[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5860-1] linux security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5860-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 08, 2025                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2024-36899 CVE-2024-49994 CVE-2024-50014 CVE-2024-50047
                 CVE-2024-50164 CVE-2024-50304 CVE-2024-53124 CVE-2024-53128
                 CVE-2024-53170 CVE-2024-53229 CVE-2024-53234 CVE-2024-53685
                 CVE-2024-56551 CVE-2024-56599 CVE-2024-56608 CVE-2024-56631
                 CVE-2024-56664 CVE-2024-56703 CVE-2024-57887 CVE-2024-57892
                 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908
                 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913
                 CVE-2024-57915 CVE-2024-57916 CVE-2024-57917 CVE-2024-57922
                 CVE-2024-57925 CVE-2024-57929 CVE-2024-57939 CVE-2024-57940
                 CVE-2024-57948 CVE-2025-21631 CVE-2025-21636 CVE-2025-21637
                 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21646
                 CVE-2025-21647 CVE-2025-21648 CVE-2025-21653 CVE-2025-21655
                 CVE-2025-21660 CVE-2025-21662 CVE-2025-21664 CVE-2025-21665
                 CVE-2025-21666 CVE-2025-21667 CVE-2025-21668 CVE-2025-21669
                 CVE-2025-21671 CVE-2025-21675 CVE-2025-21678 CVE-2025-21680
                 CVE-2025-21681 CVE-2025-21683

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.128-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=g0dw
-----END PGP SIGNATURE-----


Reply to: