Debian Security Advisory 5731-1
2024-7-18 01:30:37 Author: packetstormsecurity.com(查看原文) 阅读量:5 收藏

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5731-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
July 16, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2023-52760 CVE-2024-25741 CVE-2024-27397 CVE-2024-36894
CVE-2024-36973 CVE-2024-36978 CVE-2024-37078 CVE-2024-38619
CVE-2024-39298 CVE-2024-39371 CVE-2024-39469 CVE-2024-39474
CVE-2024-39484 CVE-2024-39487 CVE-2024-39494 CVE-2024-39495
CVE-2024-39496 CVE-2024-39499 CVE-2024-39500 CVE-2024-39501
CVE-2024-39502 CVE-2024-39503 CVE-2024-39505 CVE-2024-39506
CVE-2024-39507 CVE-2024-39509 CVE-2024-39510 CVE-2024-40899
CVE-2024-40900 CVE-2024-40901 CVE-2024-40902 CVE-2024-40903
CVE-2024-40904 CVE-2024-40905 CVE-2024-40906 CVE-2024-40908
CVE-2024-40910 CVE-2024-40911 CVE-2024-40912 CVE-2024-40913
CVE-2024-40914 CVE-2024-40915 CVE-2024-40916 CVE-2024-40919
CVE-2024-40920 CVE-2024-40921 CVE-2024-40924 CVE-2024-40927
CVE-2024-40929 CVE-2024-40931 CVE-2024-40932 CVE-2024-40934
CVE-2024-40935 CVE-2024-40937 CVE-2024-40938 CVE-2024-40939
CVE-2024-40940 CVE-2024-40941 CVE-2024-40942 CVE-2024-40943
CVE-2024-40947 CVE-2024-40948 CVE-2024-40953 CVE-2024-40954
CVE-2024-40956 CVE-2024-40957 CVE-2024-40958 CVE-2024-40959
CVE-2024-40960 CVE-2024-40961 CVE-2024-40963 CVE-2024-40966
CVE-2024-40967 CVE-2024-40968 CVE-2024-40970 CVE-2024-40971
CVE-2024-40974 CVE-2024-40976 CVE-2024-40977 CVE-2024-40978
CVE-2024-40980 CVE-2024-40981 CVE-2024-40983 CVE-2024-40984
CVE-2024-40987 CVE-2024-40988 CVE-2024-40989 CVE-2024-40990
CVE-2024-40993 CVE-2024-40994 CVE-2024-40995 CVE-2024-40996
CVE-2024-41000 CVE-2024-41001 CVE-2024-41002 CVE-2024-41004
CVE-2024-41005 CVE-2024-41006

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.99-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----
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=KPq+
-----END PGP SIGNATURE-----


文章来源: https://packetstormsecurity.com/files/179584/dsa-5731-1.txt
如有侵权请联系:admin#unsafe.sh