Zum Inhalt springen.
Sympa Menü

it-securitynotifies - [IT-SecNots] [SECURITY] [DSA 5730-1] linux security update

it-securitynotifies AT lists.piratenpartei.de

Betreff: Sicherheitsankündigungen

Listenarchiv

[IT-SecNots] [SECURITY] [DSA 5730-1] linux security update


Chronologisch Thread  
  • From: Salvatore Bonaccorso <carnil AT debian.org>
  • To: debian-security-announce AT lists.debian.org
  • Subject: [IT-SecNots] [SECURITY] [DSA 5730-1] linux security update
  • Date: Mon, 15 Jul 2024 20:09:12 +0000
  • List-archive: https://lists.debian.org/msgid-search/E1sTS0W-00Fs4k-PH AT seger.debian.org
  • List-id: <debian-security-announce.lists.debian.org>
  • List-url: <http://lists.debian.org/debian-security-announce/>
  • Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Date:Message-Id:Subject:To:From:Reply-To:Cc:MIME-Version: Content-Type:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=oXqWijRreTi0VVhXTSGN/zkG1tMdxM05qh9L7u0bjTc=; b=pD syJDsAFzG11FJ9A1WJxC7MGSVAK7jBYlE45ijJxNiMU958UM0lqi4PWp8nBU8hNuiMoq/++pV64nz tDZS1asMkZuIzXUtMcXNfQyxap1BqbwKJpkd6VeMxQ6KE+XZ7n8ZeZK6+gLgZSyf1+YF0iGqM6OTA fqL2rYQ9DfGH2dOhcZPN0mFA4ihyIlgVBLvniUk2fetdqD46uNdKVlKQPe1cAGGqpl3RFEk1qIrnv rC7Im9fHyklaQPZnCRUEvTfhBT8HxqeYLOjeiTv78IIc7Vn75/FYp95sWKQQ9UqzOPVFN+wT1K2rc jj0LfFFizU1Uk4hZq7EWOnJ/SO1K75cw==;
  • Old-return-path: <carnil AT seger.debian.org>
  • Priority: urgent
  • Resent-date: Mon, 15 Jul 2024 20:09:35 +0000 (UTC)
  • Resent-from: debian-security-announce AT lists.debian.org
  • Resent-message-id: <hsOHOgQnjeB.A.UDtL._HYlmB@bendel>
  • Resent-sender: debian-security-announce-request AT lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5730-1 security AT debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 15, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2022-43945 CVE-2022-48772 CVE-2024-25741 CVE-2024-26629
CVE-2024-27019 CVE-2024-31076 CVE-2024-33621 CVE-2024-33847
CVE-2024-34027 CVE-2024-35247 CVE-2024-36014 CVE-2024-36015
CVE-2024-36016 CVE-2024-36270 CVE-2024-36286 CVE-2024-36288
CVE-2024-36489 CVE-2024-36894 CVE-2024-36971 CVE-2024-36974
CVE-2024-36978 CVE-2024-37078 CVE-2024-37353 CVE-2024-37356
CVE-2024-38381 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548
CVE-2024-38549 CVE-2024-38552 CVE-2024-38555 CVE-2024-38558
CVE-2024-38559 CVE-2024-38560 CVE-2024-38565 CVE-2024-38567
CVE-2024-38578 CVE-2024-38579 CVE-2024-38582 CVE-2024-38583
CVE-2024-38586 CVE-2024-38587 CVE-2024-38589 CVE-2024-38590
CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599
CVE-2024-38601 CVE-2024-38605 CVE-2024-38607 CVE-2024-38612
CVE-2024-38613 CVE-2024-38615 CVE-2024-38618 CVE-2024-38619
CVE-2024-38621 CVE-2024-38627 CVE-2024-38633 CVE-2024-38634
CVE-2024-38635 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661
CVE-2024-38662 CVE-2024-38780 CVE-2024-39276 CVE-2024-39292
CVE-2024-39301 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469
CVE-2024-39471 CVE-2024-39475 CVE-2024-39476 CVE-2024-39480
CVE-2024-39482 CVE-2024-39484 CVE-2024-39488 CVE-2024-39489
CVE-2024-39493 CVE-2024-39495 CVE-2024-39499 CVE-2024-39501
CVE-2024-39502 CVE-2024-39503 CVE-2024-39505 CVE-2024-39506
CVE-2024-39509 CVE-2024-40901 CVE-2024-40902 CVE-2024-40904
CVE-2024-40905 CVE-2024-40912 CVE-2024-40916 CVE-2024-40929
CVE-2024-40931 CVE-2024-40932 CVE-2024-40934 CVE-2024-40941
CVE-2024-40942 CVE-2024-40943 CVE-2024-40945 CVE-2024-40958
CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40963
CVE-2024-40968 CVE-2024-40971 CVE-2024-40974 CVE-2024-40976
CVE-2024-40978 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983
CVE-2024-40984 CVE-2024-40987 CVE-2024-40988 CVE-2024-40990
CVE-2024-40993 CVE-2024-40995 CVE-2024-41000 CVE-2024-41004
CVE-2024-41005 CVE-2024-41006

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the oldstable distribution (bullseye), these problems have been fixed
in version 5.10.221-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=IskL
-----END PGP SIGNATURE-----



  • [IT-SecNots] [SECURITY] [DSA 5730-1] linux security update, Salvatore Bonaccorso, 15.07.2024

Archiv bereitgestellt durch MHonArc 2.6.19+.

Seitenanfang