Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 86 of 132
CVE-2024-36915HIGHCVSS 7.1fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-36915 [HIGH] CVE-2024-36915: linux - In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: ...
In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies syzbot reported unsafe calls to copy_from_sockptr() [1] Use copy_safe_from_sockptr() instead. [1] BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline] BUG: KASAN: slab-out-of-bounds in copy_from_sockptr includ
debian
CVE-2024-56766HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56766 [HIGH] CVE-2024-56766: linux - In the Linux kernel, the following vulnerability has been resolved: mtd: rawnan...
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fix double free in atmel_pmecc_create_user() The "user" pointer was converted from being allocated with kzalloc() to being allocated by devm_kzalloc(). Calling kfree(user) will lead to a double free.
Scope: local
bookworm: resolved (fixed in 6.1.123-1)
bullseye: resolved (fixed in 5.10.2
debian
CVE-2024-53150HIGHCVSS 7.1KEVfixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53150 [HIGH] CVE-2024-53150: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-a...
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix out of bounds reads when finding clock sources The current USB-audio driver code doesn't check bLength of each descriptor at traversing for clock descriptors. That is, when a device provides a bogus descriptor with a shorter bLength, the driver might hit out-of-bounds reads. For a
debian
CVE-2024-58013HIGHCVSS 7.8fixed in linux 6.1.129-1 (bookworm)2024
CVE-2024-58013 [HIGH] CVE-2024-58013: linux - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ...
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync This fixes the following crash: ================================================================== BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_sync+0x3a/0xd0 net/bluetooth/mgmt.c:5543 Read of size 8 at addr ff
debian
CVE-2024-46828HIGHCVSS 7.8fixed in linux 6.1.112-1 (bookworm)2024
CVE-2024-46828 [HIGH] CVE-2024-46828: linux - In the Linux kernel, the following vulnerability has been resolved: sched: sch_...
In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: fix bulk flow accounting logic for host fairness In sch_cake, we keep track of the count of active bulk flows per host, when running in dst/src host fairness mode, which is used as the round-robin weight when iterating through flows. The count of active bulk flows is updated whenever
debian
CVE-2024-26739HIGHCVSS 7.8fixed in linux 6.1.137-1 (bookworm)2024
CVE-2024-26739 [HIGH] CVE-2024-26739: linux - In the Linux kernel, the following vulnerability has been resolved: net/sched: ...
In the Linux kernel, the following vulnerability has been resolved: net/sched: act_mirred: don't override retval if we already lost the skb If we're redirecting the skb, and haven't called tcf_mirred_forward(), yet, we need to tell the core to drop the skb by setting the retcode to SHOT. If we have called tcf_mirred_forward(), however, the skb is out of our hands and
debian
CVE-2024-49930HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49930 [HIGH] CVE-2024-49930: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: ath11...
In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: fix array out-of-bound access in SoC stats Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx() function access ath11k_soc_dp_stats::hal_reo_error using the REO destination SRNG ring ID, which i
debian
CVE-2024-49992HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49992 [HIGH] CVE-2024-49992: linux - In the Linux kernel, the following vulnerability has been resolved: drm/stm: Av...
In the Linux kernel, the following vulnerability has been resolved: drm/stm: Avoid use-after-free issues with crtc and plane ltdc_load() calls functions drm_crtc_init_with_planes(), drm_universal_plane_init() and drm_encoder_init(). These functions should not be called with parameters allocated with devm_kzalloc() to avoid use-after-free issues [1]. Use allocations ma
debian
CVE-2024-56616HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56616 [HIGH] CVE-2024-56616: linux - In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst:...
In the Linux kernel, the following vulnerability has been resolved: drm/dp_mst: Fix MST sideband message body length check Fix the MST sideband message body length check, which must be at least 1 byte accounting for the message body CRC (aka message data CRC) at the end of the message. This fixes a case where an MST branch device returns a header with a correct header
debian
CVE-2024-56642HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56642 [HIGH] CVE-2024-56642: linux - In the Linux kernel, the following vulnerability has been resolved: tipc: Fix u...
In the Linux kernel, the following vulnerability has been resolved: tipc: Fix use-after-free of kernel socket in cleanup_bearer(). syzkaller reported a use-after-free of UDP kernel socket in cleanup_bearer() without repro. [0][1] When bearer_disable() calls tipc_udp_disable(), cleanup of the UDP kernel socket is deferred by work calling cleanup_bearer(). tipc_exit_net
debian
CVE-2024-50215HIGHCVSS 7.8fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-50215 [HIGH] CVE-2024-50215: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet-auth:...
