what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5730-1

Debian Security Advisory 5730-1
Posted Jul 16, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5730-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2022-43945, CVE-2022-48772, CVE-2024-25741, CVE-2024-26629, CVE-2024-27019, CVE-2024-31076, CVE-2024-33621, CVE-2024-33847, CVE-2024-34027, CVE-2024-35247, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36270
SHA-256 | 5695db9a181faca11e0a918e56356aebed3f6ade1f14c4e4d4d31b821067795a

Debian Security Advisory 5730-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5730-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 15, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2022-43945 CVE-2022-48772 CVE-2024-25741 CVE-2024-26629
CVE-2024-27019 CVE-2024-31076 CVE-2024-33621 CVE-2024-33847
CVE-2024-34027 CVE-2024-35247 CVE-2024-36014 CVE-2024-36015
CVE-2024-36016 CVE-2024-36270 CVE-2024-36286 CVE-2024-36288
CVE-2024-36489 CVE-2024-36894 CVE-2024-36971 CVE-2024-36974
CVE-2024-36978 CVE-2024-37078 CVE-2024-37353 CVE-2024-37356
CVE-2024-38381 CVE-2024-38546 CVE-2024-38547 CVE-2024-38548
CVE-2024-38549 CVE-2024-38552 CVE-2024-38555 CVE-2024-38558
CVE-2024-38559 CVE-2024-38560 CVE-2024-38565 CVE-2024-38567
CVE-2024-38578 CVE-2024-38579 CVE-2024-38582 CVE-2024-38583
CVE-2024-38586 CVE-2024-38587 CVE-2024-38589 CVE-2024-38590
CVE-2024-38596 CVE-2024-38597 CVE-2024-38598 CVE-2024-38599
CVE-2024-38601 CVE-2024-38605 CVE-2024-38607 CVE-2024-38612
CVE-2024-38613 CVE-2024-38615 CVE-2024-38618 CVE-2024-38619
CVE-2024-38621 CVE-2024-38627 CVE-2024-38633 CVE-2024-38634
CVE-2024-38635 CVE-2024-38637 CVE-2024-38659 CVE-2024-38661
CVE-2024-38662 CVE-2024-38780 CVE-2024-39276 CVE-2024-39292
CVE-2024-39301 CVE-2024-39467 CVE-2024-39468 CVE-2024-39469
CVE-2024-39471 CVE-2024-39475 CVE-2024-39476 CVE-2024-39480
CVE-2024-39482 CVE-2024-39484 CVE-2024-39488 CVE-2024-39489
CVE-2024-39493 CVE-2024-39495 CVE-2024-39499 CVE-2024-39501
CVE-2024-39502 CVE-2024-39503 CVE-2024-39505 CVE-2024-39506
CVE-2024-39509 CVE-2024-40901 CVE-2024-40902 CVE-2024-40904
CVE-2024-40905 CVE-2024-40912 CVE-2024-40916 CVE-2024-40929
CVE-2024-40931 CVE-2024-40932 CVE-2024-40934 CVE-2024-40941
CVE-2024-40942 CVE-2024-40943 CVE-2024-40945 CVE-2024-40958
CVE-2024-40959 CVE-2024-40960 CVE-2024-40961 CVE-2024-40963
CVE-2024-40968 CVE-2024-40971 CVE-2024-40974 CVE-2024-40976
CVE-2024-40978 CVE-2024-40980 CVE-2024-40981 CVE-2024-40983
CVE-2024-40984 CVE-2024-40987 CVE-2024-40988 CVE-2024-40990
CVE-2024-40993 CVE-2024-40995 CVE-2024-41000 CVE-2024-41004
CVE-2024-41005 CVE-2024-41006

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the oldstable distribution (bullseye), these problems have been fixed
in version 5.10.221-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmaVfQRfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QTQBAAjbkSAUDxfo/lXRTOhZ/6AB3rmZY9aTl99Xb1ylIxr2BYJDS1HqPeHtv9
574sis7ZyHK6FfaTO0mgX1xvg4eVGtnMWkJrROOVX7DtbKeHAFzhw9tfB2Ed7Yw1
kz9y+AOkIZe1Rua35FmgoYz5kgKtKUO2VN0Ku61x4CrzIPdhICE3/GDoJLlB5vnK
lPFId3Gkki5oZn3vdIj22uph1RFrdMsZKippTHfRXYPJGGbwjr5oOdmuWhIlsZuN
4M1mzVu9l0FkDwR1V3fTi7y5SdX0JOd9FxH0POiQ3udTAteeJC1Vh0YQHLVqIa/m
xr6m+p8XUSf0bZt+SdnqcNhpWk4NaRUqqHjBISDpzHpIiRj6/c5WCzyxf+lhR/BH
GsDXL2a8+pKGsJVd++GbmUp++2tv6b/DOT0OfIbgfpQdAemgpdGWhUcRUB650UaR
jg+Z7hVDL1gAN3hL16eRfO99/OYakVcS35qXC2+b3fIggz2oer5qnLZI0svojkDt
9oHiANpGFe4GZQjTfamRtG79uua3jyrtEg2qzopMtVdDokuOIHPuKqtraMbJ1JMx
Mtu7sYOSUsOLDSBqEJaPVzZUFoDOfBJ1/uZZ1msXefxkiTR2hyb4YMcd6MnV6nX4
NXAHKHsRChFeESP3b/z8Ca0alXQUrPUqb0U7fbW8mVYFnNT0R18=
=IskL
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    382 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close