[DSA-5593-1] linux
Severity
High
Affected Packages
1
CVEs
8
security update
no info
Package | Affected Version |
---|---|
pkg:deb/debian/linux?distro=bookworm | < 6.1.69-1 |
- ID
- DSA-5593-1
- Severity
- high
- Severity from
- CVE-2023-6817
- URL
- https://www.debian.org/security/dsa-5593-1
- Published
-
2024-01-01T00:00:00
(8 months ago) - Modified
-
2024-01-01T00:00:00
(8 months ago) - Other Advisories
-
- ALAS-2024-1912
- ALAS2-2024-2443
- ALSA-2024:0897
- ALSA-2024:1607
- ALSA-2024:3138
- DSA-5594-1
- ELSA-2024-0897
- ELSA-2024-12159
- ELSA-2024-12169
- ELSA-2024-12193
- ELSA-2024-1248
- ELSA-2024-1607
- ELSA-2024-2394
- ELSA-2024-3138
- FEDORA-2023-26ffe7d3c7
- FEDORA-2023-dcee14345b
- MS:CVE-2023-51780
- RHSA-2024:0881
- RHSA-2024:0897
- RHSA-2024:1607
- RHSA-2024:1614
- RHSA-2024:2950
- RHSA-2024:3138
- RLSA-2024:1607
- RLSA-2024:3138
- SUSE-SU-2024:0110-1
- SUSE-SU-2024:0112-1
- SUSE-SU-2024:0113-1
- SUSE-SU-2024:0115-1
- SUSE-SU-2024:0117-1
- SUSE-SU-2024:0118-1
- SUSE-SU-2024:0120-1
- SUSE-SU-2024:0129-1
- SUSE-SU-2024:0141-1
- SUSE-SU-2024:0153-1
- SUSE-SU-2024:0154-1
- SUSE-SU-2024:0156-1
- SUSE-SU-2024:0160-1
- SUSE-SU-2024:0463-1
- SUSE-SU-2024:0468-1
- SUSE-SU-2024:0469-1
- SUSE-SU-2024:0474-1
- SUSE-SU-2024:0476-1
- SUSE-SU-2024:0478-1
- SUSE-SU-2024:0483-1
- SUSE-SU-2024:0484-1
- SUSE-SU-2024:0514-1
- SUSE-SU-2024:0515-1
- SUSE-SU-2024:0516-1
- SUSE-SU-2024:0620-1
- SUSE-SU-2024:0622-1
- SUSE-SU-2024:0624-1
- SUSE-SU-2024:0639-1
- SUSE-SU-2024:0655-1
- SUSE-SU-2024:0656-1
- SUSE-SU-2024:0662-1
- SUSE-SU-2024:0663-1
- SUSE-SU-2024:0666-1
- SUSE-SU-2024:0685-1
- SUSE-SU-2024:0694-1
- SUSE-SU-2024:0698-1
- SUSE-SU-2024:0705-1
- SUSE-SU-2024:0727-1
- SUSE-SU-2024:0855-1
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0858-1
- SUSE-SU-2024:0900-1
- SUSE-SU-2024:0900-2
- SUSE-SU-2024:0910-1
- SUSE-SU-2024:0977-1
- SUSE-SU-2024:0986-1
- SUSE-SU-2024:0989-1
- SUSE-SU-2024:0991-1
- SUSE-SU-2024:0995-1
- SUSE-SU-2024:1017-1
- SUSE-SU-2024:1023-1
- SUSE-SU-2024:1025-1
- SUSE-SU-2024:1028-1
- SUSE-SU-2024:1033-1
- SUSE-SU-2024:1039-1
- SUSE-SU-2024:1040-1
- SUSE-SU-2024:1045-1
- SUSE-SU-2024:1047-1
- SUSE-SU-2024:1053-1
- SUSE-SU-2024:1054-1
- SUSE-SU-2024:1063-1
- SUSE-SU-2024:1072-1
- SUSE-SU-2024:1097-1
- SUSE-SU-2024:1153-1
- SUSE-SU-2024:1276-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1465-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1669-1
- SUSE-SU-2024:1677-1
- SUSE-SU-2024:1680-1
- SUSE-SU-2024:1686-1
- SUSE-SU-2024:1695-1
- SUSE-SU-2024:1696-1
- SUSE-SU-2024:1706-1
- SUSE-SU-2024:1708-1
- SUSE-SU-2024:1709-1
- SUSE-SU-2024:1712-1
- SUSE-SU-2024:1719-1
- SUSE-SU-2024:1720-1
- SUSE-SU-2024:1726-1
- SUSE-SU-2024:1729-1
- SUSE-SU-2024:1732-1
- SUSE-SU-2024:1735-1
- SUSE-SU-2024:1736-1
- SUSE-SU-2024:1739-1
- SUSE-SU-2024:1742-1
- SUSE-SU-2024:1748-1
- SUSE-SU-2024:1751-1
- SUSE-SU-2024:1757-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2010-1
- SUSE-SU-2024:2019-1
- SUSE-SU-2024:2099-1
- SUSE-SU-2024:2115-1
- SUSE-SU-2024:2120-1
- SUSE-SU-2024:2135-1
- SUSE-SU-2024:2145-1
- SUSE-SU-2024:2148-1
- SUSE-SU-2024:2166-1
- SUSE-SU-2024:2183-1
- SUSE-SU-2024:2185-1
- SUSE-SU-2024:2189-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2202-1
- SUSE-SU-2024:2205-1
- SUSE-SU-2024:2343-1
- SUSE-SU-2024:2373-1
- SUSE-SU-2024:2740-1
- SUSE-SU-2024:2755-1
- SUSE-SU-2024:2802-1
- SUSE-SU-2024:2896-1
- SUSE-SU-2024:2973-1
- SUSE-SU-2024:3034-1
- SUSE-SU-2024:3043-1
- USN-6602-1
- USN-6603-1
- USN-6604-1
- USN-6604-2
- USN-6605-1
- USN-6605-2
- USN-6606-1
- USN-6607-1
- USN-6608-1
- USN-6608-2
- USN-6609-1
- USN-6609-2
- USN-6609-3
- USN-6624-1
- USN-6626-1
- USN-6626-2
- USN-6626-3
- USN-6628-1
- USN-6628-2
- USN-6635-1
- USN-6639-1
- USN-6646-1
- USN-6647-1
- USN-6647-2
- USN-6648-1
- USN-6648-2
- USN-6651-1
- USN-6651-2
- USN-6651-3
- USN-6652-1
- USN-6653-1
- USN-6653-2
- USN-6653-3
- USN-6653-4
- USN-6680-1
- USN-6680-2
- USN-6680-3
- USN-6681-1
- USN-6681-2
- USN-6681-3
- USN-6681-4
- USN-6686-1
- USN-6686-2
- USN-6686-3
- USN-6686-4
- USN-6686-5
- USN-6700-1
- USN-6700-2
- USN-6701-1
- USN-6701-2
- USN-6701-3
- USN-6701-4
- USN-6705-1
- USN-6716-1
- USN-6739-1
- USN-6740-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2023-6531 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531 | |
CVE | CVE-2023-6622 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622 | |
CVE | CVE-2023-6817 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817 | |
CVE | CVE-2023-6931 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931 | |
CVE | CVE-2023-51779 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779 | |
CVE | CVE-2023-51780 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780 | |
CVE | CVE-2023-51781 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781 | |
CVE | CVE-2023-51782 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51782 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/debian/linux?distro=bookworm | debian | linux | < 6.1.69-1 | bookworm |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |