-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5925-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso May 24, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2024-26618 CVE-2024-26783 CVE-2024-26807 CVE-2024-28956 CVE-2024-35790 CVE-2024-36903 CVE-2024-36927 CVE-2024-43840 CVE-2024-46751 CVE-2024-53203 CVE-2024-53209 CVE-2024-57945 CVE-2025-21645 CVE-2025-21839 CVE-2025-21931 CVE-2025-22062 CVE-2025-37819 CVE-2025-37890 CVE-2025-37897 CVE-2025-37901 CVE-2025-37902 CVE-2025-37903 CVE-2025-37905 CVE-2025-37909 CVE-2025-37911 CVE-2025-37912 CVE-2025-37913 CVE-2025-37914 CVE-2025-37915 CVE-2025-37917 CVE-2025-37921 CVE-2025-37923 CVE-2025-37924 CVE-2025-37927 CVE-2025-37928 CVE-2025-37929 CVE-2025-37930 CVE-2025-37932 CVE-2025-37936 CVE-2025-37947 CVE-2025-37948 CVE-2025-37949 CVE-2025-37951 CVE-2025-37953 CVE-2025-37959 CVE-2025-37961 CVE-2025-37962 CVE-2025-37963 CVE-2025-37964 CVE-2025-37967 CVE-2025-37969 CVE-2025-37970 CVE-2025-37972 CVE-2025-37990 CVE-2025-37991 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. For CPUs affected to ITS (Indirect Target Selection), to fully mitigate the vulnerability it is also necessary to update the intel-microcode packages released in DSA 5924-1. For details on the Indirect Target Selection (ITS) vulnerability please refer to https://www.vusec.net/projects/training-solo/ and https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html . For the stable distribution (bookworm), these problems have been fixed in version 6.1.140-1. We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmgxhhdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0QtFw//aw7/wSAIsC2eTDYXQojKgw+qNxXp3T9I9DW0KYPpRWfE8uyjZdLoNVSa uxT+y8CPsmcUWHB1Ioa3WkzNwmWYXSJdpFZbb3j9BYzAkZr9dQGtCoEfRsTbCAzJ fgPdQGMbCt+LOZeIimQG7IfopgBJV1djqfsRta+YWncYoKfr6XDCUlr5OiK/7PQ9 NMZU4WvyduO3LidHXXg3tr32LST1YXf55dzMtr6fduSdm0VohlkJXa5foGxszN8q MG+6N0W62MDfus02fm9zNzmwspJLyKej9X+nKrFL7AVEeH+n6QOGgM0Zfl03B+0U Uq7uGbACRB/wrElumYba3stWo2Ogqwx7uX9DCZGzJeQCzQ7fWOxGxK1bLBBbrHbc MyMLwRxDZZ35B4f4Oj818sCVeLErd1t6vSVCpm1TvcUw5Em4XZ8M/dhbONPI1uLr 5g+GM38oCLhmv1J0KKJx+vsN8qLmWM1J5nBUkWdvFUDNxOSwUlmimjUq+9dhHe0I vEZlQP5CPSx/EOB9C2LH2g7yJSDIQ8cczzPsk9i9TrMRsmoOvq/nuSAHDxu2N8ls rJ06aI83Vv4MwTJ+jD/K8kzr5kXWnysqGWBODAtaG2ioDBP0ZaWzIgaAXAdFxVea r3z4ViUO5RiBBu8KNEucngdaiwhQ3wHsxza1UTPlBZrChOm12Wg= =8qtN -----END PGP SIGNATURE-----