-after-free but forgot to change the vlan group dereference helper. Switch to vlan group RCU deref helper to fix the suspicious rcu usage warning. Scope: local bookworm: resolved (fixe
debian
CVE-2024-50125HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50125 [HIGH] CVE-2024-50125: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ... In the Linux kernel, the following vulnerability has been resolved: Bluetooth: SCO: Fix UAF on sco_sock_timeout conn->sk maybe have been unlinked/freed while waiting for sco_conn_lock so this checks if the conn->sk is still valid by checking if it part of sco_sk_list. Scope: local bookworm: resolved (fixed in 6.1.115-1) bullseye: open forky: resolved (fixed in 6.11.6-
debian
CVE-2024-56582HIGHCVSS 7.8fixed in linux 6.1.124-1 (bookworm)2024
CVE-2024-56582 [HIGH] CVE-2024-56582: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ... In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free in btrfs_encoded_read_endio() Shinichiro reported the following use-after free that sometimes is happening in our CI system when running fstests' btrfs/284 on a TCMU runner device: BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780 Read of size 8 at addr ffff888106a8
debian
CVE-2024-42225HIGHCVSS 7.5fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42225 [HIGH] CVE-2024-42225: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mt76:... In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: replace skb_put with skb_put_zero Avoid potentially reusing uninitialized data Scope: local bookworm: resolved (fixed in 6.1.98-1) bullseye: open forky: resolved (fixed in 6.9.9-1) sid: resolved (fixed in 6.9.9-1) trixie: resolved (fixed in 6.9.9-1)
debian
CVE-2024-57910HIGHCVSS 7.1fixed in linux 6.1.128-1 (bookworm)2024
CVE-2024-57910 [HIGH] CVE-2024-57910: linux - In the Linux kernel, the following vulnerability has been resolved: iio: light:... In the Linux kernel, the following vulnerability has been resolved: iio: light: vcnl4035: fix information leak in triggered buffer The 'buffer' local array is used to push data to userspace from a triggered buffer, but it does not set an initial value for the single data element, which is an u16 aligned to 8 bytes. That leaves at least 4 bytes uninitialized even after
debian
CVE-2024-40901HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40901 [HIGH] CVE-2024-40901: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3s... In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory There is a potential out-of-bounds access when using test_bit() on a single word. The test_bit() and set_bit() functions operate on long values, and when testing or setting a single word, they can exceed the word boundary. KASAN det
debian
CVE-2024-46786HIGHCVSS 7.8fixed in linux 6.1.162-1 (bookworm)2024
CVE-2024-46786 [HIGH] CVE-2024-46786: linux - In the Linux kernel, the following vulnerability has been resolved: fscache: de... In the Linux kernel, the following vulnerability has been resolved: fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF The fscache_cookie_lru_timer is initialized when the fscache module is inserted, but is not deleted when the fscache module is removed. If timer_reduce() is called before removing the fscache module, the fscache_cookie_lru_timer
debian
CVE-2024-39495HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39495 [HIGH] CVE-2024-39495: linux - In the Linux kernel, the following vulnerability has been resolved: greybus: Fi... In the Linux kernel, the following vulnerability has been resolved: greybus: Fix use-after-free bug in gb_interface_release due to race condition. In gb_interface_create, &intf->mode_switch_completion is bound with gb_interface_mode_switch_work. Then it will be started by gb_interface_request_mode_switch. Here is the relevant code. if (!queue_work(system_long_wq, &int
debian
CVE-2024-56601HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56601 [HIGH] CVE-2024-56601: linux - In the Linux kernel, the following vulnerability has been resolved: net: inet: ... In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk poin
debian
CVE-2024-47757HIGHCVSS 7.1fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47757 [HIGH] CVE-2024-47757: linux - In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix... In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential oob read in nilfs_btree_check_delete() The function nilfs_btree_check_delete(), which checks whether degeneration to direct mapping occurs before deleting a b-tree entry, causes memory access outside the block buffer when retrieving the maximum key if the root node has no entries
debian
CVE-2024-53106HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-53106 [HIGH] CVE-2024-53106: linux - In the Linux kernel, the following vulnerability has been resolved: ima: fix bu... In the Linux kernel, the following vulnerability has been resolved: ima: fix buffer overrun in ima_eventdigest_init_common Function ima_eventdigest_init() calls ima_eventdigest_init_common() with HASH_ALGO__LAST which is then used to access the array hash_digest_size[] leading to buffer overrun. Have a conditional statement to handle this. Scope: local bookworm: resol
debian
CVE-2024-50036HIGHCVSS 7.0fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50036 [HIGH] CVE-2024-50036: linux - In the Linux kernel, the following vulnerability has been resolved: net: do not... In the Linux kernel, the following vulnerability has been resolved: net: do not delay dst_entries_add() in dst_release() dst_entries_add() uses per-cpu data that might be freed at netns dismantle from ip6_route_net_exit() calling dst_entries_destroy() Before ip6_route_net_exit() can be called, we release all the dsts associated with this netns, via calls to dst_releas
debian
CVE-2024-41059HIGHCVSS 7.1fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41059 [HIGH] CVE-2024-41059: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: fi... In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix uninit-value in copy_name [syzbot reported] BUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160 sized_strscpy+0xc4/0x160 copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411 hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750 vfs_listxattr fs/xattr.c:493 [inline] listxattr+0x1f3/0x6b0 fs/xatt
debian