Debian Linux-6.1 vulnerabilities
2,634 known vulnerabilities affecting debian/linux-6.1.
Total CVEs
2,634
CISA KEV
5
actively exploited
Public exploits
1
Exploited in wild
4
Severity breakdown
CRITICAL6HIGH728MEDIUM1569LOW14UNKNOWN317
Vulnerabilities
Page 99 of 132
CVE-2024-53230MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-53230 [MEDIUM] CVE-2024-53230: linux - In the Linux kernel, the following vulnerability has been resolved: cpufreq: CP...
In the Linux kernel, the following vulnerability has been resolved: cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost() cpufreq_cpu_get_raw() may return NULL if the cpu is not in policy->cpus cpu mask and it will cause null pointer dereference, so check NULL for cppc_get_cpu_cost().
Scope: local
bookworm: resolved (fixed in 6.1.123-1)
bullseye: resolv
debian
CVE-2024-40938MEDIUMCVSS 5.5fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40938 [MEDIUM] CVE-2024-40938: linux - In the Linux kernel, the following vulnerability has been resolved: landlock: F...
In the Linux kernel, the following vulnerability has been resolved: landlock: Fix d_parent walk The WARN_ON_ONCE() in collect_domain_accesses() can be triggered when trying to link a root mount point. This cannot work in practice because this directory is mounted, but the VFS check is done after the call to security_path_link(). Do not use source directory's d_paren
debian
CVE-2024-41079MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41079 [MEDIUM] CVE-2024-41079: linux - In the Linux kernel, the following vulnerability has been resolved: nvmet: alwa...
In the Linux kernel, the following vulnerability has been resolved: nvmet: always initialize cqe.result The spec doesn't mandate that the first two double words (aka results) for the command queue entry need to be set to 0 when they are not used (not specified). Though, the target implemention returns 0 for TCP and FC but not for RDMA. Let's make RDMA behave the sam
debian
CVE-2024-44960MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-44960 [MEDIUM] CVE-2024-44960: linux - In the Linux kernel, the following vulnerability has been resolved: usb: gadget...
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: core: Check for unset descriptor Make sure the descriptor has been set before looking at maxpacket. This fixes a null pointer panic in this case. This may happen if the gadget doesn't properly set up the endpoint for the current speed, or the gadget descriptors are malformed and the des
debian
CVE-2024-49929MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-49929 [MEDIUM] CVE-2024-49929: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwi...
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference iwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta pointer is not NULL. It retrieves this pointer using iwl_mvm_sta_from_mac80211, which is dereferencing the ieee80211_sta pointer. If sta is NULL, iwl_mvm_sta_from_mac80211 will deref
debian
CVE-2024-57841MEDIUMCVSS 5.5fixed in linux 6.1.124-1 (bookworm)2024
CVE-2024-57841 [MEDIUM] CVE-2024-57841: linux - In the Linux kernel, the following vulnerability has been resolved: net: fix me...
In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in tcp_conn_request() If inet_csk_reqsk_queue_hash_add() return false, tcp_conn_request() will return without free the dst memory, which allocated in af_ops->route_req. Here is the kmemleak stack: unreferenced object 0xffff8881198631c0 (size 240): comm "softirq", pid 0, jiffies
debian
CVE-2024-40948MEDIUMCVSS 5.5fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40948 [MEDIUM] CVE-2024-40948: linux - In the Linux kernel, the following vulnerability has been resolved: mm/page_tab...
In the Linux kernel, the following vulnerability has been resolved: mm/page_table_check: fix crash on ZONE_DEVICE Not all pages may apply to pgtable check. One example is ZONE_DEVICE pages: they map PFNs directly, and they don't allocate page_ext at all even if there's struct page around. One may reference devm_memremap_pages(). When both ZONE_DEVICE and page-table-
debian
CVE-2024-50136MEDIUMCVSS 5.5fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-50136 [MEDIUM] CVE-2024-50136: linux - In the Linux kernel, the following vulnerability has been resolved: net/mlx5: U...
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Unregister notifier on eswitch init failure It otherwise remains registered and a subsequent attempt at eswitch enabling might trigger warnings of the sort: [ 682.589148] ------------[ cut here ]------------ [ 682.590204] notifier callback eswitch_vport_event [mlx5_core] already registered
debian
CVE-2024-27056MEDIUMCVSS 5.5fixed in linux 6.1.133-1 (bookworm)2024
CVE-2024-27056 [MEDIUM] CVE-2024-27056: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwi...
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: ensure offloading TID queue exists The resume code path assumes that the TX queue for the offloading TID has been configured. At resume time it then tries to sync the write pointer as it may have been updated by the firmware. In the unusual event that no packets have been send on
debian
CVE-2024-42087MEDIUMCVSS 5.5fixed in linux 6.1.98-1 (bookworm)2024
CVE-2024-42087 [MEDIUM] CVE-2024-42087: linux - In the Linux kernel, the following vulnerability has been resolved: drm/panel: ...
In the Linux kernel, the following vulnerability has been resolved: drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep The ilitek-ili9881c controls the reset GPIO using the non-sleeping gpiod_set_value() function. This complains loudly when the GPIO controller needs to sleep. As the caller can sleep, use gpiod_set_value_cansleep() to fix the is
debian
CVE-2024-44954MEDIUMCVSS 4.7fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-44954 [MEDIUM] CVE-2024-44954: linux - In the Linux kernel, the following vulnerability has been resolved: ALSA: line6...
In the Linux kernel, the following vulnerability has been resolved: ALSA: line6: Fix racy access to midibuf There can be concurrent accesses to line6 midibuf from both the URB completion callback and the rawmidi API access. This could be a cause of KMSAN warning triggered by syzkaller below (so put as reported-by here). This patch protects the midibuf call of the fo
debian
CVE-2024-40912MEDIUMCVSS 5.5fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40912 [MEDIUM] CVE-2024-40912: linux - In the Linux kernel, the following vulnerability has been resolved: wifi: mac80...
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() The ieee80211_sta_ps_deliver_wakeup() function takes sta->ps_lock to synchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from softirq context. However using only spin_lock() to get sta->ps_lock in ieee80211_sta_ps_delive
debian
CVE-2024-39500MEDIUMCVSS 4.7fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-39500 [MEDIUM] CVE-2024-39500: linux - In the Linux kernel, the following vulnerability has been resolved: sock_map: a...
In the Linux kernel, the following vulnerability has been resolved: sock_map: avoid race between sock_map_close and sk_psock_put sk_psock_get will return NULL if the refcount of psock has gone to 0, which will happen when the last call of sk_psock_put is done. However, sk_psock_drop may not have finished yet, so the close callback will still point to sock_map_close
debian
CVE-2024-40963MEDIUMCVSS 5.5fixed in linux 6.1.99-1 (bookworm)2024
CVE-2024-40963 [MEDIUM] CVE-2024-40963: linux - In the Linux kernel, the following vulnerability has been resolved: mips: bmips...
In the Linux kernel, the following vulnerability has been resolved: mips: bmips: BCM6358: make sure CBR is correctly set It was discovered that some device have CBR address set to 0 causing kernel panic when arch_sync_dma_for_cpu_all is called. This was notice in situation where the system is booted from TP1 and BMIPS_GET_CBR() returns 0 instead of a valid address a
debian
CVE-2024-53093MEDIUMCVSS 5.5fixed in linux 6.1.119-1 (bookworm)2024
CVE-2024-53093 [MEDIUM] CVE-2024-53093: linux - In the Linux kernel, the following vulnerability has been resolved: nvme-multip...
In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: defer partition scanning We need to suppress the partition scan from occuring within the controller's scan_work context. If a path error occurs here, the IO will wait until a path becomes available or all paths are torn down, but that action also occurs within scan_work, so it would
debian
CVE-2024-57889MEDIUMCVSS 5.5fixed in linux 6.1.124-1 (bookworm)2024
CVE-2024-57889 [MEDIUM] CVE-2024-57889: linux - In the Linux kernel, the following vulnerability has been resolved: pinctrl: mc...
In the Linux kernel, the following vulnerability has been resolved: pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking If a device uses MCP23xxx IO expander to receive IRQs, the following bug can happen: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283 in_atomic(): 1, irqs_disabled(): 1, non_block: 0, ... preempt_
debian
CVE-2024-56707MEDIUMCVSS 5.5fixed in linux 6.1.123-1 (bookworm)2024
CVE-2024-56707 [MEDIUM] CVE-2024-56707: linux - In the Linux kernel, the following vulnerability has been resolved: octeontx2-p...
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c Add error pointer checks after calling otx2_mbox_get_rsp().
Scope: local
bookworm: resolved (fixed in 6.1.123-1)
bullseye: resolved
forky: resolved (fixed in 6.12.3-1)
sid: resolved (fixed in 6.12.3-1)
trixie: resolved (fixed in 6.12.3
debian
CVE-2024-42316MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-42316 [MEDIUM] CVE-2024-42316: linux - In the Linux kernel, the following vulnerability has been resolved: mm/mglru: f...
In the Linux kernel, the following vulnerability has been resolved: mm/mglru: fix div-by-zero in vmpressure_calc_level() evict_folios() uses a second pass to reclaim folios that have gone through page writeback and become clean before it finishes the first pass, since folio_rotate_reclaimable() cannot handle those folios due to the isolation. The second pass tries t
debian
CVE-2024-41077MEDIUMCVSS 5.5fixed in linux 6.1.106-1 (bookworm)2024
CVE-2024-41077 [MEDIUM] CVE-2024-41077: linux - In the Linux kernel, the following vulnerability has been resolved: null_blk: f...
In the Linux kernel, the following vulnerability has been resolved: null_blk: fix validation of block size Block size should be between 512 and PAGE_SIZE and be a power of 2. The current check does not validate this, so update the check. Without this patch, null_blk would Oops due to a null pointer deref when loaded with bs=1536 [1]. [axboe: remove unnecessary brace
debian
CVE-2024-47678MEDIUMCVSS 5.5fixed in linux 6.1.115-1 (bookworm)2024
CVE-2024-47678 [MEDIUM] CVE-2024-47678: linux - In the Linux kernel, the following vulnerability has been resolved: icmp: chang...
In the Linux kernel, the following vulnerability has been resolved: icmp: change the order of rate limits ICMP messages are ratelimited : After the blamed commits, the two rate limiters are applied in this order: 1) host wide ratelimit (icmp_global_allow()) 2) Per destination ratelimit (inetpeer based) In order to avoid side-channels attacks, we need to apply the pe
debian