Debian dla-4076:linux-config-6.1 - 安全更新

high Nessus 插件 ID 216985

简介

远程 Debian 主机上缺少一个或多个与安全相关的更新。

描述

远程 Debian 11 主机上安装的多个程序包受到 dla-4076 公告中提及的多个漏洞影响。

------------------------------------------------------------------------- Debian LTS 公告 DLA-4076-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2025 年 3 月 1 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

程序包:linux-6.1 版本:6.1.6.1.128-1~deb11u1 CVE ID:CVE-2022-49034 CVE-2023-52916 CVE-2023-52926 CVE-2024-26595 CVE-2024-27407 CVE-2024-35870 CVE-2024-35956 CVE-2024-36476 CVE-2024-36479 CVE-2024-36899 CVE-2024-37021 CVE-2024-39282 CVE-2024-41014 CVE-2024-42252 CVE-2024-42315 CVE-2024-42319 CVE-2024-43098 CVE-2024-44950 CVE-2024-45828 CVE-2024-46809 CVE-2024-46841 CVE-2024-46896 CVE-2024-47143 CVE-2024-47408 CVE-2024-47745 CVE-2024-48881 CVE-2024-49571 CVE-2024-49861 CVE-2024-49891 CVE-2024-49897 CVE-2024-49898 CVE-2024-49899 CVE-2024-49909 CVE-2024-49911 CVE-2024-49915 CVE-2024-49917 CVE-2024-49925 CVE-2024-49929 CVE-2024-49934 CVE-2024-49939 CVE-2024-49951 CVE-2024-49994 CVE-2024-49996 CVE-2024-50014 CVE-2024-50047 CVE-2024-50051 CVE-2024-50055 CVE-2024-50121 CVE-2024-50146 CVE-2024-50164 CVE-2024-50248 CVE-2024-50258 CVE-2024-50275 CVE-2024-50304 CVE-2024-52332 CVE-2024-53099 CVE-2024-53105 CVE-2024-53124 CVE-2024-53125 CVE-2024-53128 CVE-2024-53141 CVE-2024-53142 CVE-2024-53145 CVE-2024-53146 CVE-2024-53148 CVE-2024-53150 CVE-2024-53151 CVE-2024-53154 CVE-2024-53155 CVE-2024-53156 CVE-2024-53157 CVE-2024-53158 CVE-2024-53161 CVE-2024-53164 CVE-2024-53165 CVE-2024-53170 CVE-2024-53171 CVE-2024-53172 CVE-2024-53173 CVE-2024-53174 CVE-2024-53175 CVE-2024-53180 CVE-2024-53181 CVE-2024-53183 CVE-2024-53184 CVE-2024-53190 CVE-2024-53194 CVE-2024-53196 CVE-2024-53197 CVE-2024-53198 CVE-2024-53206 CVE-2024-53207 CVE-2024-53208 CVE-2024-53210 CVE-2024-53213 CVE-2024-53214 CVE-2024-53215 CVE-2024-53217 CVE-2024-53220 CVE-2024-53226 CVE-2024-53227 CVE-2024-53229 CVE-2024-53230 CVE-2024-53231 CVE-2024-53233 CVE-2024-53234 CVE-2024-53237 CVE-2024-53239 CVE-2024-53240 CVE-2024-53241 CVE-2024-53680 CVE-2024-53685 CVE-2024-53690 CVE-2024-54031 CVE-2024-55881 CVE-2024-55916 CVE-2024-56369 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56539 CVE-2024-56546 CVE-2024-56548 CVE-2024-56551 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562 CVE-2024-56567 CVE-2024-56568 CVE-2024-56569 CVE-2024-56570 CVE-2024-56572 CVE-2024-56574 CVE-2024-56575 CVE-2024-56576 CVE-2024-56578 CVE-2024-56579 CVE-2024-56581 CVE-2024-56582 CVE-2024-56584 CVE-2024-56585 CVE-2024-56586 CVE-2024-56587 CVE-2024-56589 CVE-2024-56590 CVE-2024-56593 CVE-2024-56594 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56598 CVE-2024-56599 CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56603 CVE-2024-56604 CVE-2024-56605 CVE-2024-56606 CVE-2024-56608 CVE-2024-56610 CVE-2024-56614 CVE-2024-56615 CVE-2024-56616 CVE-2024-56619 CVE-2024-56622 CVE-2024-56623 CVE-2024-56625 CVE-2024-56626 CVE-2024-56627 CVE-2024-56628 CVE-2024-56629 CVE-2024-56630 CVE-2024-56631 CVE-2024-56633 CVE-2024-56634 CVE-2024-56636 CVE-2024-56637 CVE-2024-56640 CVE-2024-56642 CVE-2024-56643 CVE-2024-56644 CVE-2024-56645 CVE-2024-56648 CVE-2024-56650 CVE-2024-56651 CVE-2024-56658 CVE-2024-56659 CVE-2024-56660 CVE-2024-56661 CVE-2024-56662 CVE-2024-56663 CVE-2024-56664 CVE-2024-56665 CVE-2024-56670 CVE-2024-56672 CVE-2024-56675 CVE-2024-56677 CVE-2024-56678 CVE-2024-56679 CVE-2024-56681 CVE-2024-56683 CVE-2024-56687 CVE-2024-56688 CVE-2024-56690 CVE-2024-56691 CVE-2024-56693 CVE-2024-56694 CVE-2024-56698 CVE-2024-56700 CVE-2024-56701 CVE-2024-56703 CVE-2024-56704 CVE-2024-56705 CVE-2024-56707 CVE-2024-56708 CVE-2024-56709 CVE-2024-56715 CVE-2024-56716 CVE-2024-56717 CVE-2024-56718 CVE-2024-56720 CVE-2024-56722 CVE-2024-56723 CVE-2024-56724 CVE-2024-56725 CVE-2024-56726 CVE-2024-56727 CVE-2024-56728 CVE-2024-56739 CVE-2024-56741 CVE-2024-56745 CVE-2024-56746 CVE-2024-56747 CVE-2024-56748 CVE-2024-56751 CVE-2024-56754 CVE-2024-56755 CVE-2024-56756 CVE-2024-56759 CVE-2024-56763 CVE-2024-56765 CVE-2024-56766 CVE-2024-56767 CVE-2024-56769 CVE-2024-56770 CVE-2024-56774 CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-56779 CVE-2024-56780 CVE-2024-56781 CVE-2024-56783 CVE-2024-56785 CVE-2024-56787 CVE-2024-57791 CVE-2024-57792 CVE-2024-57798 CVE-2024-57802 CVE-2024-57807 CVE-2024-57838 CVE-2024-57841 CVE-2024-57849 CVE-2024-57850 CVE-2024-57874 CVE-2024-57876 CVE-2024-57882 CVE-2024-57884 CVE-2024-57887 CVE-2024-57889 CVE-2024-57890 CVE-2024-57892 CVE-2024-57893 CVE-2024-57894 CVE-2024-57896 CVE-2024-57897 CVE-2024-57900 CVE-2024-57901 CVE-2024-57902 CVE-2024-57903 CVE-2024-57904 CVE-2024-57906 CVE-2024-57907 CVE-2024-57908 CVE-2024-57910 CVE-2024-57911 CVE-2024-57912 CVE-2024-57913 CVE-2024-57916 CVE-2024-57917 CVE-2024-57922 CVE-2024-57925 CVE-2024-57929 CVE-2024-57930 CVE-2024-57931 CVE-2024-57938 CVE-2024-57939 CVE-2024-57940 CVE-2024-57946 CVE-2024-57948 CVE-2024-57949 CVE-2024-57951 CVE-2025-21629 CVE-2025-21631 CVE-2025-21636 CVE-2025-21637 CVE-2025-21638 CVE-2025-21639 CVE-2025-21640 CVE-2025-21646 CVE-2025-21647 CVE-2025-21648 CVE-2025-21653 CVE-2025-21655 CVE-2025-21660 CVE-2025-21662 CVE-2025-21664 CVE-2025-21665 CVE-2025-21666 CVE-2025-21667 CVE-2025-21668 CVE-2025-21669 CVE-2025-21671 CVE-2025-21675 CVE-2025-21678 CVE-2025-21680 CVE-2025-21681 CVE-2025-21683 CVE-2025-21687 CVE-2025-21688 CVE-2025-21689 CVE-2025-21690 CVE-2025-21692 CVE-2025-21694 CVE-2025-21697 CVE-2025-21699

在 Linux 内核中发现多个可能导致权限升级、拒绝服务或信息泄漏的漏洞。

对于 Debian 11 bullseye,这些问题已在 6.1.6.1.128-1~deb11u1 版本中修复。其中还额外包含了来自于稳定更新 6.1.120-6.1.128(含)的大量错误修复。

建议您升级 linux-6.1 程序包。

如需了解 linux-6.1 的详细安全状态,请参阅其安全跟踪页面:
https://security-tracker.debian.org/tracker/linux-6.1

有关 Debian LTS 安全公告、如何将这些更新应用到系统以及常见问题解答的更多信息,请访问以下网址:https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP signature

Tenable 已直接从 Debian 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

升级 linux-config-6.1 程序包。

另见

https://security-tracker.debian.org/tracker/source-package/linux-6.1

https://security-tracker.debian.org/tracker/CVE-2022-49034

https://security-tracker.debian.org/tracker/CVE-2023-52916

https://security-tracker.debian.org/tracker/CVE-2023-52926

https://security-tracker.debian.org/tracker/CVE-2024-26595

https://security-tracker.debian.org/tracker/CVE-2024-27407

https://security-tracker.debian.org/tracker/CVE-2024-35870

https://security-tracker.debian.org/tracker/CVE-2024-35956

https://security-tracker.debian.org/tracker/CVE-2024-36476

https://security-tracker.debian.org/tracker/CVE-2024-36479

https://security-tracker.debian.org/tracker/CVE-2024-36899

https://security-tracker.debian.org/tracker/CVE-2024-37021

https://security-tracker.debian.org/tracker/CVE-2024-39282

https://security-tracker.debian.org/tracker/CVE-2024-41014

https://security-tracker.debian.org/tracker/CVE-2024-42252

https://security-tracker.debian.org/tracker/CVE-2024-42315

https://security-tracker.debian.org/tracker/CVE-2024-42319

https://security-tracker.debian.org/tracker/CVE-2024-43098

https://security-tracker.debian.org/tracker/CVE-2024-44950

https://security-tracker.debian.org/tracker/CVE-2024-45828

https://security-tracker.debian.org/tracker/CVE-2024-46809

https://security-tracker.debian.org/tracker/CVE-2024-46841

https://security-tracker.debian.org/tracker/CVE-2024-46896

https://security-tracker.debian.org/tracker/CVE-2024-47143

https://security-tracker.debian.org/tracker/CVE-2024-47408

https://security-tracker.debian.org/tracker/CVE-2024-47745

https://security-tracker.debian.org/tracker/CVE-2024-48881

https://security-tracker.debian.org/tracker/CVE-2024-49571

https://security-tracker.debian.org/tracker/CVE-2024-49861

https://security-tracker.debian.org/tracker/CVE-2024-49891

https://security-tracker.debian.org/tracker/CVE-2024-49897

https://security-tracker.debian.org/tracker/CVE-2024-49898

https://security-tracker.debian.org/tracker/CVE-2024-49899

https://security-tracker.debian.org/tracker/CVE-2024-49909

https://security-tracker.debian.org/tracker/CVE-2024-49911

https://security-tracker.debian.org/tracker/CVE-2024-49915

https://security-tracker.debian.org/tracker/CVE-2024-49917

https://security-tracker.debian.org/tracker/CVE-2024-49925

https://security-tracker.debian.org/tracker/CVE-2024-49929

https://security-tracker.debian.org/tracker/CVE-2024-49934

https://security-tracker.debian.org/tracker/CVE-2024-49939

https://security-tracker.debian.org/tracker/CVE-2024-49951

https://security-tracker.debian.org/tracker/CVE-2024-49994

https://security-tracker.debian.org/tracker/CVE-2024-49996

https://security-tracker.debian.org/tracker/CVE-2024-50014

https://security-tracker.debian.org/tracker/CVE-2024-50047

https://security-tracker.debian.org/tracker/CVE-2024-50051

https://security-tracker.debian.org/tracker/CVE-2024-50055

https://security-tracker.debian.org/tracker/CVE-2024-50121

https://security-tracker.debian.org/tracker/CVE-2024-50146

https://security-tracker.debian.org/tracker/CVE-2024-50164

https://security-tracker.debian.org/tracker/CVE-2024-50248

https://security-tracker.debian.org/tracker/CVE-2024-50258

https://security-tracker.debian.org/tracker/CVE-2024-50275

https://security-tracker.debian.org/tracker/CVE-2024-50304

https://security-tracker.debian.org/tracker/CVE-2024-52332

https://security-tracker.debian.org/tracker/CVE-2024-53099

https://security-tracker.debian.org/tracker/CVE-2024-53105

https://security-tracker.debian.org/tracker/CVE-2024-53124

https://security-tracker.debian.org/tracker/CVE-2024-53125

https://security-tracker.debian.org/tracker/CVE-2024-53128

https://security-tracker.debian.org/tracker/CVE-2024-53141

https://security-tracker.debian.org/tracker/CVE-2024-53142

https://security-tracker.debian.org/tracker/CVE-2024-53145

https://security-tracker.debian.org/tracker/CVE-2024-53146

