Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in linux
ID: DSA-5900-1
Distribution: Debian
Plattformen: Debian bookworm
Datum: So, 13. April 2025, 07:41
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21721
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21986
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21865
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21881
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21875
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21957
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21871
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21912
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21993
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58005
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21910
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21887
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21909
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21956
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21963
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22007
Applikationen: Linux

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5900-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 12, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux
CVE ID : CVE-2023-52857 CVE-2023-52927 CVE-2024-24855 CVE-2024-26656
CVE-2024-26767 CVE-2024-26982 CVE-2024-27056 CVE-2024-35866
CVE-2024-38611 CVE-2024-40973 CVE-2024-42129 CVE-2024-43831
CVE-2024-46772 CVE-2024-47753 CVE-2024-47754 CVE-2024-50056
CVE-2024-50246 CVE-2024-53166 CVE-2024-57977 CVE-2024-58002
CVE-2024-58005 CVE-2024-58079 CVE-2024-58090 CVE-2025-21702
CVE-2025-21712 CVE-2025-21721 CVE-2025-21756 CVE-2025-21838
CVE-2025-21844 CVE-2025-21846 CVE-2025-21848 CVE-2025-21855
CVE-2025-21858 CVE-2025-21859 CVE-2025-21862 CVE-2025-21864
CVE-2025-21865 CVE-2025-21866 CVE-2025-21867 CVE-2025-21871
CVE-2025-21875 CVE-2025-21877 CVE-2025-21878 CVE-2025-21881
CVE-2025-21887 CVE-2025-21891 CVE-2025-21898 CVE-2025-21899
CVE-2025-21904 CVE-2025-21905 CVE-2025-21909 CVE-2025-21910
CVE-2025-21912 CVE-2025-21913 CVE-2025-21914 CVE-2025-21916
CVE-2025-21917 CVE-2025-21918 CVE-2025-21919 CVE-2025-21920
CVE-2025-21922 CVE-2025-21924 CVE-2025-21925 CVE-2025-21926
CVE-2025-21928 CVE-2025-21934 CVE-2025-21935 CVE-2025-21936
CVE-2025-21937 CVE-2025-21938 CVE-2025-21941 CVE-2025-21943
CVE-2025-21944 CVE-2025-21945 CVE-2025-21947 CVE-2025-21948
CVE-2025-21950 CVE-2025-21951 CVE-2025-21956 CVE-2025-21957
CVE-2025-21959 CVE-2025-21960 CVE-2025-21962 CVE-2025-21963
CVE-2025-21964 CVE-2025-21968 CVE-2025-21970 CVE-2025-21971
CVE-2025-21975 CVE-2025-21978 CVE-2025-21979 CVE-2025-21980
CVE-2025-21981 CVE-2025-21986 CVE-2025-21991 CVE-2025-21992
CVE-2025-21993 CVE-2025-21994 CVE-2025-21996 CVE-2025-21997
CVE-2025-21999 CVE-2025-22004 CVE-2025-22005 CVE-2025-22007
CVE-2025-22008 CVE-2025-22010 CVE-2025-22014 CVE-2025-22015

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.133-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmf6dG9fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0R/0Q/+MklvYwGQgd0go9z2m6ZqB5wd/gmQp4gVz5CBdV9fj+vN97fjqOhhqrro
C+AUnW/BYRExGRA0lcp9arADpcCiR/+gcMoSoIfwI3p1jXZZT7hihL0G6askOhlR
KA8MBMOLPaTDmKh9UqTmdQxiRGYQTuWVxUQdkurgybuasvm4TXTdgAdkT4ECybkd
cfaYtoudWl3haq5gA8W6WHoKhba7I/JuFUiVaQZwISityLrDC4YPM2xb3tmYCvp1
/DaZFifJU1ECbjjy4Sg4Ky5/Z4n+E6ioWiw/IFifHeRR8A4cHeYoIZRP7sREoGcp
oI6qRCY4lZyBUCvlCTq8lrzwo1nSl9KAhze4511SmORZluQJibDBHf2CY/ZN+wRC
hjxlWb3bGqccu+TKo0+dGlv6J8b/kl3YxWmBy0MPVBYD0SPI8nbj1clPu9Wo/D+q
Hj6hlpIcJsXXND6G+Gi9iv8f+8sGlj0qTbDKx4DwiBHv+9I5zbJ7v3Z/VtkOfAGQ
xZJXhswx30SUdaS36crEtEChtsIiiBtLdwf9VaqTg2gwZRI8bYS+Ed7gCYLZ15D6
+zeEJyYvOpwSWYn1xDU7Qz0/L3WXLLLtLz0GIJ0iUccYTxlp9H4kQPpzsrNWxzoD
eADsrQnMfTVR0XWA3ulyGblTjhAsXDiqDag5eWwdzTdR/Ih3WmU=
=5rVd
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung