Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in linux
ID: DSA-5818-1
Distribution: Debian
Plattformen: Debian bookworm
Datum: So, 24. November 2024, 21:23
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50280
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45888
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53063
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50257
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50247
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50265
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215
Applikationen: Linux

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5818-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 24, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2022-45888 CVE-2023-52812 CVE-2024-26952 CVE-2024-26954
CVE-2024-35964 CVE-2024-36244 CVE-2024-36478 CVE-2024-36914
CVE-2024-36915 CVE-2024-36923 CVE-2024-38540 CVE-2024-38553
CVE-2024-41080 CVE-2024-42322 CVE-2024-43868 CVE-2024-43904
CVE-2024-43911 CVE-2024-44949 CVE-2024-49950 CVE-2024-49960
CVE-2024-49974 CVE-2024-49986 CVE-2024-49991 CVE-2024-50012
CVE-2024-50036 CVE-2024-50067 CVE-2024-50072 CVE-2024-50126
CVE-2024-50215 CVE-2024-50218 CVE-2024-50228 CVE-2024-50229
CVE-2024-50230 CVE-2024-50232 CVE-2024-50233 CVE-2024-50234
CVE-2024-50235 CVE-2024-50236 CVE-2024-50237 CVE-2024-50242
CVE-2024-50243 CVE-2024-50244 CVE-2024-50245 CVE-2024-50247
CVE-2024-50249 CVE-2024-50250 CVE-2024-50251 CVE-2024-50252
CVE-2024-50255 CVE-2024-50256 CVE-2024-50257 CVE-2024-50259
CVE-2024-50261 CVE-2024-50262 CVE-2024-50264 CVE-2024-50265
CVE-2024-50267 CVE-2024-50268 CVE-2024-50269 CVE-2024-50271
CVE-2024-50272 CVE-2024-50273 CVE-2024-50276 CVE-2024-50278
CVE-2024-50279 CVE-2024-50280 CVE-2024-50282 CVE-2024-50283
CVE-2024-50284 CVE-2024-50286 CVE-2024-50287 CVE-2024-50290
CVE-2024-50292 CVE-2024-50295 CVE-2024-50296 CVE-2024-50299
CVE-2024-50301 CVE-2024-50302 CVE-2024-53042 CVE-2024-53043
CVE-2024-53052 CVE-2024-53054 CVE-2024-53055 CVE-2024-53057
CVE-2024-53058 CVE-2024-53059 CVE-2024-53060 CVE-2024-53061
CVE-2024-53063 CVE-2024-53066 CVE-2024-53070 CVE-2024-53072
CVE-2024-53081 CVE-2024-53082 CVE-2024-53088 CVE-2024-53093

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.119-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=lqjj
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung