Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in linux
ID: DSA-5782-1
Distribution: Debian
Plattformen: Debian bookworm
Datum: Do, 3. Oktober 2024, 22:42
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45029
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46732
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46763
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46853
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45009
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42314
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740
Applikationen: Linux

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5782-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 03, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2023-31083 CVE-2024-27017 CVE-2024-35937 CVE-2024-35943
CVE-2024-35966 CVE-2024-40972 CVE-2024-41016 CVE-2024-41096
CVE-2024-41098 CVE-2024-42228 CVE-2024-42314 CVE-2024-43835
CVE-2024-43859 CVE-2024-43884 CVE-2024-43892 CVE-2024-44931
CVE-2024-44938 CVE-2024-44939 CVE-2024-44940 CVE-2024-44946
CVE-2024-44947 CVE-2024-44974 CVE-2024-44977 CVE-2024-44982
CVE-2024-44983 CVE-2024-44985 CVE-2024-44986 CVE-2024-44987
CVE-2024-44988 CVE-2024-44989 CVE-2024-44990 CVE-2024-44991
CVE-2024-44995 CVE-2024-44998 CVE-2024-44999 CVE-2024-45000
CVE-2024-45002 CVE-2024-45003 CVE-2024-45006 CVE-2024-45007
CVE-2024-45008 CVE-2024-45009 CVE-2024-45010 CVE-2024-45011
CVE-2024-45016 CVE-2024-45018 CVE-2024-45019 CVE-2024-45021
CVE-2024-45022 CVE-2024-45025 CVE-2024-45026 CVE-2024-45028
CVE-2024-45029 CVE-2024-46673 CVE-2024-46674 CVE-2024-46675
CVE-2024-46676 CVE-2024-46677 CVE-2024-46679 CVE-2024-46685
CVE-2024-46686 CVE-2024-46689 CVE-2024-46694 CVE-2024-46702
CVE-2024-46707 CVE-2024-46711 CVE-2024-46713 CVE-2024-46714
CVE-2024-46715 CVE-2024-46716 CVE-2024-46717 CVE-2024-46719
CVE-2024-46720 CVE-2024-46721 CVE-2024-46722 CVE-2024-46723
CVE-2024-46724 CVE-2024-46725 CVE-2024-46726 CVE-2024-46731
CVE-2024-46732 CVE-2024-46734 CVE-2024-46735 CVE-2024-46737
CVE-2024-46738 CVE-2024-46739 CVE-2024-46740 CVE-2024-46743
CVE-2024-46744 CVE-2024-46745 CVE-2024-46746 CVE-2024-46747
CVE-2024-46750 CVE-2024-46752 CVE-2024-46755 CVE-2024-46756
CVE-2024-46757 CVE-2024-46758 CVE-2024-46759 CVE-2024-46761
CVE-2024-46763 CVE-2024-46770 CVE-2024-46771 CVE-2024-46773
CVE-2024-46777 CVE-2024-46780 CVE-2024-46781 CVE-2024-46782
CVE-2024-46783 CVE-2024-46784 CVE-2024-46791 CVE-2024-46794
CVE-2024-46795 CVE-2024-46798 CVE-2024-46800 CVE-2024-46802
CVE-2024-46804 CVE-2024-46805 CVE-2024-46807 CVE-2024-46810
CVE-2024-46812 CVE-2024-46814 CVE-2024-46815 CVE-2024-46817
CVE-2024-46818 CVE-2024-46819 CVE-2024-46821 CVE-2024-46822
CVE-2024-46826 CVE-2024-46828 CVE-2024-46829 CVE-2024-46830
CVE-2024-46832 CVE-2024-46835 CVE-2024-46836 CVE-2024-46840
CVE-2024-46844 CVE-2024-46846 CVE-2024-46848 CVE-2024-46849
CVE-2024-46852 CVE-2024-46853 CVE-2024-46854 CVE-2024-46855
CVE-2024-46857 CVE-2024-46858 CVE-2024-46859 CVE-2024-46865

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.112-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=J2U0
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung