• [SECURITY] [DSA 5730-1] linux security update

    From Salvatore Bonaccorso@21:1/5 to All on Mon Jul 15 22:20:02 2024
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA512

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5730-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso
    July 15, 2024 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : linux
    CVE ID : CVE-2022-43945 CVE-2022-48772 CVE-2024-25741 CVE-2024-26629
    CVE-2024-27019 CVE-2024-31076 CVE-2024-33621 CVE-2024-33847
    CVE-2024-34027 CVE-2024-35247 CVE-2024-36014 CVE-2024-36015
    CVE-2024-36016 CVE-2024-36270 CVE-2024-36286 CVE-2024-36288
    CVE-2024-36489 CVE-2024-36894 CVE-2024-36971 CVE-2024-36974
    CVE-2024-36978 CVE-2024-37078 CVE-2024-37353 CVE-2024-37356
    CVE-2024-38381 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548
    CVE-2024-38549 CVE-2024-38552 CVE-2024-38555 CVE-2024-38558
    CVE-2024-38559 CVE-2024-38560 CVE-2024-38565 CVE-2024-38567
    CVE-2024-38578 CVE-2024-38579 CVE-2024-38582 CVE-2024-38583
    CVE-2024-38586 CVE-2024-38587 CVE-2024-38589 CVE-2024-38590
    CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599
    CVE-2024-38601 CVE-2024-38605 CVE-2024-38607 CVE-2024-38612
    CVE-2024-38613 CVE-2024-38615 CVE-2024-38618 CVE-2024-38619
    CVE-2024-38621 CVE-2024-38627 CVE-2024-38633 CVE-2024-38634
    CVE-2024-38635 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661
    CVE-2024-38662 CVE-2024-38780 CVE-2024-39276 CVE-2024-39292
    CVE-2024-39301 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469
    CVE-2024-39471 CVE-2024-39475 CVE-2024-39476 CVE-2024-39480
    CVE-2024-39482 CVE-2024-39484 CVE-2024-39488 CVE-2024-39489
    CVE-2024-39493 CVE-2024-39495 CVE-2024-39499 CVE-2024-39501
    CVE-2024-39502 CVE-2024-39503 CVE-2024-39505 CVE-2024-39506
    CVE-2024-39509 CVE-2024-40901 CVE-2024-40902 CVE-2024-40904
    CVE-2024-40905 CVE-2024-40912 CVE-2024-40916 CVE-2024-40929
    CVE-2024-40931 CVE-2024-40932 CVE-2024-40934 CVE-2024-40941
    CVE-2024-40942 CVE-2024-40943 CVE-2024-40945 CVE-2024-40958
    CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40963
    CVE-2024-40968 CVE-2024-40971 CVE-2024-40974 CVE-2024-40976
    CVE-2024-40978 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983
    CVE-2024-40984 CVE-2024-40987 CVE-2024-40988 CVE-2024-40990
    CVE-2024-40993 CVE-2024-40995 CVE-2024-41000 CVE-2024-41004
    CVE-2024-41005 CVE-2024-41006

    Several vulnerabilities have been discovered in the Linux kernel that
    may lead to a privilege escalation, denial of service or information
    leaks.

    For the oldstable distribution (bullseye), these problems have been fixed
    in version 5.10.221-1.

    We recommend that you upgrade your linux packages.

    For the detailed security status of linux please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/linux

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmaVfQRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QTQBAAjbkSAUDxfo/lXRTOhZ/6AB3rmZY9aTl99Xb1ylIxr2BYJDS1HqPeHtv9 574sis7ZyHK6FfaTO0mgX1xvg4eVGtnMWkJrROOVX7DtbKeHAFzhw9tfB2Ed7Yw1 kz9y+AOkIZe1Rua35FmgoYz5kgKtKUO2VN0Ku61x4CrzIPdhICE3/GDoJLlB5vnK lPFId3Gkki5oZn3vdIj22uph1RFrdMsZKippTHfRXYPJGGbwjr5oOdmuWhIlsZuN 4M1mzVu9l0FkDwR1V3fTi7y5SdX0JOd9FxH0POiQ3udTAteeJC1Vh0YQHLVqIa/m xr6m+p8XUSf0bZt+SdnqcNhpWk4NaRUqqHjBISDpzHpIiRj6/c5WCzyxf+lhR/BH GsDXL2a8+pKGsJVd++GbmUp++2tv6b/DOT0OfIbgfpQdAemgpdGWhUcRUB650UaR jg+Z7hVDL1gAN3hL16eRfO99/OYakVcS35qXC2+b3fIggz2oer5qnLZI0svojkDt 9oHiANpGFe4GZQjTfamRtG79uua3jyrtEg2qzopMtVdDokuOIHPuKqtraMbJ1JMx Mtu7sYOSUsOLDSBqEJaPVzZUFoDOfBJ1/uZZ1msXefxkiTR2hyb4YMcd6MnV6nX4 NXAHKHsRChFeESP3b/z8Ca0alXQUrPUqb0U7fbW8mVYFnNT0R18=
    =IskL
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)