Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 84 of 132
CVE-2024-40927HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40927 [HIGH] CVE-2024-40927: linux - In the Linux kernel, the following vulnerability has been resolved: xhci: Handl...
In the Linux kernel, the following vulnerability has been resolved: xhci: Handle TD clearing for multiple streams case When multiple streams are in use, multiple TDs might be in flight when an endpoint is stopped. We need to issue a Set TR Dequeue Pointer for each, to ensure everything is reset properly and the caches cleared. Change the logic so that any N>1 TDs foun
debian
CVE-2024-43873HIGHCVSS 7.8fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-43873 [HIGH] CVE-2024-43873: linux - In the Linux kernel, the following vulnerability has been resolved: vhost/vsock...
In the Linux kernel, the following vulnerability has been resolved: vhost/vsock: always initialize seqpacket_allow There are two issues around seqpacket_allow: 1. seqpacket_allow is not initialized when socket is created. Thus if features are never set, it will be read uninitialized. 2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared, then seqpacket_allow will not
debian
CVE-2024-36914HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-36914 [HIGH] CVE-2024-36914: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Skip on writeback when it's not applicable [WHY] dynamic memory safety error detector (KASAN) catches and generates error messages "BUG: KASAN: slab-out-of-bounds" as writeback connector does not support certain features which are not initialized. [HOW] Skip them when connector type i
debian
CVE-2024-50051HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-50051 [HIGH] CVE-2024-50051: linux - In the Linux kernel, the following vulnerability has been resolved: spi: mpc52x...
In the Linux kernel, the following vulnerability has been resolved: spi: mpc52xx: Add cancel_work_sync before module remove If we remove the module which will call mpc52xx_spi_remove it will free 'ms' through spi_unregister_controller. while the work ms->work will be used. The sequence of operations that may lead to a UAF bug. Fix it by ensuring that the work is cance
debian
CVE-2024-44983HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-44983 [HIGH] CVE-2024-44983: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...
In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: validate vlan header Ensure there is sufficient room to access the protocol field of the VLAN header, validate it once before the flowtable lookup. ===================================================== BUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilte
debian
CVE-2024-41049HIGHCVSS 7.0fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41049 [HIGH] CVE-2024-41049: linux - In the Linux kernel, the following vulnerability has been resolved: filelock: f...
In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode's list. However, before the tracepoint could fire, another task raced in an
debian
CVE-2024-46759HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46759 [HIGH] CVE-2024-46759: linux - In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc...
In the Linux kernel, the following vulnerability has been resolved: hwmon: (adc128d818) Fix underflows seen when writing limit attributes DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large negative number such as -9223372036854775808 is provided by the user. Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.
Scope: local
bookworm:
debian
CVE-2024-56627HIGHCVSS 7.1fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56627 [HIGH] CVE-2024-56627: linux - In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix ...
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read An offset from client could be a negative value, It could lead to an out-of-bounds read from the stream_buf. Note that this issue is coming when setting 'vfs objects = streams_xattr parameter' in ksmbd.conf.
Scope: local
bookworm: resolved (fixed
debian
CVE-2024-35937HIGHCVSS 7.1fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-35937 [HIGH] CVE-2024-35937: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80...
In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: check A-MSDU format more carefully If it looks like there's another subframe in the A-MSDU but the header isn't fully there, we can end up reading data out of bounds, only to discard later. Make this a bit more careful and check if the subframe header can even be present.
Scope: local
debian
CVE-2024-50074HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50074 [HIGH] CVE-2024-50074: linux - In the Linux kernel, the following vulnerability has been resolved: parport: Pr...
In the Linux kernel, the following vulnerability has been resolved: parport: Proper fix for array out-of-bounds access The recent fix for array out-of-bounds accesses replaced sprintf() calls blindly with snprintf(). However, since snprintf() returns the would-be-printed size, not the actually output size, the length calculation can still go over the given limit. Use
debian
CVE-2024-39487HIGHCVSS 7.1fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39487 [HIGH] CVE-2024-39487: linux - In the Linux kernel, the following vulnerability has been resolved: bonding: Fi...
In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() In function bond_option_arp_ip_targets_set(), if newval->string is an empty string, newval->string+1 will point to the byte after the string, causing an out-of-bound read. BUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.
debian
CVE-2024-40996HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40996 [HIGH] CVE-2024-40996: linux - In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid ...
In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid splat in pskb_pull_reason syzkaller builds (CONFIG_DEBUG_NET=y) frequently trigger a debug hint in pskb_may_pull. We'd like to retain this debug check because it might hint at integer overflows and other issues (kernel code should pull headers, not huge value). In bpf case, this splat isn't
debian
CVE-2024-49852HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49852 [HIGH] CVE-2024-49852: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: elx: ...
In the Linux kernel, the following vulnerability has been resolved: scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() The kref_put() function will call nport->release if the refcount drops to zero. The nport->release release function is _efc_nport_free() which frees "nport". But then we dereference "nport" on the next line which is a use after f
debian
CVE-2024-46849HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46849 [HIGH] CVE-2024-46849: linux - In the Linux kernel, the following vulnerability has been resolved: ASoC: meson...
In the Linux kernel, the following vulnerability has been resolved: ASoC: meson: axg-card: fix 'use-after-free' Buffer 'card->dai_link' is reallocated in 'meson_card_reallocate_links()', so move 'pad' pointer initialization after this function when memory is already reallocated. Kasan bug report: ================================================================== BUG:
debian
CVE-2024-49884HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49884 [HIGH] CVE-2024-49884: linux - In the Linux kernel, the following vulnerability has been resolved: ext4: fix s...
In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at() We hit the following use-after-free: ================================================================== BUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0 Read of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40 CPU: 0 PI
debian
CVE-2024-50267HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50267 [HIGH] CVE-2024-50267: linux - In the Linux kernel, the following vulnerability has been resolved: USB: serial...
In the Linux kernel, the following vulnerability has been resolved: USB: serial: io_edgeport: fix use after free in debug printk The "dev_dbg(&urb->dev->dev, ..." which happens after usb_free_urb(urb) is a use after free of the "urb" pointer. Store the "dev" pointer at the start of the function to avoid this issue.
Scope: local
bookworm: resolved (fixed in 6.1.119-1)
debian
CVE-2024-47751HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47751 [HIGH] CVE-2024-47751: linux - In the Linux kernel, the following vulnerability has been resolved: PCI: kirin:...
In the Linux kernel, the following vulnerability has been resolved: PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port() Within kirin_pcie_parse_port(), the pcie->num_slots is compared to pcie->gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead to an overflow. Thus, fix condition to pcie->num_slots + 1 >= MAX_PCI_SLOTS and move pcie->num_slots in
debian
CVE-2024-46859HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46859 [HIGH] CVE-2024-46859: linux - In the Linux kernel, the following vulnerability has been resolved: platform/x8...
In the Linux kernel, the following vulnerability has been resolved: platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses The panasonic laptop code in various places uses the SINF array with index values of 0 - SINF_CUR_BRIGHT(0x0d) without checking that the SINF array is big enough. Not all panasonic laptops have this many SINF array entries, for exam
debian
CVE-2024-42147HIGHCVSS 7.8fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42147 [HIGH] CVE-2024-42147: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: his...
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/debugfs - Fix debugfs uninit process issue During the zip probe process, the debugfs failure does not stop the probe. When debugfs initialization fails, jumping to the error branch will also release regs, in addition to its own rollback operation. As a result, it may be released repe
debian
CVE-2024-47730HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47730 [HIGH] CVE-2024-47730: linux - In the Linux kernel, the following vulnerability has been resolved: crypto: his...
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - inject error before stopping queue The master ooo cannot be completely closed when the accelerator core reports memory error. Therefore, the driver needs to inject the qm error to close the master ooo. Currently, the qm error is injected after stopping queue, memory may be relea
debian