https://security-tracker.debian.org/tracker/CVE-2024-53148

https://security-tracker.debian.org/tracker/CVE-2024-53150

https://security-tracker.debian.org/tracker/CVE-2024-53151

https://security-tracker.debian.org/tracker/CVE-2024-53154

https://security-tracker.debian.org/tracker/CVE-2024-53155

https://security-tracker.debian.org/tracker/CVE-2024-53156

https://security-tracker.debian.org/tracker/CVE-2024-53157

https://security-tracker.debian.org/tracker/CVE-2024-53158

https://security-tracker.debian.org/tracker/CVE-2024-53161

https://security-tracker.debian.org/tracker/CVE-2024-53164

https://security-tracker.debian.org/tracker/CVE-2024-53165

https://security-tracker.debian.org/tracker/CVE-2024-53170

https://security-tracker.debian.org/tracker/CVE-2024-53171

https://security-tracker.debian.org/tracker/CVE-2024-53172

https://security-tracker.debian.org/tracker/CVE-2024-53173

https://security-tracker.debian.org/tracker/CVE-2024-53174

https://security-tracker.debian.org/tracker/CVE-2024-53175

https://security-tracker.debian.org/tracker/CVE-2024-53180

https://security-tracker.debian.org/tracker/CVE-2024-53181

https://security-tracker.debian.org/tracker/CVE-2024-53183

https://security-tracker.debian.org/tracker/CVE-2024-53184

https://security-tracker.debian.org/tracker/CVE-2024-53190

https://security-tracker.debian.org/tracker/CVE-2024-53194

https://security-tracker.debian.org/tracker/CVE-2024-53196

https://security-tracker.debian.org/tracker/CVE-2024-53197

https://security-tracker.debian.org/tracker/CVE-2024-53198

https://security-tracker.debian.org/tracker/CVE-2024-53206

https://security-tracker.debian.org/tracker/CVE-2024-53207

https://security-tracker.debian.org/tracker/CVE-2024-53208

https://security-tracker.debian.org/tracker/CVE-2024-53210

https://security-tracker.debian.org/tracker/CVE-2024-53213

https://security-tracker.debian.org/tracker/CVE-2024-53214

https://security-tracker.debian.org/tracker/CVE-2024-53215

https://security-tracker.debian.org/tracker/CVE-2024-53217

https://security-tracker.debian.org/tracker/CVE-2024-53220

https://security-tracker.debian.org/tracker/CVE-2024-53226

https://security-tracker.debian.org/tracker/CVE-2024-53227

https://security-tracker.debian.org/tracker/CVE-2024-53229

https://security-tracker.debian.org/tracker/CVE-2024-53230

https://security-tracker.debian.org/tracker/CVE-2024-53231

https://security-tracker.debian.org/tracker/CVE-2024-53233

https://security-tracker.debian.org/tracker/CVE-2024-53234

https://security-tracker.debian.org/tracker/CVE-2024-53237

https://security-tracker.debian.org/tracker/CVE-2024-53239

https://security-tracker.debian.org/tracker/CVE-2024-53240

https://security-tracker.debian.org/tracker/CVE-2024-53241

https://security-tracker.debian.org/tracker/CVE-2024-53680

https://security-tracker.debian.org/tracker/CVE-2024-53685

https://security-tracker.debian.org/tracker/CVE-2024-53690

https://security-tracker.debian.org/tracker/CVE-2024-54031

https://security-tracker.debian.org/tracker/CVE-2024-55881

https://security-tracker.debian.org/tracker/CVE-2024-55916

https://security-tracker.debian.org/tracker/CVE-2024-56369

https://security-tracker.debian.org/tracker/CVE-2024-56531

https://security-tracker.debian.org/tracker/CVE-2024-56532

https://security-tracker.debian.org/tracker/CVE-2024-56533

https://security-tracker.debian.org/tracker/CVE-2024-56539

https://security-tracker.debian.org/tracker/CVE-2024-56546

https://security-tracker.debian.org/tracker/CVE-2024-56548

https://security-tracker.debian.org/tracker/CVE-2024-56551

https://security-tracker.debian.org/tracker/CVE-2024-56557

https://security-tracker.debian.org/tracker/CVE-2024-56558

https://security-tracker.debian.org/tracker/CVE-2024-56562

https://security-tracker.debian.org/tracker/CVE-2024-56567

https://security-tracker.debian.org/tracker/CVE-2024-56568

https://security-tracker.debian.org/tracker/CVE-2024-56569

https://security-tracker.debian.org/tracker/CVE-2024-56570

https://security-tracker.debian.org/tracker/CVE-2024-56572

https://security-tracker.debian.org/tracker/CVE-2024-56574

https://security-tracker.debian.org/tracker/CVE-2024-56575

https://security-tracker.debian.org/tracker/CVE-2024-56576

https://security-tracker.debian.org/tracker/CVE-2024-56578

https://security-tracker.debian.org/tracker/CVE-2024-56579

https://security-tracker.debian.org/tracker/CVE-2024-56581

