Debian dla-4379linux-config-6.1 - 安全更新

medium Nessus 插件 ID 276782

简介

远程 Debian 主机上缺少一个或多个与安全相关的更新。

描述

远程 Debian 11 主机上存在安装的程序包该程序包受到 dla-4379 公告中提及的多个漏洞的影响。

-------------------------------------------------- ----------------------- Debian LTS 公告 DLA-4379-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2025 年 11 月 25 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

程序包:linux-6.1 版本:6.1.158-1~deb11u1 CVE ID:CVE-2025-21861 CVE-2025-39929 CVE-2025-39931 CVE-2025-39934 CVE-2025-39937 CVE-2025-39938 CVE-2025-39942 CVE-2025-39943 CVE-2025-39944 CVE-2025-39945 CVE-2025-39946 CVE-2025-39949 CVE-2025-39951 CVE-2025-39953 CVE-2025-39955 CVE-2025-39957 CVE-2025-39964 CVE-2025-39967 CVE-2025-39968 CVE-2025-39969 CVE-2025-39970 CVE-2025-39971 CVE-2025-39972 CVE-2025-39973 CVE-2025-39977 CVE-2025-39978 CVE-2025-39980 CVE-2025-39982 CVE-2025-39985 CVE-2025-39986 CVE-2025-39987 CVE-2025-39988 CVE-2025-39993 CVE-2025-39994 CVE-2025-39995 CVE-2025-39996 CVE-2025-39998 CVE-2025-40001 CVE-2025-40006 CVE-2025-40008 CVE-2025-40010 CVE-2025-40011 CVE-2025-40013 CVE-2025-40018 CVE-2025-40019 CVE-2025-40020 CVE-2025-40021 CVE-2025-40022 CVE-2025-40026 CVE-2025-40027 CVE-2025-40029 CVE-2025-40030 CVE-2025-40032 CVE-2025-40035 CVE-2025-40036 CVE-2025-40040 CVE-2025-40042 CVE-2025-40043 CVE-2025-40044 CVE-2025-40048 CVE-2025-40049 CVE-2025-40051 CVE-2025-40053 CVE-2025-40055 CVE-2025-40056 CVE-2025-40060 CVE-2025-40062 CVE-2025-40068 CVE-2025-40070 CVE-2025-40078 CVE-2025-40080 CVE-2025-40081 CVE-2025-40084 CVE-2025-40085 CVE-2025-40087 CVE-2025-40088 CVE-2025-40092 CVE-2025-40093 CVE-2025-40094 CVE-2025-40095 CVE-2025-40096 CVE-2025-40099 CVE-2025-40100 CVE-2025-40103 CVE-2025-40104 CVE-2025-40105 CVE-2025-40106 CVE-2025-40107 CVE-2025-40109 CVE-2025-40111 CVE-2025-40112 CVE-2025-40115 CVE-2025-40116 CVE-2025-40118 CVE-2025-40120 CVE-2025-40121 CVE-2025-40123 CVE-2025-40124 CVE-2025-40125 CVE-2025-40126 CVE-2025-40127 CVE-2025-40134 CVE-2025-40140 CVE-2025-40141 CVE-2025-40153 CVE-2025-40154 CVE-2025-40156 CVE-2025-40167 CVE-2025-40171 CVE-2025-40173 CVE-2025-40176 CVE-2025-40178 CVE-2025-40179 CVE-2025-40183 CVE-2025-40186 CVE-2025-40187 CVE-2025-40188 CVE-2025-40190 CVE-2025-40193 CVE-2025-40194 CVE-2025-40197 CVE-2025-40198 CVE-2025-40200 CVE-2025-40201 CVE-2025-40202 CVE-2025-40204 CVE-2025-40205 CVE-2025-40207

在 Linux 内核中发现多个可能导致权限升级、拒绝服务或信息泄漏的漏洞。

对于 Debian 11 Bullseye这些问题已在 6.1.158-1~deb11u1 版本中修复。此版本还包括稳定更新中的更多缺陷修复 6.1.154-6.1.158。

建议您升级 linux-6.1 程序包。

如需了解 linux-6.1 的详细安全状态,请参阅其安全跟踪页面:
https://security-tracker.debian.org/tracker/linux-6.1

有关 Debian LTS 安全公告、如何将这些更新应用到系统以及常见问题解答的更多信息,请访问以下网址:https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP signature

Tenable 已直接从 Debian 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

升级 linux-config-6.1 程序包。

另见

https://security-tracker.debian.org/tracker/CVE-2025-39946

https://security-tracker.debian.org/tracker/CVE-2025-39949

https://security-tracker.debian.org/tracker/CVE-2025-39951

https://security-tracker.debian.org/tracker/CVE-2025-39953

https://security-tracker.debian.org/tracker/CVE-2025-39955

https://security-tracker.debian.org/tracker/CVE-2025-39957

https://security-tracker.debian.org/tracker/CVE-2025-39964

https://security-tracker.debian.org/tracker/CVE-2025-39967

https://security-tracker.debian.org/tracker/CVE-2025-39968

https://security-tracker.debian.org/tracker/CVE-2025-39969

https://security-tracker.debian.org/tracker/CVE-2025-39970

https://security-tracker.debian.org/tracker/CVE-2025-39971

https://security-tracker.debian.org/tracker/CVE-2025-39972

https://security-tracker.debian.org/tracker/CVE-2025-39973

https://security-tracker.debian.org/tracker/CVE-2025-39977

https://security-tracker.debian.org/tracker/CVE-2025-39978

https://security-tracker.debian.org/tracker/CVE-2025-39980

https://security-tracker.debian.org/tracker/CVE-2025-39982

https://security-tracker.debian.org/tracker/CVE-2025-39985

https://security-tracker.debian.org/tracker/CVE-2025-39986

https://security-tracker.debian.org/tracker/CVE-2025-39987

https://security-tracker.debian.org/tracker/CVE-2025-40011

https://security-tracker.debian.org/tracker/CVE-2025-40013

https://security-tracker.debian.org/tracker/CVE-2025-40018

https://security-tracker.debian.org/tracker/CVE-2025-40019

https://security-tracker.debian.org/tracker/CVE-2025-40020

https://security-tracker.debian.org/tracker/CVE-2025-40021

https://security-tracker.debian.org/tracker/CVE-2025-40022

https://security-tracker.debian.org/tracker/CVE-2025-40026

https://security-tracker.debian.org/tracker/CVE-2025-40027

https://security-tracker.debian.org/tracker/CVE-2025-40029

https://security-tracker.debian.org/tracker/CVE-2025-40030

https://security-tracker.debian.org/tracker/CVE-2025-40032

https://security-tracker.debian.org/tracker/CVE-2025-40035

https://security-tracker.debian.org/tracker/CVE-2025-40036

https://security-tracker.debian.org/tracker/CVE-2025-40040

https://security-tracker.debian.org/tracker/CVE-2025-40042

https://security-tracker.debian.org/tracker/CVE-2025-40043

https://security-tracker.debian.org/tracker/CVE-2025-40044

https://security-tracker.debian.org/tracker/CVE-2025-40048

https://security-tracker.debian.org/tracker/CVE-2025-40125

https://security-tracker.debian.org/tracker/CVE-2025-40126

https://security-tracker.debian.org/tracker/CVE-2025-40127

https://security-tracker.debian.org/tracker/CVE-2025-40134

https://security-tracker.debian.org/tracker/CVE-2025-40140

https://security-tracker.debian.org/tracker/CVE-2025-40141

https://security-tracker.debian.org/tracker/CVE-2025-40153

https://security-tracker.debian.org/tracker/CVE-2025-40154

https://security-tracker.debian.org/tracker/CVE-2025-40156

https://security-tracker.debian.org/tracker/CVE-2025-40167

https://security-tracker.debian.org/tracker/CVE-2025-40171

https://security-tracker.debian.org/tracker/CVE-2025-40173

https://security-tracker.debian.org/tracker/CVE-2025-40176

https://security-tracker.debian.org/tracker/CVE-2025-40178

https://security-tracker.debian.org/tracker/CVE-2025-40179

https://security-tracker.debian.org/tracker/CVE-2025-40183

https://security-tracker.debian.org/tracker/CVE-2025-40186

https://security-tracker.debian.org/tracker/CVE-2025-40187

https://security-tracker.debian.org/tracker/CVE-2025-40188

https://security-tracker.debian.org/tracker/CVE-2025-40190

https://security-tracker.debian.org/tracker/CVE-2025-40193

https://security-tracker.debian.org/tracker/CVE-2025-40194

https://security-tracker.debian.org/tracker/CVE-2025-40197

https://security-tracker.debian.org/tracker/CVE-2025-40198

https://security-tracker.debian.org/tracker/CVE-2025-40200

https://security-tracker.debian.org/tracker/CVE-2025-40201

https://security-tracker.debian.org/tracker/CVE-2025-40202

https://security-tracker.debian.org/tracker/CVE-2025-40204

https://security-tracker.debian.org/tracker/CVE-2025-40205

https://security-tracker.debian.org/tracker/CVE-2025-40207

https://packages.debian.org/source/bullseye/linux-6.1

https://security-tracker.debian.org/tracker/CVE-2025-39988

https://security-tracker.debian.org/tracker/CVE-2025-39993

https://security-tracker.debian.org/tracker/CVE-2025-39994

https://security-tracker.debian.org/tracker/CVE-2025-39995

https://security-tracker.debian.org/tracker/CVE-2025-39996

https://security-tracker.debian.org/tracker/CVE-2025-39998

https://security-tracker.debian.org/tracker/CVE-2025-40001

https://security-tracker.debian.org/tracker/CVE-2025-40006

https://security-tracker.debian.org/tracker/CVE-2025-40008

https://security-tracker.debian.org/tracker/CVE-2025-40010

https://security-tracker.debian.org/tracker/CVE-2025-40049

https://security-tracker.debian.org/tracker/CVE-2025-40051

https://security-tracker.debian.org/tracker/CVE-2025-40053

https://security-tracker.debian.org/tracker/CVE-2025-40055

https://security-tracker.debian.org/tracker/CVE-2025-40056

https://security-tracker.debian.org/tracker/CVE-2025-40060

https://security-tracker.debian.org/tracker/CVE-2025-40062

https://security-tracker.debian.org/tracker/CVE-2025-40068

https://security-tracker.debian.org/tracker/CVE-2025-40070

https://security-tracker.debian.org/tracker/CVE-2025-40078

https://security-tracker.debian.org/tracker/CVE-2025-40080

https://security-tracker.debian.org/tracker/CVE-2025-40081

https://security-tracker.debian.org/tracker/CVE-2025-40084

https://security-tracker.debian.org/tracker/CVE-2025-40085

https://security-tracker.debian.org/tracker/CVE-2025-40087

https://security-tracker.debian.org/tracker/CVE-2025-40088

https://security-tracker.debian.org/tracker/CVE-2025-40092

https://security-tracker.debian.org/tracker/CVE-2025-40093

https://security-tracker.debian.org/tracker/CVE-2025-40094

https://security-tracker.debian.org/tracker/CVE-2025-40095

https://security-tracker.debian.org/tracker/CVE-2025-40096

https://security-tracker.debian.org/tracker/CVE-2025-40099

https://security-tracker.debian.org/tracker/CVE-2025-40100

https://security-tracker.debian.org/tracker/CVE-2025-40103

https://security-tracker.debian.org/tracker/CVE-2025-40104

https://security-tracker.debian.org/tracker/CVE-2025-40105

https://security-tracker.debian.org/tracker/CVE-2025-40106

https://security-tracker.debian.org/tracker/CVE-2025-40107

https://security-tracker.debian.org/tracker/CVE-2025-40109

https://security-tracker.debian.org/tracker/CVE-2025-40111

https://security-tracker.debian.org/tracker/CVE-2025-40112

https://security-tracker.debian.org/tracker/CVE-2025-40115

https://security-tracker.debian.org/tracker/CVE-2025-40116

https://security-tracker.debian.org/tracker/CVE-2025-40118

https://security-tracker.debian.org/tracker/CVE-2025-40120

https://security-tracker.debian.org/tracker/CVE-2025-40121

https://security-tracker.debian.org/tracker/CVE-2025-40123

https://security-tracker.debian.org/tracker/CVE-2025-40124

https://security-tracker.debian.org/tracker/source-package/linux-6.1

https://security-tracker.debian.org/tracker/CVE-2025-21861

https://security-tracker.debian.org/tracker/CVE-2025-39929

https://security-tracker.debian.org/tracker/CVE-2025-39931

https://security-tracker.debian.org/tracker/CVE-2025-39934

https://security-tracker.debian.org/tracker/CVE-2025-39937

https://security-tracker.debian.org/tracker/CVE-2025-39938

https://security-tracker.debian.org/tracker/CVE-2025-39942

https://security-tracker.debian.org/tracker/CVE-2025-39943

https://security-tracker.debian.org/tracker/CVE-2025-39944

https://security-tracker.debian.org/tracker/CVE-2025-39945

插件详情

严重性: Medium

ID: 276782

文件名: debian_DLA-4379.nasl

版本: 1.1

类型: local

代理: unix

发布时间: 2025/11/25

最近更新时间: 2025/11/25

支持的传感器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: High

分数: 7.4

CVSS v2

风险因素: Medium

基本分数: 4.6

时间分数: 3.6

矢量: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS 分数来源: CVE-2025-21861

CVSS v3

风险因素: Medium

基本分数: 5.5

时间分数: 5

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-common, p-cpe:/a:debian:debian_linux:linux-image-6.1-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-arm64, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-config-6.1, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.38, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-common-rt, p-cpe:/a:debian:debian_linux:linux-doc-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-686, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-686, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.39, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.40, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-686, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-common-rt, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.37, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-common, p-cpe:/a:debian:debian_linux:linux-source-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.41, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-common, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-kbuild-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.39-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.38-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.41-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.39-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.41-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.38-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.35, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.40-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.40-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-signed-template

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可利用: true

易利用性: Exploits are available

补丁发布日期: 2025/11/25

漏洞发布日期: 2025/3/12

参考资料信息

CVE: CVE-2025-21861, CVE-2025-39929, CVE-2025-39931, CVE-2025-39934, CVE-2025-39937, CVE-2025-39938, CVE-2025-39942, CVE-2025-39943, CVE-2025-39944, CVE-2025-39945, CVE-2025-39946, CVE-2025-39949, CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39957, CVE-2025-39964, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39977, CVE-2025-39978, CVE-2025-39980, CVE-2025-39982, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987, CVE-2025-39988, CVE-2025-39993, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40008, CVE-2025-40010, CVE-2025-40011, CVE-2025-40013, CVE-2025-40018, CVE-2025-40019, CVE-2025-40020, CVE-2025-40021, CVE-2025-40022, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40032, CVE-2025-40035, CVE-2025-40036, CVE-2025-40040, CVE-2025-40042, CVE-2025-40043, CVE-2025-40044, CVE-2025-40048, CVE-2025-40049, CVE-2025-40051, CVE-2025-40053, CVE-2025-40055, CVE-2025-40056, CVE-2025-40060, CVE-2025-40062, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078, CVE-2025-40080, CVE-2025-40081, CVE-2025-40084, CVE-2025-40085, CVE-2025-40087, CVE-2025-40088, CVE-2025-40092, CVE-2025-40093, CVE-2025-40094, CVE-2025-40095, CVE-2025-40096, CVE-2025-40099, CVE-2025-40100, CVE-2025-40103, CVE-2025-40104, CVE-2025-40105, CVE-2025-40106, CVE-2025-40107, CVE-2025-40109, CVE-2025-40111, CVE-2025-40112, CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40120, CVE-2025-40121, CVE-2025-40123, CVE-2025-40124, CVE-2025-40125, CVE-2025-40126, CVE-2025-40127, CVE-2025-40134, CVE-2025-40140, CVE-2025-40141, CVE-2025-40153, CVE-2025-40154, CVE-2025-40156, CVE-2025-40167, CVE-2025-40171, CVE-2025-40173, CVE-2025-40176, CVE-2025-40178, CVE-2025-40179, CVE-2025-40183, CVE-2025-40186, CVE-2025-40187, CVE-2025-40188, CVE-2025-40190, CVE-2025-40193, CVE-2025-40194, CVE-2025-40197, CVE-2025-40198, CVE-2025-40200, CVE-2025-40201, CVE-2025-40202, CVE-2025-40204, CVE-2025-40205, CVE-2025-40207