exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5818-1

Debian Security Advisory 5818-1
Posted Nov 25, 2024
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5818-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2022-45888, CVE-2023-52812, CVE-2024-26952, CVE-2024-26954, CVE-2024-35964, CVE-2024-36244, CVE-2024-36478, CVE-2024-36914, CVE-2024-36915, CVE-2024-36923, CVE-2024-38540, CVE-2024-38553, CVE-2024-41080, CVE-2024-42322
SHA-256 | b10cf31b1e59a50271e644e96c8fcafc944012327273a87c01f28f6ddce9d4d0

Debian Security Advisory 5818-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5818-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 24, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2022-45888 CVE-2023-52812 CVE-2024-26952 CVE-2024-26954
CVE-2024-35964 CVE-2024-36244 CVE-2024-36478 CVE-2024-36914
CVE-2024-36915 CVE-2024-36923 CVE-2024-38540 CVE-2024-38553
CVE-2024-41080 CVE-2024-42322 CVE-2024-43868 CVE-2024-43904
CVE-2024-43911 CVE-2024-44949 CVE-2024-49950 CVE-2024-49960
CVE-2024-49974 CVE-2024-49986 CVE-2024-49991 CVE-2024-50012
CVE-2024-50036 CVE-2024-50067 CVE-2024-50072 CVE-2024-50126
CVE-2024-50215 CVE-2024-50218 CVE-2024-50228 CVE-2024-50229
CVE-2024-50230 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234
CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50242
CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50247
CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252
CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50259
CVE-2024-50261 CVE-2024-50262 CVE-2024-50264 CVE-2024-50265
CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50271
CVE-2024-50272 CVE-2024-50273 CVE-2024-50276 CVE-2024-50278
CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283
CVE-2024-50284 CVE-2024-50286 CVE-2024-50287 CVE-2024-50290
CVE-2024-50292 CVE-2024-50295 CVE-2024-50296 CVE-2024-50299
CVE-2024-50301 CVE-2024-50302 CVE-2024-53042 CVE-2024-53043
CVE-2024-53052 CVE-2024-53054 CVE-2024-53055 CVE-2024-53057
CVE-2024-53058 CVE-2024-53059 CVE-2024-53060 CVE-2024-53061
CVE-2024-53063 CVE-2024-53066 CVE-2024-53070 CVE-2024-53072
CVE-2024-53081 CVE-2024-53082 CVE-2024-53088 CVE-2024-53093

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.119-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=lqjj
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close