it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Salvatore Bonaccorso <carnil AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5680-1] linux security update
- Date: Mon, 06 May 2024 17:39:10 +0000
- List-archive: https://lists.debian.org/msgid-search/E1s42Iw-006OLS-9Q AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=L94C2BOdGZuyh4WrxP+aMhZmkZuH09Fu7cGofyl/1OA=; b=fG qrJQQfvGgZ4mRuVn65VItKX8mDrEkjdyUwuHIsKNBk6L6f9tVOPnDjAPSRg8cGDEramAAzQv5lBXQ XHROJOYsG75/TECTf1+YjoXRIXcc1IHnL19ysl7vUhaFF7QBln1gQuNQh5rJ4KM6gZ5FRxi87X5Ll Y68IsdxJQnTlApIlOXhR7P/R039wFqCRF8klktX+ZvRfHG+Pu9Q7+TYJ1xPX9KJjZkQ8m7TCq+7Rb f4caZREpmpke+MyMfSGv9urskvDeZVYlqFIXrcM84E9GxdN1T8eNZUfvDJt8ZGRi7T0EnYzZY2XFY s1j4oq5KNh+djBxTIut/mKW+NbSjH9Cw==;
- Old-return-path: <carnil AT seger.debian.org>
- Priority: urgent
- Resent-date: Mon, 6 May 2024 17:40:03 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <zkH_qTdFU0J.A.qLF.yXROmB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5680-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
May 06, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2024-26605 CVE-2024-26817 CVE-2024-26922 CVE-2024-26923
CVE-2024-26924 CVE-2024-26925 CVE-2024-26926 CVE-2024-26936
CVE-2024-26939 CVE-2024-26980 CVE-2024-26981 CVE-2024-26983
CVE-2024-26984 CVE-2024-26987 CVE-2024-26988 CVE-2024-26989
CVE-2024-26992 CVE-2024-26993 CVE-2024-26994 CVE-2024-26996
CVE-2024-26997 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001
CVE-2024-27002 CVE-2024-27003 CVE-2024-27004 CVE-2024-27008
CVE-2024-27009 CVE-2024-27013 CVE-2024-27014 CVE-2024-27015
CVE-2024-27016 CVE-2024-27018 CVE-2024-27019 CVE-2024-27020
CVE-2024-27022
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
For the stable distribution (bookworm), these problems have been fixed in
version 6.1.90-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=3Xuh
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5680-1] linux security update, Salvatore Bonaccorso, 06.05.2024
Archiv bereitgestellt durch MHonArc 2.6.19+.