[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5730-1] linux security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5730-1                   [email protected]
https://www.debian.org/security/                     Salvatore Bonaccorso
July 15, 2024                         https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2022-43945 CVE-2022-48772 CVE-2024-25741 CVE-2024-26629
                 CVE-2024-27019 CVE-2024-31076 CVE-2024-33621 CVE-2024-33847
                 CVE-2024-34027 CVE-2024-35247 CVE-2024-36014 CVE-2024-36015
                 CVE-2024-36016 CVE-2024-36270 CVE-2024-36286 CVE-2024-36288
                 CVE-2024-36489 CVE-2024-36894 CVE-2024-36971 CVE-2024-36974
                 CVE-2024-36978 CVE-2024-37078 CVE-2024-37353 CVE-2024-37356
                 CVE-2024-38381 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548
                 CVE-2024-38549 CVE-2024-38552 CVE-2024-38555 CVE-2024-38558
                 CVE-2024-38559 CVE-2024-38560 CVE-2024-38565 CVE-2024-38567
                 CVE-2024-38578 CVE-2024-38579 CVE-2024-38582 CVE-2024-38583
                 CVE-2024-38586 CVE-2024-38587 CVE-2024-38589 CVE-2024-38590
                 CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599
                 CVE-2024-38601 CVE-2024-38605 CVE-2024-38607 CVE-2024-38612
                 CVE-2024-38613 CVE-2024-38615 CVE-2024-38618 CVE-2024-38619
                 CVE-2024-38621 CVE-2024-38627 CVE-2024-38633 CVE-2024-38634
                 CVE-2024-38635 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661
                 CVE-2024-38662 CVE-2024-38780 CVE-2024-39276 CVE-2024-39292
                 CVE-2024-39301 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469
                 CVE-2024-39471 CVE-2024-39475 CVE-2024-39476 CVE-2024-39480
                 CVE-2024-39482 CVE-2024-39484 CVE-2024-39488 CVE-2024-39489
                 CVE-2024-39493 CVE-2024-39495 CVE-2024-39499 CVE-2024-39501
                 CVE-2024-39502 CVE-2024-39503 CVE-2024-39505 CVE-2024-39506
                 CVE-2024-39509 CVE-2024-40901 CVE-2024-40902 CVE-2024-40904
                 CVE-2024-40905 CVE-2024-40912 CVE-2024-40916 CVE-2024-40929
                 CVE-2024-40931 CVE-2024-40932 CVE-2024-40934 CVE-2024-40941
                 CVE-2024-40942 CVE-2024-40943 CVE-2024-40945 CVE-2024-40958
                 CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40963
                 CVE-2024-40968 CVE-2024-40971 CVE-2024-40974 CVE-2024-40976
                 CVE-2024-40978 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983
                 CVE-2024-40984 CVE-2024-40987 CVE-2024-40988 CVE-2024-40990
                 CVE-2024-40993 CVE-2024-40995 CVE-2024-41000 CVE-2024-41004
                 CVE-2024-41005 CVE-2024-41006

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the oldstable distribution (bullseye), these problems have been fixed
in version 5.10.221-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmaVfQRfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QTQBAAjbkSAUDxfo/lXRTOhZ/6AB3rmZY9aTl99Xb1ylIxr2BYJDS1HqPeHtv9
574sis7ZyHK6FfaTO0mgX1xvg4eVGtnMWkJrROOVX7DtbKeHAFzhw9tfB2Ed7Yw1
kz9y+AOkIZe1Rua35FmgoYz5kgKtKUO2VN0Ku61x4CrzIPdhICE3/GDoJLlB5vnK
lPFId3Gkki5oZn3vdIj22uph1RFrdMsZKippTHfRXYPJGGbwjr5oOdmuWhIlsZuN
4M1mzVu9l0FkDwR1V3fTi7y5SdX0JOd9FxH0POiQ3udTAteeJC1Vh0YQHLVqIa/m
xr6m+p8XUSf0bZt+SdnqcNhpWk4NaRUqqHjBISDpzHpIiRj6/c5WCzyxf+lhR/BH
GsDXL2a8+pKGsJVd++GbmUp++2tv6b/DOT0OfIbgfpQdAemgpdGWhUcRUB650UaR
jg+Z7hVDL1gAN3hL16eRfO99/OYakVcS35qXC2+b3fIggz2oer5qnLZI0svojkDt
9oHiANpGFe4GZQjTfamRtG79uua3jyrtEg2qzopMtVdDokuOIHPuKqtraMbJ1JMx
Mtu7sYOSUsOLDSBqEJaPVzZUFoDOfBJ1/uZZ1msXefxkiTR2hyb4YMcd6MnV6nX4
NXAHKHsRChFeESP3b/z8Ca0alXQUrPUqb0U7fbW8mVYFnNT0R18=
=IskL
-----END PGP SIGNATURE-----


Reply to: