Debian dla-3912:ata-modules-5.10.0-29-armmp-di - 安全性更新

high Nessus Plugin ID 208245

語系:

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 11 主機上安裝的多個套件受到 dla-3912 公告中提及的多個弱點影響。

------------------------------------------------------------------------- Debian LTS 公告 DLA-3912-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2024 年 10 月 7 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

套件:linux 版本:5.10.226-1CVE ID:CVE-2021-3669 CVE-2022-48733 CVE-2023-31083 CVE-2023-52889 CVE-2024-27397 CVE-2024-38577 CVE-2024-41011 CVE-2024-41042 CVE-2024-41098 CVE-2024-42114 CVE-2024-42228 CVE-2024-42246 CVE-2024-42259 CVE-2024-42265 CVE-2024-42272 CVE-2024-42276 CVE-2024-42280 CVE-2024-42281 CVE-2024-42283 CVE-2024-42284 CVE-2024-42285 CVE-2024-42286 CVE-2024-42287 CVE-2024-42288 CVE-2024-42289 CVE-2024-42290 CVE-2024-42292 CVE-2024-42295 CVE-2024-42297 CVE-2024-42301 CVE-2024-42302 CVE-2024-42304 CVE-2024-42305 CVE-2024-42306 CVE-2024-42308 CVE-2024-42309 CVE-2024-42310 CVE-2024-42311 CVE-2024-42312 CVE-2024-42313 CVE-2024-43828 CVE-2024-43829 CVE-2024-43830 CVE-2024-43834 CVE-2024-43835 CVE-2024-43839 CVE-2024-43841 CVE-2024-43846 CVE-2024-43849 CVE-2024-43853 CVE-2024-43854 CVE-2024-43856 CVE-2024-43858 CVE-2024-43860 CVE-2024-43861 CVE-2024-43867 CVE-2024-43871 CVE-2024-43879 CVE-2024-43880 CVE-2024-43882 CVE-2024-43883 CVE-2024-43884 CVE-2024-43889 CVE-2024-43890 CVE-2024-43892 CVE-2024-43893 CVE-2024-43894 CVE-2024-43905 CVE-2024-43907 CVE-2024-43908 CVE-2024-43914 CVE-2024-44935 CVE-2024-44944 CVE-2024-44946 CVE-2024-44947 CVE-2024-44948 CVE-2024-44952 CVE-2024-44954 CVE-2024-44960 CVE-2024-44965 CVE-2024-44968 CVE-2024-44971 CVE-2024-44974 CVE-2024-44987 CVE-2024-44988 CVE-2024-44989 CVE-2024-44990 CVE-2024-44995 CVE-2024-44998 CVE-2024-44999 CVE-2024-45003 CVE-2024-45006 CVE-2024-45008 CVE-2024-45016 CVE-2024-45018 CVE-2024-45021 CVE-2024-45025 CVE-2024-45028 CVE-2024-46673 CVE-2024-46674 CVE-2024-46675 CVE-2024-46676 CVE-2024-46677 CVE-2024-46679 CVE-2024-46685 CVE-2024-46689 CVE-2024-46702 CVE-2024-46707 CVE-2024-46713 CVE-2024-46714 CVE-2024-46719 CVE-2024-46721 CVE-2024-46722 CVE-2024-46723 CVE-2024-46724 CVE-2024-46725 CVE-2024-46731 CVE-2024-46737 CVE-2024-46738 CVE-2024-46739 CVE-2024-46740 CVE-2024-46743 CVE-2024-46744 CVE-2024-46745 CVE-2024-46747 CVE-2024-46750 CVE-2024-46755 CVE-2024-46756 CVE-2024-46757 CVE-2024-46758 CVE-2024-46759 CVE-2024-46763 CVE-2024-46771 CVE-2024-46777 CVE-2024-46780 CVE-2024-46781 CVE-2024-46782 CVE-2024-46783 CVE-2024-46791 CVE-2024-46798 CVE-2024-46800 CVE-2024-46804 CVE-2024-46814 CVE-2024-46815 CVE-2024-46817 CVE-2024-46818 CVE-2024-46819 CVE-2024-46822 CVE-2024-46828 CVE-2024-46829 CVE-2024-46840 CVE-2024-46844

在 Linux 核心中發現數個弱點,這些弱點可能會導致權限提升、拒絕服務或資訊洩漏。

針對 Debian 11 Bullseye,已在 5.10.226-1 版本中修正這些問題。還包含穩定版更新 5.10.224-5.10.226 (含) 中的許多錯誤修正。

建議您升級 linux 套件。

如需有關 linux 安全性狀態的詳細資訊,請參閱其安全追蹤頁面:
https://security-tracker.debian.org/tracker/linux

有關 Debian LTS 安全公告、如何將這些更新套用至您的系統以及常見問題的詳細資訊,請參閱:https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP signature

Tenable 已直接從 Debian 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 ata-modules-5.10.0-29-armmp-di 套件。

另請參閱

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2021-3669

https://security-tracker.debian.org/tracker/CVE-2022-48733

https://security-tracker.debian.org/tracker/CVE-2023-31083

https://security-tracker.debian.org/tracker/CVE-2023-52889

https://security-tracker.debian.org/tracker/CVE-2024-27397

https://security-tracker.debian.org/tracker/CVE-2024-38577

https://security-tracker.debian.org/tracker/CVE-2024-41011

https://security-tracker.debian.org/tracker/CVE-2024-41042

https://security-tracker.debian.org/tracker/CVE-2024-41098

https://security-tracker.debian.org/tracker/CVE-2024-42114

https://security-tracker.debian.org/tracker/CVE-2024-42228

https://security-tracker.debian.org/tracker/CVE-2024-42246

https://security-tracker.debian.org/tracker/CVE-2024-42259

https://security-tracker.debian.org/tracker/CVE-2024-42265

https://security-tracker.debian.org/tracker/CVE-2024-42272

https://security-tracker.debian.org/tracker/CVE-2024-42276

https://security-tracker.debian.org/tracker/CVE-2024-42280

https://security-tracker.debian.org/tracker/CVE-2024-42281

https://security-tracker.debian.org/tracker/CVE-2024-42283

https://security-tracker.debian.org/tracker/CVE-2024-42284

https://security-tracker.debian.org/tracker/CVE-2024-42285

https://security-tracker.debian.org/tracker/CVE-2024-42286

https://security-tracker.debian.org/tracker/CVE-2024-42287

https://security-tracker.debian.org/tracker/CVE-2024-42288

https://security-tracker.debian.org/tracker/CVE-2024-42289

https://security-tracker.debian.org/tracker/CVE-2024-42290

https://security-tracker.debian.org/tracker/CVE-2024-42292

https://security-tracker.debian.org/tracker/CVE-2024-42295

https://security-tracker.debian.org/tracker/CVE-2024-42297

https://security-tracker.debian.org/tracker/CVE-2024-42301

https://security-tracker.debian.org/tracker/CVE-2024-42302

https://security-tracker.debian.org/tracker/CVE-2024-42304

https://security-tracker.debian.org/tracker/CVE-2024-42305

https://security-tracker.debian.org/tracker/CVE-2024-42306

https://security-tracker.debian.org/tracker/CVE-2024-42308

https://security-tracker.debian.org/tracker/CVE-2024-42309

https://security-tracker.debian.org/tracker/CVE-2024-42310

https://security-tracker.debian.org/tracker/CVE-2024-42311

https://security-tracker.debian.org/tracker/CVE-2024-42312

https://security-tracker.debian.org/tracker/CVE-2024-42313

https://security-tracker.debian.org/tracker/CVE-2024-43828

https://security-tracker.debian.org/tracker/CVE-2024-43829

https://security-tracker.debian.org/tracker/CVE-2024-43830

https://security-tracker.debian.org/tracker/CVE-2024-43834

https://security-tracker.debian.org/tracker/CVE-2024-43835

https://security-tracker.debian.org/tracker/CVE-2024-43839

https://security-tracker.debian.org/tracker/CVE-2024-43841

https://security-tracker.debian.org/tracker/CVE-2024-43846

https://security-tracker.debian.org/tracker/CVE-2024-43849

https://security-tracker.debian.org/tracker/CVE-2024-43853

https://security-tracker.debian.org/tracker/CVE-2024-43854

https://security-tracker.debian.org/tracker/CVE-2024-43856

https://security-tracker.debian.org/tracker/CVE-2024-43858

https://security-tracker.debian.org/tracker/CVE-2024-43860

https://security-tracker.debian.org/tracker/CVE-2024-43861

https://security-tracker.debian.org/tracker/CVE-2024-43867

https://security-tracker.debian.org/tracker/CVE-2024-43871

https://security-tracker.debian.org/tracker/CVE-2024-43879

https://security-tracker.debian.org/tracker/CVE-2024-45018

https://security-tracker.debian.org/tracker/CVE-2024-45021

https://security-tracker.debian.org/tracker/CVE-2024-45025

https://security-tracker.debian.org/tracker/CVE-2024-45028

https://security-tracker.debian.org/tracker/CVE-2024-46673

https://security-tracker.debian.org/tracker/CVE-2024-46674

https://security-tracker.debian.org/tracker/CVE-2024-46675

