-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5731-1
security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso
July 16, 2024
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : linux
CVE ID : CVE-2023-52760 CVE-2024-25741 CVE-2024-27397 CVE-2024-36894
CVE-2024-36973 CVE-2024-36978 CVE-2024-37078 CVE-2024-38619
CVE-2024-39298 CVE-2024-39371 CVE-2024-39469 CVE-2024-39474
CVE-2024-39484 CVE-2024-39487 CVE-2024-39494 CVE-2024-39495
CVE-2024-39496 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501
CVE-2024-39502 CVE-2024-39503 CVE-2024-39505 CVE-2024-39506
CVE-2024-39507 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899
CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903
CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908
CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913
CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40919
CVE-2024-40920 CVE-2024-40921 CVE-2024-40924 CVE-2024-40927
CVE-2024-40929 CVE-2024-40931 CVE-2024-40932 CVE-2024-40934
CVE-2024-40935 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939
CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943
CVE-2024-40947 CVE-2024-40948 CVE-2024-40953 CVE-2024-40954
CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959
CVE-2024-40960 CVE-2024-40961 CVE-2024-40963 CVE-2024-40966
CVE-2024-40967 CVE-2024-40968 CVE-2024-40970 CVE-2024-40971
CVE-2024-40974 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978
CVE-2024-40980 CVE-2024-40981 CVE-2024-40983 CVE-2024-40984
CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990
CVE-2024-40993 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996
CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41004
CVE-2024-41005 CVE-2024-41006
Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
For the stable distribution (bookworm), these problems have been fixed in version 6.1.99-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmaWylhfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0SMThAAiAanrQH+A4sTcRMZgwj521PKppx6+06c3jbqktG8XwQeOmaRrA1tgeyV ABahFSib/84PJtdqpW8+EHSJvGvxm9TKND98pPV6SjId2Ly7D+ARnfm6vIZzW/Sv WOZx0IU/So8qbZ7OjvKTfT+869yJ+MfRnYhdfuFTSJaZYehMyeizUMM5fjBX3dSf BBKcxR9w/RI2OgxiN45Q9+FrCCMS26RBTzRcb3pskw8741gzDyEostjjG+k5B8XJ /gEu10O3dGKtRV/1Uhkd5R4ACkcXHovox9EmA2vizGNfhf981cTeBT2ZIPIzstIY +/vkd4uUPi/OgIEBlkvcQx0UUaYctqDOnpvRqrLU9hwBkhlk0ueHxaHiBl9tf6L2 CDYb1BROY2A0eDSqCFugYMjzZDIbihFUS1Ly1TKDqea5xDTfiZcWa1u7bFp/LR2C 075lTh79e3GMdFceWfJk9SiPrFZnpCiokTmvbg4c0U7ac8ruXbAcV4i79exMTgwe VtUBFRufnLesmMmolGnqWSDA4Mf+w04MXJj3tU9N4MfC0bG0Y46IlNrabDOhUlns VdHvDLQOIMcFOl8rfKjFs+wTuUkRZUSFNQotG1WDiTezcQqbMS2eodVCB6Cq/51W L6oukVbbmncmYgYY3BGLTfn7ZxHUK3nhu/WmxtmwI4KsViLd8+Q=
=KPq+
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)