Debian dla-4404ata-modules-5.10.0-35-armmp-di - 安全更新

high Nessus 插件 ID 278559

简介

远程 Debian 主机上缺少一个或多个与安全相关的更新。

描述

远程 Debian 11 主机上存在安装的程序包该程序包受到 dla-4404 公告中提及的多个漏洞的影响。

-------------------------------------------------- ----------------------- Debian LTS 公告 DLA-4404-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2025 年 12 月 12 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

程序包:linux 版本:5.10.247-1 CVE ID:CVE-2023-53498 CVE-2024-47666 CVE-2024-50143 CVE-2024-57947 CVE-2025-21861 CVE-2025-21887 CVE-2025-22058 CVE-2025-23143 CVE-2025-38678 CVE-2025-39866 CVE-2025-39869 CVE-2025-39876 CVE-2025-39883 CVE-2025-39885 CVE-2025-39907 CVE-2025-39911 CVE-2025-39913 CVE-2025-39923 CVE-2025-39937 CVE-2025-39945 CVE-2025-39949 CVE-2025-39951 CVE-2025-39953 CVE-2025-39955 CVE-2025-39964 CVE-2025-39967 CVE-2025-39968 CVE-2025-39969 CVE-2025-39970 CVE-2025-39971 CVE-2025-39972 CVE-2025-39973 CVE-2025-39980 CVE-2025-39985 CVE-2025-39986 CVE-2025-39987 CVE-2025-39993 CVE-2025-39994 CVE-2025-39995 CVE-2025-39996 CVE-2025-39998 CVE-2025-40001 CVE-2025-40006 CVE-2025-40011 CVE-2025-40018 CVE-2025-40019 CVE-2025-40020 CVE-2025-40021 CVE-2025-40022 CVE-2025-40026 CVE-2025-40027 CVE-2025-40029 CVE-2025-40030 CVE-2025-40035 CVE-2025-40042 CVE-2025-40044 CVE-2025-40048 CVE-2025-40049 CVE-2025-40053 CVE-2025-40055 CVE-2025-40070 CVE-2025-40078 CVE-2025-40081 CVE-2025-40083 CVE-2025-40087 CVE-2025-40088 CVE-2025-40105 CVE-2025-40106 CVE-2025-40109 CVE-2025-40111 CVE-2025-40115 CVE-2025-40116 CVE-2025-40118 CVE-2025-40121 CVE-2025-40125 CVE-2025-40127 CVE-2025-40134 CVE-2025-40140 CVE-2025-40153 CVE-2025-40154 CVE-2025-40167 CVE-2025-40173 CVE-2025-40178 CVE-2025-40183 CVE-2025-40186 CVE-2025-40187 CVE-2025-40188 CVE-2025-40190 CVE-2025-40194 CVE-2025-40197 CVE-2025-40198 CVE-2025-40200 CVE-2025-40204 CVE-2025-40205 CVE-2025-40211 CVE-2025-40219 CVE-2025-40220 CVE-2025-40223 CVE-2025-40231 CVE-2025-40233 CVE-2025-40240 CVE-2025-40243 CVE-2025-40244 CVE-2025-40248 CVE-2025-40254 CVE-2025-40257 CVE-2025-40258 CVE-2025-40259 CVE-2025-40261 CVE-2025-40262 CVE-2025-40263 CVE-2025-40264 CVE-2025-40269 CVE-2025-40271 CVE-2025-40273 CVE-2025-40275 CVE-2025-40277 CVE-2025-40278 CVE-2025-40280 CVE-2025-40281 CVE-2025-40282 CVE-2025-40283 CVE-2025-40304 CVE-2025-40306 CVE-2025-40308 CVE-2025-40309 CVE-2025-40312 CVE-2025-40315 CVE-2025-40317 CVE-2025-40319 CVE-2025-40321 CVE-2025-40322 CVE-2025-40324 CVE-2025-40331 CVE-2025-40342 Debian 缺陷:1107479 1114557

在 Linux 内核中发现多个可能导致权限升级、拒绝服务或信息泄漏的漏洞。

对于 Debian 11 bullseye,已在 5.10.247-1 版本中修复这些问题。此版本还包括稳定更新中的更多缺陷修复 5.10.245-5.10.247。被破坏的 pktcdvd 驱动程序也已禁用。

建议您升级 linux 程序包。

如需了解 linux 的详细安全状态,请参阅其安全跟踪页面:
https://security-tracker.debian.org/tracker/linux

有关 Debian LTS 安全公告、如何将这些更新应用到系统以及常见问题解答的更多信息,请访问以下网址:https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP signature

Tenable 已直接从 Debian 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

升级 ata-modules-5.10.0-35-armmp-di 程序包。

另见

https://security-tracker.debian.org/tracker/CVE-2025-40134

https://security-tracker.debian.org/tracker/CVE-2025-40140

https://security-tracker.debian.org/tracker/CVE-2025-40153

https://security-tracker.debian.org/tracker/CVE-2025-40154

https://security-tracker.debian.org/tracker/CVE-2025-40167

https://security-tracker.debian.org/tracker/CVE-2025-40173

https://security-tracker.debian.org/tracker/CVE-2025-40178

https://security-tracker.debian.org/tracker/CVE-2025-40183

https://security-tracker.debian.org/tracker/CVE-2025-40186

https://security-tracker.debian.org/tracker/CVE-2025-40187

https://security-tracker.debian.org/tracker/CVE-2025-40188

https://security-tracker.debian.org/tracker/CVE-2025-40190

https://security-tracker.debian.org/tracker/CVE-2025-40194

https://security-tracker.debian.org/tracker/CVE-2025-40197

https://security-tracker.debian.org/tracker/CVE-2025-40198

https://security-tracker.debian.org/tracker/CVE-2025-40200

https://security-tracker.debian.org/tracker/CVE-2025-40204

https://security-tracker.debian.org/tracker/CVE-2025-40205

https://security-tracker.debian.org/tracker/CVE-2025-40211

https://security-tracker.debian.org/tracker/CVE-2025-40219

https://security-tracker.debian.org/tracker/CVE-2025-40220

https://security-tracker.debian.org/tracker/CVE-2025-40223

https://security-tracker.debian.org/tracker/CVE-2025-40231

https://security-tracker.debian.org/tracker/CVE-2025-40233

https://security-tracker.debian.org/tracker/CVE-2025-40240

https://security-tracker.debian.org/tracker/CVE-2025-40243

https://security-tracker.debian.org/tracker/CVE-2025-40244

https://security-tracker.debian.org/tracker/CVE-2025-40248

https://security-tracker.debian.org/tracker/CVE-2025-40254

https://security-tracker.debian.org/tracker/CVE-2025-40257

https://security-tracker.debian.org/tracker/CVE-2025-40258

https://security-tracker.debian.org/tracker/CVE-2025-40259

https://security-tracker.debian.org/tracker/CVE-2025-40261

https://security-tracker.debian.org/tracker/CVE-2025-40262

https://security-tracker.debian.org/tracker/CVE-2025-40263

https://security-tracker.debian.org/tracker/CVE-2025-40264

https://security-tracker.debian.org/tracker/CVE-2025-40269

https://security-tracker.debian.org/tracker/CVE-2025-40271

https://security-tracker.debian.org/tracker/CVE-2025-40273

https://security-tracker.debian.org/tracker/CVE-2025-40275

https://security-tracker.debian.org/tracker/CVE-2025-40277

https://security-tracker.debian.org/tracker/CVE-2025-40278

https://security-tracker.debian.org/tracker/CVE-2025-40280

https://security-tracker.debian.org/tracker/CVE-2025-40281

https://security-tracker.debian.org/tracker/CVE-2025-40282

https://security-tracker.debian.org/tracker/CVE-2025-40283

https://security-tracker.debian.org/tracker/CVE-2025-40304

https://security-tracker.debian.org/tracker/CVE-2025-40306

https://security-tracker.debian.org/tracker/CVE-2025-40308

https://security-tracker.debian.org/tracker/CVE-2025-40309

https://security-tracker.debian.org/tracker/CVE-2025-40312

https://security-tracker.debian.org/tracker/CVE-2025-40315

https://security-tracker.debian.org/tracker/CVE-2025-40317

https://security-tracker.debian.org/tracker/CVE-2025-40319

https://security-tracker.debian.org/tracker/CVE-2025-40321

https://security-tracker.debian.org/tracker/CVE-2025-40322

https://security-tracker.debian.org/tracker/CVE-2025-40324

https://security-tracker.debian.org/tracker/CVE-2025-40331

https://security-tracker.debian.org/tracker/CVE-2025-40342

https://packages.debian.org/source/bullseye/linux

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2023-53498

https://security-tracker.debian.org/tracker/CVE-2024-47666

https://security-tracker.debian.org/tracker/CVE-2024-50143

https://security-tracker.debian.org/tracker/CVE-2024-57947

https://security-tracker.debian.org/tracker/CVE-2025-21861

https://security-tracker.debian.org/tracker/CVE-2025-21887

https://security-tracker.debian.org/tracker/CVE-2025-22058

https://security-tracker.debian.org/tracker/CVE-2025-23143

https://security-tracker.debian.org/tracker/CVE-2025-38678

https://security-tracker.debian.org/tracker/CVE-2025-39866

https://security-tracker.debian.org/tracker/CVE-2025-39869

https://security-tracker.debian.org/tracker/CVE-2025-39876

https://security-tracker.debian.org/tracker/CVE-2025-39883

https://security-tracker.debian.org/tracker/CVE-2025-39885

https://security-tracker.debian.org/tracker/CVE-2025-39907

https://security-tracker.debian.org/tracker/CVE-2025-39911

https://security-tracker.debian.org/tracker/CVE-2025-39913

https://security-tracker.debian.org/tracker/CVE-2025-39923

https://security-tracker.debian.org/tracker/CVE-2025-39937

https://security-tracker.debian.org/tracker/CVE-2025-39945

https://security-tracker.debian.org/tracker/CVE-2025-39949

https://security-tracker.debian.org/tracker/CVE-2025-39951

https://security-tracker.debian.org/tracker/CVE-2025-39953

https://security-tracker.debian.org/tracker/CVE-2025-39955

https://security-tracker.debian.org/tracker/CVE-2025-39964

https://security-tracker.debian.org/tracker/CVE-2025-39967

https://security-tracker.debian.org/tracker/CVE-2025-39968

https://security-tracker.debian.org/tracker/CVE-2025-39969

https://security-tracker.debian.org/tracker/CVE-2025-39970

https://security-tracker.debian.org/tracker/CVE-2025-39971

https://security-tracker.debian.org/tracker/CVE-2025-39972

https://security-tracker.debian.org/tracker/CVE-2025-39973

https://security-tracker.debian.org/tracker/CVE-2025-39980

https://security-tracker.debian.org/tracker/CVE-2025-39985

https://security-tracker.debian.org/tracker/CVE-2025-39986

https://security-tracker.debian.org/tracker/CVE-2025-39987

https://security-tracker.debian.org/tracker/CVE-2025-39993

https://security-tracker.debian.org/tracker/CVE-2025-39994

https://security-tracker.debian.org/tracker/CVE-2025-39995

https://security-tracker.debian.org/tracker/CVE-2025-39996

https://security-tracker.debian.org/tracker/CVE-2025-39998

https://security-tracker.debian.org/tracker/CVE-2025-40001

https://security-tracker.debian.org/tracker/CVE-2025-40006

https://security-tracker.debian.org/tracker/CVE-2025-40011

https://security-tracker.debian.org/tracker/CVE-2025-40018

https://security-tracker.debian.org/tracker/CVE-2025-40019

https://security-tracker.debian.org/tracker/CVE-2025-40020

https://security-tracker.debian.org/tracker/CVE-2025-40021

https://security-tracker.debian.org/tracker/CVE-2025-40022

https://security-tracker.debian.org/tracker/CVE-2025-40026

https://security-tracker.debian.org/tracker/CVE-2025-40027

https://security-tracker.debian.org/tracker/CVE-2025-40029

https://security-tracker.debian.org/tracker/CVE-2025-40030

https://security-tracker.debian.org/tracker/CVE-2025-40035

https://security-tracker.debian.org/tracker/CVE-2025-40042

https://security-tracker.debian.org/tracker/CVE-2025-40044

https://security-tracker.debian.org/tracker/CVE-2025-40048

https://security-tracker.debian.org/tracker/CVE-2025-40049

https://security-tracker.debian.org/tracker/CVE-2025-40053

https://security-tracker.debian.org/tracker/CVE-2025-40055

https://security-tracker.debian.org/tracker/CVE-2025-40070

https://security-tracker.debian.org/tracker/CVE-2025-40078

https://security-tracker.debian.org/tracker/CVE-2025-40081

https://security-tracker.debian.org/tracker/CVE-2025-40083

https://security-tracker.debian.org/tracker/CVE-2025-40087

https://security-tracker.debian.org/tracker/CVE-2025-40088

https://security-tracker.debian.org/tracker/CVE-2025-40105

https://security-tracker.debian.org/tracker/CVE-2025-40106

https://security-tracker.debian.org/tracker/CVE-2025-40109

https://security-tracker.debian.org/tracker/CVE-2025-40111

https://security-tracker.debian.org/tracker/CVE-2025-40115

https://security-tracker.debian.org/tracker/CVE-2025-40116

https://security-tracker.debian.org/tracker/CVE-2025-40118

https://security-tracker.debian.org/tracker/CVE-2025-40121

https://security-tracker.debian.org/tracker/CVE-2025-40125

https://security-tracker.debian.org/tracker/CVE-2025-40127

插件详情

严重性: High

ID: 278559

文件名: debian_DLA-4404.nasl

版本: 1.1

类型: local

代理: unix

发布时间: 2025/12/12

最近更新时间: 2025/12/12

支持的传感器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

风险信息

VPR

风险因素: High

分数: 8.4

CVSS v2

风险因素: Medium

基本分数: 6.8

时间分数: 5.3

矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 分数来源: CVE-2024-50143

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 7

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:P/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-doc, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-amd64-dbg, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:linux-image-arm64-dbg, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-35-armmp-di, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-source, p-cpe:/a:debian:debian_linux:linux-image-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-pae-dbg, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-x86, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common-rt, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-armmp, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686-pae, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:linux-headers-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-perf, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-dbg, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-amd64, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-i386-signed-template, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-rt-armmp, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-686-pae, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-armmp, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-35, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-dbg, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-arm64, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-dbg, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-arm, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:bpftool, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-amd64, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-686-dbg, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-dbg

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可利用: true

易利用性: Exploits are available

补丁发布日期: 2025/12/12

漏洞发布日期: 2024/8/28

参考资料信息

CVE: CVE-2023-53498, CVE-2024-47666, CVE-2024-50143, CVE-2024-57947, CVE-2025-21861, CVE-2025-21887, CVE-2025-22058, CVE-2025-23143, CVE-2025-38678, CVE-2025-39866, CVE-2025-39869, CVE-2025-39876, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907, CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39937, CVE-2025-39945, CVE-2025-39949, CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39964, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987, CVE-2025-39993, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40011, CVE-2025-40018, CVE-2025-40019, CVE-2025-40020, CVE-2025-40021, CVE-2025-40022, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40035, CVE-2025-40042, CVE-2025-40044, CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055, CVE-2025-40070, CVE-2025-40078, CVE-2025-40081, CVE-2025-40083, CVE-2025-40087, CVE-2025-40088, CVE-2025-40105, CVE-2025-40106, CVE-2025-40109, CVE-2025-40111, CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40121, CVE-2025-40125, CVE-2025-40127, CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154, CVE-2025-40167, CVE-2025-40173, CVE-2025-40178, CVE-2025-40183, CVE-2025-40186, CVE-2025-40187, CVE-2025-40188, CVE-2025-40190, CVE-2025-40194, CVE-2025-40197, CVE-2025-40198, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205, CVE-2025-40211, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223, CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243, CVE-2025-40244, CVE-2025-40248, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312, CVE-2025-40315, CVE-2025-40317, CVE-2025-40319, CVE-2025-40321, CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40342