https://security-tracker.debian.org/tracker/CVE-2024-46676

https://security-tracker.debian.org/tracker/CVE-2024-46677

https://security-tracker.debian.org/tracker/CVE-2024-46679

https://security-tracker.debian.org/tracker/CVE-2024-46685

https://security-tracker.debian.org/tracker/CVE-2024-46689

https://security-tracker.debian.org/tracker/CVE-2024-46702

https://security-tracker.debian.org/tracker/CVE-2024-46707

https://security-tracker.debian.org/tracker/CVE-2024-46713

https://security-tracker.debian.org/tracker/CVE-2024-46714

https://security-tracker.debian.org/tracker/CVE-2024-46719

https://security-tracker.debian.org/tracker/CVE-2024-46721

https://security-tracker.debian.org/tracker/CVE-2024-46722

https://security-tracker.debian.org/tracker/CVE-2024-46723

https://security-tracker.debian.org/tracker/CVE-2024-46724

https://security-tracker.debian.org/tracker/CVE-2024-46725

https://security-tracker.debian.org/tracker/CVE-2024-46731

https://security-tracker.debian.org/tracker/CVE-2024-46737

https://security-tracker.debian.org/tracker/CVE-2024-46738

https://security-tracker.debian.org/tracker/CVE-2024-46739

https://security-tracker.debian.org/tracker/CVE-2024-46740

https://security-tracker.debian.org/tracker/CVE-2024-46743

https://security-tracker.debian.org/tracker/CVE-2024-46744

https://security-tracker.debian.org/tracker/CVE-2024-46745

https://security-tracker.debian.org/tracker/CVE-2024-46747

https://security-tracker.debian.org/tracker/CVE-2024-46750

https://security-tracker.debian.org/tracker/CVE-2024-46755

https://security-tracker.debian.org/tracker/CVE-2024-46756

https://security-tracker.debian.org/tracker/CVE-2024-46757

https://security-tracker.debian.org/tracker/CVE-2024-46758

https://security-tracker.debian.org/tracker/CVE-2024-46759

https://security-tracker.debian.org/tracker/CVE-2024-46763

https://security-tracker.debian.org/tracker/CVE-2024-46771

https://security-tracker.debian.org/tracker/CVE-2024-46777

https://security-tracker.debian.org/tracker/CVE-2024-46780

https://security-tracker.debian.org/tracker/CVE-2024-46781

https://security-tracker.debian.org/tracker/CVE-2024-46782

https://security-tracker.debian.org/tracker/CVE-2024-46783

https://security-tracker.debian.org/tracker/CVE-2024-46791

https://security-tracker.debian.org/tracker/CVE-2024-46798

https://security-tracker.debian.org/tracker/CVE-2024-46800

https://security-tracker.debian.org/tracker/CVE-2024-46804

https://security-tracker.debian.org/tracker/CVE-2024-46814

https://security-tracker.debian.org/tracker/CVE-2024-46815

https://security-tracker.debian.org/tracker/CVE-2024-46817

https://security-tracker.debian.org/tracker/CVE-2024-46818

https://security-tracker.debian.org/tracker/CVE-2024-46819

https://security-tracker.debian.org/tracker/CVE-2024-46822

https://security-tracker.debian.org/tracker/CVE-2024-46828

https://security-tracker.debian.org/tracker/CVE-2024-46829

https://security-tracker.debian.org/tracker/CVE-2024-46840

https://security-tracker.debian.org/tracker/CVE-2024-46844

https://packages.debian.org/source/bullseye/linux

https://security-tracker.debian.org/tracker/CVE-2024-43880

https://security-tracker.debian.org/tracker/CVE-2024-43882

https://security-tracker.debian.org/tracker/CVE-2024-43883

https://security-tracker.debian.org/tracker/CVE-2024-43884

https://security-tracker.debian.org/tracker/CVE-2024-43889

https://security-tracker.debian.org/tracker/CVE-2024-43890

https://security-tracker.debian.org/tracker/CVE-2024-43892

https://security-tracker.debian.org/tracker/CVE-2024-43893

https://security-tracker.debian.org/tracker/CVE-2024-43894

https://security-tracker.debian.org/tracker/CVE-2024-43905

https://security-tracker.debian.org/tracker/CVE-2024-43907

https://security-tracker.debian.org/tracker/CVE-2024-43908

https://security-tracker.debian.org/tracker/CVE-2024-43914

https://security-tracker.debian.org/tracker/CVE-2024-44935

https://security-tracker.debian.org/tracker/CVE-2024-44944

https://security-tracker.debian.org/tracker/CVE-2024-44946

https://security-tracker.debian.org/tracker/CVE-2024-44947

https://security-tracker.debian.org/tracker/CVE-2024-44948

https://security-tracker.debian.org/tracker/CVE-2024-44952

