-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5730-1
security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso
July 15, 2024
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2022-43945 CVE-2022-48772 CVE-2024-25741 CVE-2024-26629
CVE-2024-27019 CVE-2024-31076 CVE-2024-33621 CVE-2024-33847
CVE-2024-34027 CVE-2024-35247 CVE-2024-36014 CVE-2024-36015
CVE-2024-36016 CVE-2024-36270 CVE-2024-36286 CVE-2024-36288
CVE-2024-36489 CVE-2024-36894 CVE-2024-36971 CVE-2024-36974
CVE-2024-36978 CVE-2024-37078 CVE-2024-37353 CVE-2024-37356
CVE-2024-38381 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548
CVE-2024-38549 CVE-2024-38552 CVE-2024-38555 CVE-2024-38558
CVE-2024-38559 CVE-2024-38560 CVE-2024-38565 CVE-2024-38567
CVE-2024-38578 CVE-2024-38579 CVE-2024-38582 CVE-2024-38583
CVE-2024-38586 CVE-2024-38587 CVE-2024-38589 CVE-2024-38590
CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599
CVE-2024-38601 CVE-2024-38605 CVE-2024-38607 CVE-2024-38612
CVE-2024-38613 CVE-2024-38615 CVE-2024-38618 CVE-2024-38619
CVE-2024-38621 CVE-2024-38627 CVE-2024-38633 CVE-2024-38634
CVE-2024-38635 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661
CVE-2024-38662 CVE-2024-38780 CVE-2024-39276 CVE-2024-39292
CVE-2024-39301 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469
CVE-2024-39471 CVE-2024-39475 CVE-2024-39476 CVE-2024-39480
CVE-2024-39482 CVE-2024-39484 CVE-2024-39488 CVE-2024-39489
CVE-2024-39493 CVE-2024-39495 CVE-2024-39499 CVE-2024-39501
CVE-2024-39502 CVE-2024-39503 CVE-2024-39505 CVE-2024-39506
CVE-2024-39509 CVE-2024-40901 CVE-2024-40902 CVE-2024-40904
CVE-2024-40905 CVE-2024-40912 CVE-2024-40916 CVE-2024-40929
CVE-2024-40931 CVE-2024-40932 CVE-2024-40934 CVE-2024-40941
CVE-2024-40942 CVE-2024-40943 CVE-2024-40945 CVE-2024-40958
CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40963
CVE-2024-40968 CVE-2024-40971 CVE-2024-40974 CVE-2024-40976
CVE-2024-40978 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983
CVE-2024-40984 CVE-2024-40987 CVE-2024-40988 CVE-2024-40990
CVE-2024-40993 CVE-2024-40995 CVE-2024-41000 CVE-2024-41004
CVE-2024-41005 CVE-2024-41006
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
For the oldstable distribution (bullseye), these problems have been fixed
in version 5.10.221-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmaVfQRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QTQBAAjbkSAUDxfo/lXRTOhZ/6AB3rmZY9aTl99Xb1ylIxr2BYJDS1HqPeHtv9 574sis7ZyHK6FfaTO0mgX1xvg4eVGtnMWkJrROOVX7DtbKeHAFzhw9tfB2Ed7Yw1 kz9y+AOkIZe1Rua35FmgoYz5kgKtKUO2VN0Ku61x4CrzIPdhICE3/GDoJLlB5vnK lPFId3Gkki5oZn3vdIj22uph1RFrdMsZKippTHfRXYPJGGbwjr5oOdmuWhIlsZuN 4M1mzVu9l0FkDwR1V3fTi7y5SdX0JOd9FxH0POiQ3udTAteeJC1Vh0YQHLVqIa/m xr6m+p8XUSf0bZt+SdnqcNhpWk4NaRUqqHjBISDpzHpIiRj6/c5WCzyxf+lhR/BH GsDXL2a8+pKGsJVd++GbmUp++2tv6b/DOT0OfIbgfpQdAemgpdGWhUcRUB650UaR jg+Z7hVDL1gAN3hL16eRfO99/OYakVcS35qXC2+b3fIggz2oer5qnLZI0svojkDt 9oHiANpGFe4GZQjTfamRtG79uua3jyrtEg2qzopMtVdDokuOIHPuKqtraMbJ1JMx Mtu7sYOSUsOLDSBqEJaPVzZUFoDOfBJ1/uZZ1msXefxkiTR2hyb4YMcd6MnV6nX4 NXAHKHsRChFeESP3b/z8Ca0alXQUrPUqb0U7fbW8mVYFnNT0R18=
=IskL
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)