https://security-tracker.debian.org/tracker/CVE-2024-56582

https://security-tracker.debian.org/tracker/CVE-2024-56584

https://security-tracker.debian.org/tracker/CVE-2024-56585

https://security-tracker.debian.org/tracker/CVE-2024-56586

https://security-tracker.debian.org/tracker/CVE-2024-56587

https://security-tracker.debian.org/tracker/CVE-2024-56589

https://security-tracker.debian.org/tracker/CVE-2024-56590

https://security-tracker.debian.org/tracker/CVE-2024-56593

https://security-tracker.debian.org/tracker/CVE-2024-56594

https://security-tracker.debian.org/tracker/CVE-2024-56595

https://security-tracker.debian.org/tracker/CVE-2024-56596

https://security-tracker.debian.org/tracker/CVE-2024-56597

https://security-tracker.debian.org/tracker/CVE-2024-56598

https://security-tracker.debian.org/tracker/CVE-2024-56599

https://security-tracker.debian.org/tracker/CVE-2024-56600

https://security-tracker.debian.org/tracker/CVE-2024-56601

https://security-tracker.debian.org/tracker/CVE-2024-56602

https://security-tracker.debian.org/tracker/CVE-2024-56603

https://security-tracker.debian.org/tracker/CVE-2024-56604

https://security-tracker.debian.org/tracker/CVE-2024-56605

https://security-tracker.debian.org/tracker/CVE-2024-56606

https://security-tracker.debian.org/tracker/CVE-2024-56608

https://security-tracker.debian.org/tracker/CVE-2024-56610

https://security-tracker.debian.org/tracker/CVE-2024-56614

https://security-tracker.debian.org/tracker/CVE-2024-56615

https://security-tracker.debian.org/tracker/CVE-2024-56616

https://security-tracker.debian.org/tracker/CVE-2024-56619

https://security-tracker.debian.org/tracker/CVE-2024-56622

https://security-tracker.debian.org/tracker/CVE-2024-56623

https://security-tracker.debian.org/tracker/CVE-2024-56625

https://security-tracker.debian.org/tracker/CVE-2024-56626

https://security-tracker.debian.org/tracker/CVE-2024-56627

https://security-tracker.debian.org/tracker/CVE-2024-56628

https://security-tracker.debian.org/tracker/CVE-2024-56629

https://security-tracker.debian.org/tracker/CVE-2024-56630

https://security-tracker.debian.org/tracker/CVE-2024-56631

https://security-tracker.debian.org/tracker/CVE-2024-56633

https://security-tracker.debian.org/tracker/CVE-2024-56634

https://security-tracker.debian.org/tracker/CVE-2024-56636

https://security-tracker.debian.org/tracker/CVE-2024-56637

https://security-tracker.debian.org/tracker/CVE-2024-56640

https://security-tracker.debian.org/tracker/CVE-2024-56642

https://security-tracker.debian.org/tracker/CVE-2024-56643

https://security-tracker.debian.org/tracker/CVE-2024-56644

https://security-tracker.debian.org/tracker/CVE-2024-56645

https://security-tracker.debian.org/tracker/CVE-2024-56648

https://security-tracker.debian.org/tracker/CVE-2024-56650

https://security-tracker.debian.org/tracker/CVE-2024-56651

https://security-tracker.debian.org/tracker/CVE-2024-56658

https://security-tracker.debian.org/tracker/CVE-2024-56659

https://security-tracker.debian.org/tracker/CVE-2024-56660

https://security-tracker.debian.org/tracker/CVE-2024-56661

https://security-tracker.debian.org/tracker/CVE-2024-56662

https://security-tracker.debian.org/tracker/CVE-2024-56663

https://security-tracker.debian.org/tracker/CVE-2024-56664

https://security-tracker.debian.org/tracker/CVE-2024-56665

https://security-tracker.debian.org/tracker/CVE-2024-56670

https://security-tracker.debian.org/tracker/CVE-2024-56672

https://security-tracker.debian.org/tracker/CVE-2024-56675

https://security-tracker.debian.org/tracker/CVE-2024-56677

https://security-tracker.debian.org/tracker/CVE-2024-56678

https://security-tracker.debian.org/tracker/CVE-2024-56679

https://security-tracker.debian.org/tracker/CVE-2024-56681

https://security-tracker.debian.org/tracker/CVE-2024-56683

https://security-tracker.debian.org/tracker/CVE-2024-56687

https://security-tracker.debian.org/tracker/CVE-2024-56688

https://security-tracker.debian.org/tracker/CVE-2024-56690

https://security-tracker.debian.org/tracker/CVE-2024-56691

https://security-tracker.debian.org/tracker/CVE-2024-56693

https://security-tracker.debian.org/tracker/CVE-2024-56694

https://security-tracker.debian.org/tracker/CVE-2024-56698

https://security-tracker.debian.org/tracker/CVE-2024-56700

https://security-tracker.debian.org/tracker/CVE-2024-56701

https://security-tracker.debian.org/tracker/CVE-2024-56703

https://security-tracker.debian.org/tracker/CVE-2024-56704

https://security-tracker.debian.org/tracker/CVE-2024-56705

https://security-tracker.debian.org/tracker/CVE-2024-56707

https://security-tracker.debian.org/tracker/CVE-2024-56708

https://security-tracker.debian.org/tracker/CVE-2024-56709

https://security-tracker.debian.org/tracker/CVE-2024-56715

https://security-tracker.debian.org/tracker/CVE-2024-56716

https://security-tracker.debian.org/tracker/CVE-2024-56717

https://security-tracker.debian.org/tracker/CVE-2024-56718

https://security-tracker.debian.org/tracker/CVE-2024-56720

https://security-tracker.debian.org/tracker/CVE-2024-56722

https://security-tracker.debian.org/tracker/CVE-2024-56723

https://security-tracker.debian.org/tracker/CVE-2024-56724

https://security-tracker.debian.org/tracker/CVE-2024-56725

https://security-tracker.debian.org/tracker/CVE-2024-56726

https://security-tracker.debian.org/tracker/CVE-2024-56727

https://security-tracker.debian.org/tracker/CVE-2024-56728

https://security-tracker.debian.org/tracker/CVE-2024-56739

https://security-tracker.debian.org/tracker/CVE-2024-56741

https://security-tracker.debian.org/tracker/CVE-2024-56745

https://security-tracker.debian.org/tracker/CVE-2024-56746

https://security-tracker.debian.org/tracker/CVE-2024-56747

https://security-tracker.debian.org/tracker/CVE-2024-56748

https://security-tracker.debian.org/tracker/CVE-2024-56751

https://security-tracker.debian.org/tracker/CVE-2024-56754

https://security-tracker.debian.org/tracker/CVE-2024-56755

https://security-tracker.debian.org/tracker/CVE-2024-56756

https://security-tracker.debian.org/tracker/CVE-2024-56759

https://security-tracker.debian.org/tracker/CVE-2024-56763

https://security-tracker.debian.org/tracker/CVE-2024-56765

https://security-tracker.debian.org/tracker/CVE-2024-56766

https://security-tracker.debian.org/tracker/CVE-2024-56767

https://security-tracker.debian.org/tracker/CVE-2024-56769

https://security-tracker.debian.org/tracker/CVE-2024-56770

https://security-tracker.debian.org/tracker/CVE-2024-56774

https://security-tracker.debian.org/tracker/CVE-2024-56776

https://security-tracker.debian.org/tracker/CVE-2024-56777

https://security-tracker.debian.org/tracker/CVE-2024-56778

https://security-tracker.debian.org/tracker/CVE-2024-56779

https://security-tracker.debian.org/tracker/CVE-2024-56780

https://security-tracker.debian.org/tracker/CVE-2024-56781

https://security-tracker.debian.org/tracker/CVE-2024-56783

https://security-tracker.debian.org/tracker/CVE-2024-56785

https://security-tracker.debian.org/tracker/CVE-2024-56787

https://security-tracker.debian.org/tracker/CVE-2024-57791

https://security-tracker.debian.org/tracker/CVE-2024-57792

https://security-tracker.debian.org/tracker/CVE-2024-57798

https://security-tracker.debian.org/tracker/CVE-2024-57802

https://security-tracker.debian.org/tracker/CVE-2024-57807

https://security-tracker.debian.org/tracker/CVE-2024-57838

https://security-tracker.debian.org/tracker/CVE-2024-57841

https://security-tracker.debian.org/tracker/CVE-2024-57849

https://security-tracker.debian.org/tracker/CVE-2024-57850

https://security-tracker.debian.org/tracker/CVE-2024-57874

https://security-tracker.debian.org/tracker/CVE-2024-57876

https://security-tracker.debian.org/tracker/CVE-2024-57882

https://security-tracker.debian.org/tracker/CVE-2024-57884

https://security-tracker.debian.org/tracker/CVE-2024-57887

https://security-tracker.debian.org/tracker/CVE-2024-57889

https://security-tracker.debian.org/tracker/CVE-2024-57890

https://security-tracker.debian.org/tracker/CVE-2024-57892

https://security-tracker.debian.org/tracker/CVE-2024-57893

https://security-tracker.debian.org/tracker/CVE-2024-57894

https://security-tracker.debian.org/tracker/CVE-2024-57896

https://security-tracker.debian.org/tracker/CVE-2024-57897

https://security-tracker.debian.org/tracker/CVE-2024-57900

https://security-tracker.debian.org/tracker/CVE-2024-57901

https://security-tracker.debian.org/tracker/CVE-2024-57902

https://security-tracker.debian.org/tracker/CVE-2024-57903

https://security-tracker.debian.org/tracker/CVE-2024-57904

https://security-tracker.debian.org/tracker/CVE-2024-57906

https://security-tracker.debian.org/tracker/CVE-2024-57907

https://security-tracker.debian.org/tracker/CVE-2024-57908

https://security-tracker.debian.org/tracker/CVE-2024-57910

https://security-tracker.debian.org/tracker/CVE-2024-57911

https://security-tracker.debian.org/tracker/CVE-2024-57912

https://security-tracker.debian.org/tracker/CVE-2024-57913

https://security-tracker.debian.org/tracker/CVE-2024-57916

https://security-tracker.debian.org/tracker/CVE-2024-57917

https://security-tracker.debian.org/tracker/CVE-2024-57922

https://security-tracker.debian.org/tracker/CVE-2024-57925

https://security-tracker.debian.org/tracker/CVE-2024-57929

https://security-tracker.debian.org/tracker/CVE-2024-57930

https://security-tracker.debian.org/tracker/CVE-2024-57931

https://security-tracker.debian.org/tracker/CVE-2024-57938

https://security-tracker.debian.org/tracker/CVE-2024-57939

https://security-tracker.debian.org/tracker/CVE-2024-57940

https://security-tracker.debian.org/tracker/CVE-2024-57946

https://security-tracker.debian.org/tracker/CVE-2024-57948

https://security-tracker.debian.org/tracker/CVE-2024-57949

https://security-tracker.debian.org/tracker/CVE-2024-57951

https://security-tracker.debian.org/tracker/CVE-2025-21629

https://security-tracker.debian.org/tracker/CVE-2025-21631

https://security-tracker.debian.org/tracker/CVE-2025-21636

https://security-tracker.debian.org/tracker/CVE-2025-21637

https://security-tracker.debian.org/tracker/CVE-2025-21638

https://security-tracker.debian.org/tracker/CVE-2025-21639

https://security-tracker.debian.org/tracker/CVE-2025-21640

https://security-tracker.debian.org/tracker/CVE-2025-21646

https://security-tracker.debian.org/tracker/CVE-2025-21647

https://security-tracker.debian.org/tracker/CVE-2025-21648

https://security-tracker.debian.org/tracker/CVE-2025-21653

https://security-tracker.debian.org/tracker/CVE-2025-21655

https://security-tracker.debian.org/tracker/CVE-2025-21660

https://security-tracker.debian.org/tracker/CVE-2025-21662

https://security-tracker.debian.org/tracker/CVE-2025-21664

https://security-tracker.debian.org/tracker/CVE-2025-21665

https://security-tracker.debian.org/tracker/CVE-2025-21666

https://security-tracker.debian.org/tracker/CVE-2025-21667

https://security-tracker.debian.org/tracker/CVE-2025-21668

https://security-tracker.debian.org/tracker/CVE-2025-21669

https://security-tracker.debian.org/tracker/CVE-2025-21671

https://security-tracker.debian.org/tracker/CVE-2025-21675

https://security-tracker.debian.org/tracker/CVE-2025-21678

https://security-tracker.debian.org/tracker/CVE-2025-21680

https://security-tracker.debian.org/tracker/CVE-2025-21681

https://security-tracker.debian.org/tracker/CVE-2025-21683

https://security-tracker.debian.org/tracker/CVE-2025-21687

https://security-tracker.debian.org/tracker/CVE-2025-21688

https://security-tracker.debian.org/tracker/CVE-2025-21689

https://security-tracker.debian.org/tracker/CVE-2025-21690

https://security-tracker.debian.org/tracker/CVE-2025-21692

https://security-tracker.debian.org/tracker/CVE-2025-21694

https://security-tracker.debian.org/tracker/CVE-2025-21697

https://security-tracker.debian.org/tracker/CVE-2025-21699

https://packages.debian.org/source/bullseye/linux-6.1

插件详情

严重性: High

ID: 216985

文件名: debian_DLA-4076.nasl

版本: 1.2

类型: local

代理: unix

发布时间: 2025/3/1

最近更新时间: 2025/4/9

支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: High

分数: 7.4

CVSS v2

风险因素: Medium

基本分数: 6.8

时间分数: 5.6

矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 分数来源: CVE-2025-21692

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 7.2

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:F/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-686, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.31, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-config-6.1, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-common, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.25, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.26, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-common, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-source-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-doc-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-common, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-armmp, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.28, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-armmp-lpae

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可利用: true

易利用性: Exploits are available

补丁发布日期: 2025/3/1

漏洞发布日期: 2024/2/23

CISA 已知可遭利用的漏洞到期日期: 2025/4/30

参考资料信息

CVE: CVE-2022-49034, CVE-2023-52916, CVE-2023-52926, CVE-2024-26595, CVE-2024-27407, CVE-2024-35870, CVE-2024-35956, CVE-2024-36476, CVE-2024-36479, CVE-2024-36899, CVE-2024-37021, CVE-2024-39282, CVE-2024-41014, CVE-2024-42252, CVE-2024-42315, CVE-2024-42319, CVE-2024-43098, CVE-2024-44950, CVE-2024-45828, CVE-2024-46809, CVE-2024-46841, CVE-2024-46896, CVE-2024-47143, CVE-2024-47408, CVE-2024-47745, CVE-2024-48881, CVE-2024-49571, CVE-2024-49861, CVE-2024-49891, CVE-2024-49897, CVE-2024-49898, CVE-2024-49899, CVE-2024-49909, CVE-2024-49911, CVE-2024-49915, CVE-2024-49917, CVE-2024-49925, CVE-2024-49929, CVE-2024-49934, CVE-2024-49939, CVE-2024-49951, CVE-2024-49994, CVE-2024-49996, CVE-2024-50014, CVE-2024-50047, CVE-2024-50051, CVE-2024-50055, CVE-2024-50121, CVE-2024-50146, CVE-2024-50164, CVE-2024-50248, CVE-2024-50258, CVE-2024-50275, CVE-2024-50304, CVE-2024-52332, CVE-2024-53099, CVE-2024-53105, CVE-2024-53124, CVE-2024-53125, CVE-2024-53128, CVE-2024-53141, CVE-2024-53142, CVE-2024-53145, CVE-2024-53146, CVE-2024-53148, CVE-2024-53150, CVE-2024-53151, CVE-2024-53154, CVE-2024-53155, CVE-2024-53156, CVE-2024-53157, CVE-2024-53158, CVE-2024-53161, CVE-2024-53164, CVE-2024-53165, CVE-2024-53170, CVE-2024-53171, CVE-2024-53172, CVE-2024-53173, CVE-2024-53174, CVE-2024-53175, CVE-2024-53180, CVE-2024-53181, CVE-2024-53183, CVE-2024-53184, CVE-2024-53190, CVE-2024-53194, CVE-2024-53196, CVE-2024-53197, CVE-2024-53198, CVE-2024-53206, CVE-2024-53207, CVE-2024-53208, CVE-2024-53210, CVE-2024-53213, CVE-2024-53214, CVE-2024-53215, CVE-2024-53217, CVE-2024-53220, CVE-2024-53226, CVE-2024-53227, CVE-2024-53229, CVE-2024-53230, CVE-2024-53231, CVE-2024-53233, CVE-2024-53234, CVE-2024-53237, CVE-2024-53239, CVE-2024-53240, CVE-2024-53241, CVE-2024-53680, CVE-2024-53685, CVE-2024-53690, CVE-2024-54031, CVE-2024-55881, CVE-2024-55916, CVE-2024-56369, CVE-2024-56531, CVE-2024-56532, CVE-2024-56533, CVE-2024-56539, CVE-2024-56546, CVE-2024-56548, CVE-2024-56551, CVE-2024-56557, CVE-2024-56558, CVE-2024-56562, CVE-2024-56567, CVE-2024-56568, CVE-2024-56569, CVE-2024-56570, CVE-2024-56572, CVE-2024-56574, CVE-2024-56575, CVE-2024-56576, CVE-2024-56578, CVE-2024-56579, CVE-2024-56581, CVE-2024-56582, CVE-2024-56584, CVE-2024-56585, CVE-2024-56586, CVE-2024-56587, CVE-2024-56589, CVE-2024-56590, CVE-2024-56593, CVE-2024-56594, CVE-2024-56595, CVE-2024-56596, CVE-2024-56597, CVE-2024-56598, CVE-2024-56599, CVE-2024-56600, CVE-2024-56601, CVE-2024-56602, CVE-2024-56603, CVE-2024-56604, CVE-2024-56605, CVE-2024-56606, CVE-2024-56608, CVE-2024-56610, CVE-2024-56614, CVE-2024-56615, CVE-2024-56616, CVE-2024-56619, CVE-2024-56622, CVE-2024-56623, CVE-2024-56625, CVE-2024-56626, CVE-2024-56627, CVE-2024-56628, CVE-2024-56629, CVE-2024-56630, CVE-2024-56631, CVE-2024-56633, CVE-2024-56634, CVE-2024-56636, CVE-2024-56637, CVE-2024-56640, CVE-2024-56642, CVE-2024-56643, CVE-2024-56644, CVE-2024-56645, CVE-2024-56648, CVE-2024-56650, CVE-2024-56651, CVE-2024-56658, CVE-2024-56659, CVE-2024-56660, CVE-2024-56661, CVE-2024-56662, CVE-2024-56663, CVE-2024-56664, CVE-2024-56665, CVE-2024-56670, CVE-2024-56672, CVE-2024-56675, CVE-2024-56677, CVE-2024-56678, CVE-2024-56679, CVE-2024-56681, CVE-2024-56683, CVE-2024-56687, CVE-2024-56688, CVE-2024-56690, CVE-2024-56691, CVE-2024-56693, CVE-2024-56694, CVE-2024-56698, CVE-2024-56700, CVE-2024-56701, CVE-2024-56703, CVE-2024-56704, CVE-2024-56705, CVE-2024-56707, CVE-2024-56708, CVE-2024-56709, CVE-2024-56715, CVE-2024-56716, CVE-2024-56717, CVE-2024-56718, CVE-2024-56720, CVE-2024-56722, CVE-2024-56723, CVE-2024-56724, CVE-2024-56725, CVE-2024-56726, CVE-2024-56727, CVE-2024-56728, CVE-2024-56739, CVE-2024-56741, CVE-2024-56745, CVE-2024-56746, CVE-2024-56747, CVE-2024-56748, CVE-2024-56751, CVE-2024-56754, CVE-2024-56755, CVE-2024-56756, CVE-2024-56759, CVE-2024-56763, CVE-2024-56765, CVE-2024-56766, CVE-2024-56767, CVE-2024-56769, CVE-2024-56770, CVE-2024-56774, CVE-2024-56776, CVE-2024-56777, CVE-2024-56778, CVE-2024-56779, CVE-2024-56780, CVE-2024-56781, CVE-2024-56783, CVE-2024-56785, CVE-2024-56787, CVE-2024-57791, CVE-2024-57792, CVE-2024-57798, CVE-2024-57802, CVE-2024-57807, CVE-2024-57838, CVE-2024-57841, CVE-2024-57849, CVE-2024-57850, CVE-2024-57874, CVE-2024-57876, CVE-2024-57882, CVE-2024-57884, CVE-2024-57887, CVE-2024-57889, CVE-2024-57890, CVE-2024-57892, CVE-2024-57893, CVE-2024-57894, CVE-2024-57896, CVE-2024-57897, CVE-2024-57900, CVE-2024-57901, CVE-2024-57902, CVE-2024-57903, CVE-2024-57904, CVE-2024-57906, CVE-2024-57907, CVE-2024-57908, CVE-2024-57910, CVE-2024-57911, CVE-2024-57912, CVE-2024-57913, CVE-2024-57916, CVE-2024-57917, CVE-2024-57922, CVE-2024-57925, CVE-2024-57929, CVE-2024-57930, CVE-2024-57931, CVE-2024-57938, CVE-2024-57939, CVE-2024-57940, CVE-2024-57946, CVE-2024-57948, CVE-2024-57949, CVE-2024-57951, CVE-2025-21629, CVE-2025-21631, CVE-2025-21636, CVE-2025-21637, CVE-2025-21638, CVE-2025-21639, CVE-2025-21640, CVE-2025-21646, CVE-2025-21647, CVE-2025-21648, CVE-2025-21653, CVE-2025-21655, CVE-2025-21660, CVE-2025-21662, CVE-2025-21664, CVE-2025-21665, CVE-2025-21666, CVE-2025-21667, CVE-2025-21668, CVE-2025-21669, CVE-2025-21671, CVE-2025-21675, CVE-2025-21678, CVE-2025-21680, CVE-2025-21681, CVE-2025-21683, CVE-2025-21687, CVE-2025-21688, CVE-2025-21689, CVE-2025-21690, CVE-2025-21692, CVE-2025-21694, CVE-2025-21697, CVE-2025-21699