Debian Security Advisory 5818-1
2024-11-25 22:39:22 Author: packetstormsecurity.com(查看原文) 阅读量:5 收藏

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5818-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
November 24, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2022-45888 CVE-2023-52812 CVE-2024-26952 CVE-2024-26954
CVE-2024-35964 CVE-2024-36244 CVE-2024-36478 CVE-2024-36914
CVE-2024-36915 CVE-2024-36923 CVE-2024-38540 CVE-2024-38553
CVE-2024-41080 CVE-2024-42322 CVE-2024-43868 CVE-2024-43904
CVE-2024-43911 CVE-2024-44949 CVE-2024-49950 CVE-2024-49960
CVE-2024-49974 CVE-2024-49986 CVE-2024-49991 CVE-2024-50012
CVE-2024-50036 CVE-2024-50067 CVE-2024-50072 CVE-2024-50126
CVE-2024-50215 CVE-2024-50218 CVE-2024-50228 CVE-2024-50229
CVE-2024-50230 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234
CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50242
CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50247
CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252
CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50259
CVE-2024-50261 CVE-2024-50262 CVE-2024-50264 CVE-2024-50265
CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50271
CVE-2024-50272 CVE-2024-50273 CVE-2024-50276 CVE-2024-50278
CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283
CVE-2024-50284 CVE-2024-50286 CVE-2024-50287 CVE-2024-50290
CVE-2024-50292 CVE-2024-50295 CVE-2024-50296 CVE-2024-50299
CVE-2024-50301 CVE-2024-50302 CVE-2024-53042 CVE-2024-53043
CVE-2024-53052 CVE-2024-53054 CVE-2024-53055 CVE-2024-53057
CVE-2024-53058 CVE-2024-53059 CVE-2024-53060 CVE-2024-53061
CVE-2024-53063 CVE-2024-53066 CVE-2024-53070 CVE-2024-53072
CVE-2024-53081 CVE-2024-53082 CVE-2024-53088 CVE-2024-53093

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.119-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmdDS8lfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QwLw/+OVgV3FTBaH3iV5PLBx/mLJH6xhNQeHzzlQXnREHfueWblf9QSCjRGHkl
3ZlIvTKIEp7K5mNjqLBzbDjRNWijJdcDPqEp8dVET9Xwvht6AOX3C/oZpIPlLKkf
ei0vJSUVIselsK5WfndPi19gR/Y0asKUF+XK47nchELEkZX9r+Mv36yib4z2z4b8
K0iUtpInS5krLrqHTJbo8tJZ69C7a+U12KYGhzbDFSGM39mDhKWQ/gmloxjXHu8K
sS84Z4SwWMll1pcjfiFVeD669zUS/VHR8Y34s2pjPwqqIejDORUZbFc6FQhP+Vk6
PJVAAPWv0n39Ag1gQ21/BQis+b2CcC9CHWuMaG6ELQ/8HmcTCQkCOwzCCPN2woMy
mLLK2gR6hEU+zuBs4Pg7jvdAeznbCmG28WfR9FO+WO410rWc7+IL5vcbGDGUVNu2
vIq+R6GKqUC+6maOxc78NKFuU0c09hvK6UHiTuFlFScSI1vhg8mIxSbwWEpVlDA/
dRXWkGneZ+2/gqUBGK31X295irixsNjvjjipMB4K28WSqeaQdJh2IMgIViL05/TL
4jJELIIpcizck336YsfY9Ylfc0lqdqumbzZnM3ifm3nGeOc6zK5bZmn5YLxju/qk
xmj6u8WD5je+Dm8OCWWF22SPNSJ3xoaqchKKQSYwow3G1nqEqKI=
=lqjj
-----END PGP SIGNATURE-----


文章来源: https://packetstormsecurity.com/files/182826/dsa-5818-1.txt
如有侵权请联系:admin#unsafe.sh