[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5925-1] linux security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5925-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
May 24, 2025                          https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2024-26618 CVE-2024-26783 CVE-2024-26807 CVE-2024-28956
                 CVE-2024-35790 CVE-2024-36903 CVE-2024-36927 CVE-2024-43840
                 CVE-2024-46751 CVE-2024-53203 CVE-2024-53209 CVE-2024-57945
                 CVE-2025-21645 CVE-2025-21839 CVE-2025-21931 CVE-2025-22062
                 CVE-2025-37819 CVE-2025-37890 CVE-2025-37897 CVE-2025-37901
                 CVE-2025-37902 CVE-2025-37903 CVE-2025-37905 CVE-2025-37909
                 CVE-2025-37911 CVE-2025-37912 CVE-2025-37913 CVE-2025-37914
                 CVE-2025-37915 CVE-2025-37917 CVE-2025-37921 CVE-2025-37923
                 CVE-2025-37924 CVE-2025-37927 CVE-2025-37928 CVE-2025-37929
                 CVE-2025-37930 CVE-2025-37932 CVE-2025-37936 CVE-2025-37947
                 CVE-2025-37948 CVE-2025-37949 CVE-2025-37951 CVE-2025-37953
                 CVE-2025-37959 CVE-2025-37961 CVE-2025-37962 CVE-2025-37963
                 CVE-2025-37964 CVE-2025-37967 CVE-2025-37969 CVE-2025-37970
                 CVE-2025-37972 CVE-2025-37990 CVE-2025-37991

Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.

For CPUs affected to ITS (Indirect Target Selection), to fully mitigate
the vulnerability it is also necessary to update the intel-microcode
packages released in DSA 5924-1.

For details on the Indirect Target Selection (ITS) vulnerability please
refer to https://www.vusec.net/projects/training-solo/ and
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html .

For the stable distribution (bookworm), these problems have been fixed in
version 6.1.140-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmgxhhdfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QtFw//aw7/wSAIsC2eTDYXQojKgw+qNxXp3T9I9DW0KYPpRWfE8uyjZdLoNVSa
uxT+y8CPsmcUWHB1Ioa3WkzNwmWYXSJdpFZbb3j9BYzAkZr9dQGtCoEfRsTbCAzJ
fgPdQGMbCt+LOZeIimQG7IfopgBJV1djqfsRta+YWncYoKfr6XDCUlr5OiK/7PQ9
NMZU4WvyduO3LidHXXg3tr32LST1YXf55dzMtr6fduSdm0VohlkJXa5foGxszN8q
MG+6N0W62MDfus02fm9zNzmwspJLyKej9X+nKrFL7AVEeH+n6QOGgM0Zfl03B+0U
Uq7uGbACRB/wrElumYba3stWo2Ogqwx7uX9DCZGzJeQCzQ7fWOxGxK1bLBBbrHbc
MyMLwRxDZZ35B4f4Oj818sCVeLErd1t6vSVCpm1TvcUw5Em4XZ8M/dhbONPI1uLr
5g+GM38oCLhmv1J0KKJx+vsN8qLmWM1J5nBUkWdvFUDNxOSwUlmimjUq+9dhHe0I
vEZlQP5CPSx/EOB9C2LH2g7yJSDIQ8cczzPsk9i9TrMRsmoOvq/nuSAHDxu2N8ls
rJ06aI83Vv4MwTJ+jD/K8kzr5kXWnysqGWBODAtaG2ioDBP0ZaWzIgaAXAdFxVea
r3z4ViUO5RiBBu8KNEucngdaiwhQ3wHsxza1UTPlBZrChOm12Wg=
=8qtN
-----END PGP SIGNATURE-----


Reply to: