-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5900-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso April 12, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2023-52857 CVE-2023-52927 CVE-2024-24855 CVE-2024-26656 CVE-2024-26767 CVE-2024-26982 CVE-2024-27056 CVE-2024-35866 CVE-2024-38611 CVE-2024-40973 CVE-2024-42129 CVE-2024-43831 CVE-2024-46772 CVE-2024-47753 CVE-2024-47754 CVE-2024-50056 CVE-2024-50246 CVE-2024-53166 CVE-2024-57977 CVE-2024-58002 CVE-2024-58005 CVE-2024-58079 CVE-2024-58090 CVE-2025-21702 CVE-2025-21712 CVE-2025-21721 CVE-2025-21756 CVE-2025-21838 CVE-2025-21844 CVE-2025-21846 CVE-2025-21848 CVE-2025-21855 CVE-2025-21858 CVE-2025-21859 CVE-2025-21862 CVE-2025-21864 CVE-2025-21865 CVE-2025-21866 CVE-2025-21867 CVE-2025-21871 CVE-2025-21875 CVE-2025-21877 CVE-2025-21878 CVE-2025-21881 CVE-2025-21887 CVE-2025-21891 CVE-2025-21898 CVE-2025-21899 CVE-2025-21904 CVE-2025-21905 CVE-2025-21909 CVE-2025-21910 CVE-2025-21912 CVE-2025-21913 CVE-2025-21914 CVE-2025-21916 CVE-2025-21917 CVE-2025-21918 CVE-2025-21919 CVE-2025-21920 CVE-2025-21922 CVE-2025-21924 CVE-2025-21925 CVE-2025-21926 CVE-2025-21928 CVE-2025-21934 CVE-2025-21935 CVE-2025-21936 CVE-2025-21937 CVE-2025-21938 CVE-2025-21941 CVE-2025-21943 CVE-2025-21944 CVE-2025-21945 CVE-2025-21947 CVE-2025-21948 CVE-2025-21950 CVE-2025-21951 CVE-2025-21956 CVE-2025-21957 CVE-2025-21959 CVE-2025-21960 CVE-2025-21962 CVE-2025-21963 CVE-2025-21964 CVE-2025-21968 CVE-2025-21970 CVE-2025-21971 CVE-2025-21975 CVE-2025-21978 CVE-2025-21979 CVE-2025-21980 CVE-2025-21981 CVE-2025-21986 CVE-2025-21991 CVE-2025-21992 CVE-2025-21993 CVE-2025-21994 CVE-2025-21996 CVE-2025-21997 CVE-2025-21999 CVE-2025-22004 CVE-2025-22005 CVE-2025-22007 CVE-2025-22008 CVE-2025-22010 CVE-2025-22014 CVE-2025-22015 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. For the stable distribution (bookworm), these problems have been fixed in version 6.1.133-1. We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmf6dG9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0R/0Q/+MklvYwGQgd0go9z2m6ZqB5wd/gmQp4gVz5CBdV9fj+vN97fjqOhhqrro C+AUnW/BYRExGRA0lcp9arADpcCiR/+gcMoSoIfwI3p1jXZZT7hihL0G6askOhlR KA8MBMOLPaTDmKh9UqTmdQxiRGYQTuWVxUQdkurgybuasvm4TXTdgAdkT4ECybkd cfaYtoudWl3haq5gA8W6WHoKhba7I/JuFUiVaQZwISityLrDC4YPM2xb3tmYCvp1 /DaZFifJU1ECbjjy4Sg4Ky5/Z4n+E6ioWiw/IFifHeRR8A4cHeYoIZRP7sREoGcp oI6qRCY4lZyBUCvlCTq8lrzwo1nSl9KAhze4511SmORZluQJibDBHf2CY/ZN+wRC hjxlWb3bGqccu+TKo0+dGlv6J8b/kl3YxWmBy0MPVBYD0SPI8nbj1clPu9Wo/D+q Hj6hlpIcJsXXND6G+Gi9iv8f+8sGlj0qTbDKx4DwiBHv+9I5zbJ7v3Z/VtkOfAGQ xZJXhswx30SUdaS36crEtEChtsIiiBtLdwf9VaqTg2gwZRI8bYS+Ed7gCYLZ15D6 +zeEJyYvOpwSWYn1xDU7Qz0/L3WXLLLtLz0GIJ0iUccYTxlp9H4kQPpzsrNWxzoD eADsrQnMfTVR0XWA3ulyGblTjhAsXDiqDag5eWwdzTdR/Ih3WmU= =5rVd -----END PGP SIGNATURE-----