In the Linux kernel, the following vulnerability has been resolved: nvmet-auth: assign dh_key to NULL after kfree_sensitive ctrl->dh_key might be used across multiple calls to nvmet_setup_dhgroup() for the same controller. So it's better to nullify it after release on error path in order to avoid double free later in nvmet_destroy_auth(). Found by Linux Verification C
debian
CVE-2024-56548HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56548 [HIGH] CVE-2024-56548: linux - In the Linux kernel, the following vulnerability has been resolved: hfsplus: do...
In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't query the device logical block size multiple times Devices block sizes may change. One of these cases is a loop device by using ioctl LOOP_SET_BLOCK_SIZE. While this may cause other issues like IO being rejected, in the case of hfsplus, it will allocate a block by using that size and po
debian
CVE-2024-42093HIGHCVSS 7.3fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42093 [HIGH] CVE-2024-42093: linux - In the Linux kernel, the following vulnerability has been resolved: net/dpaa2: ...
In the Linux kernel, the following vulnerability has been resolved: net/dpaa2: Avoid explicit cpumask var allocation on stack For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask variable on stack is not recommended since it can cause potential stack overflow. Instead, kernel code should always use *cpumask_var API(s) to allocate cpumask var in config-
debian
CVE-2024-56570HIGHCVSS 7.8fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56570 [HIGH] CVE-2024-56570: linux - In the Linux kernel, the following vulnerability has been resolved: ovl: Filter...
In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_dentry_weird() function to prevent the processing of directory inodes that lack the lookup function. This is important because such inodes can cause errors in overlayfs when passed to the lowerstack.
Scope: local
bookworm:
debian
CVE-2024-53166HIGHCVSS 7.8fixed in linux 6.1.133-1 (bookworm)2024
CVE-2024-53166 [HIGH] CVE-2024-53166: linux - In the Linux kernel, the following vulnerability has been resolved: block, bfq:...
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix bfqq uaf in bfq_limit_depth() Set new allocated bfqq to bic or remove freed bfqq from bic are both protected by bfqd->lock, however bfq_limit_depth() is deferencing bfqq from bic without the lock, this can lead to UAF if the io_context is shared by multiple tasks. For example, test bfq
debian
CVE-2024-56759HIGHCVSS 7.8fixed in linux 6.1.124-1 (bookworm)2024
CVE-2024-56759 [HIGH] CVE-2024-56759: linux - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix ...
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free when COWing tree bock and tracing is enabled When a COWing a tree block, at btrfs_cow_block(), and we have the tracepoint trace_btrfs_cow_block() enabled and preemption is also enabled (CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent buffer while inside
debian
CVE-2024-40954HIGHCVSS 7.8fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40954 [HIGH] CVE-2024-40954: linux - In the Linux kernel, the following vulnerability has been resolved: net: do not...
In the Linux kernel, the following vulnerability has been resolved: net: do not leave a dangling sk pointer, when socket creation fails It is possible to trigger a use-after-free by: * attaching an fentry probe to __sock_release() and the probe calling the bpf_get_socket_cookie() helper * running traceroute -I 1.1.1.1 on a freshly booted VM A KASAN enabled kernel will
debian
CVE-2024-50275HIGHCVSS 7.0fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-50275 [HIGH] CVE-2024-50275: linux - In the Linux kernel, the following vulnerability has been resolved: arm64/sve: ...
In the Linux kernel, the following vulnerability has been resolved: arm64/sve: Discard stale CPU state when handling SVE traps The logic for handling SVE traps manipulates saved FPSIMD/SVE state incorrectly, and a race with preemption can result in a task having TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state is stale (e.g. with SVE traps enab
debian
CVE-2024-57945HIGHCVSS 7.1fixed in linux 6.1.140-1 (bookworm)2024
CVE-2024-57945 [HIGH] CVE-2024-57945: linux - In the Linux kernel, the following vulnerability has been resolved: riscv: mm: ...
In the Linux kernel, the following vulnerability has been resolved: riscv: mm: Fix the out of bound issue of vmemmap address In sparse vmemmap model, the virtual address of vmemmap is calculated as: ((struct page *)VMEMMAP_START - (phys_ram_base >> PAGE_SHIFT)). And the struct page's va can be calculated with an offset: (vmemmap + (pfn)). However, when initializing st
debian
CVE-2024-49969HIGHCVSS 7.8fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-49969 [HIGH] CVE-2024-49969: linux - In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis...
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix index out of bounds in DCN30 color transformation This commit addresses a potential index out of bounds issue in the `cm3_helper_translate_curve_to_hw_format` function in the DCN30 color management module. The issue could occur when the index 'i' exceeds the number of transfer fun
debian