https://security-tracker.debian.org/tracker/CVE-2024-44954

https://security-tracker.debian.org/tracker/CVE-2024-44960

https://security-tracker.debian.org/tracker/CVE-2024-44965

https://security-tracker.debian.org/tracker/CVE-2024-44968

https://security-tracker.debian.org/tracker/CVE-2024-44971

https://security-tracker.debian.org/tracker/CVE-2024-44974

https://security-tracker.debian.org/tracker/CVE-2024-44987

https://security-tracker.debian.org/tracker/CVE-2024-44988

https://security-tracker.debian.org/tracker/CVE-2024-44989

https://security-tracker.debian.org/tracker/CVE-2024-44990

https://security-tracker.debian.org/tracker/CVE-2024-44995

https://security-tracker.debian.org/tracker/CVE-2024-44998

https://security-tracker.debian.org/tracker/CVE-2024-44999

https://security-tracker.debian.org/tracker/CVE-2024-45003

https://security-tracker.debian.org/tracker/CVE-2024-45006

https://security-tracker.debian.org/tracker/CVE-2024-45008

https://security-tracker.debian.org/tracker/CVE-2024-45016

Plugin 詳細資訊

嚴重性: High

ID: 208245

檔案名稱: debian_DLA-3912.nasl

版本: 1.1

類型: local

代理程式: unix

已發布: 2024/10/7

已更新: 2024/10/7

支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: High

分數: 7.4

CVSS v2

風險因素: Medium

基本分數: 6.8

時間分數: 5.3

媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2024-46844

CVSS v3

風險因素: High

基本分數: 7.8

時間分數: 7

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-arm64, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-doc, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-armmp, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-dbg, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-686-pae-dbg, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-source, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-common-rt, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-common, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-x86, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-armmp, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-arm64-dbg, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-cloud-amd64, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-perf, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-686-dbg, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-i386-signed-template, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-rt-armmp, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-686-pae, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-amd64, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-arm, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae, p-cpe:/a:debian:debian_linux:bpftool, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-29, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-amd64, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-dbg, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-686-dbg, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-dbg, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-33-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-686, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-armmp, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-arm64, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-31-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-33-armmp-di

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2024/10/7

弱點發布日期: 2022/5/10

參考資訊

CVE: CVE-2021-3669, CVE-2022-48733, CVE-2023-31083, CVE-2023-52889, CVE-2024-27397, CVE-2024-38577, CVE-2024-41011, CVE-2024-41042, CVE-2024-41098, CVE-2024-42114, CVE-2024-42228, CVE-2024-42246, CVE-2024-42259, CVE-2024-42265, CVE-2024-42272, CVE-2024-42276, CVE-2024-42280, CVE-2024-42281, CVE-2024-42283, CVE-2024-42284, CVE-2024-42285, CVE-2024-42286, CVE-2024-42287, CVE-2024-42288, CVE-2024-42289, CVE-2024-42290, CVE-2024-42292, CVE-2024-42295, CVE-2024-42297, CVE-2024-42301, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-42308, CVE-2024-42309, CVE-2024-42310, CVE-2024-42311, CVE-2024-42312, CVE-2024-42313, CVE-2024-43828, CVE-2024-43829, CVE-2024-43830, CVE-2024-43834, CVE-2024-43835, CVE-2024-43839, CVE-2024-43841, CVE-2024-43846, CVE-2024-43849, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43858, CVE-2024-43860, CVE-2024-43861, CVE-2024-43867, CVE-2024-43871, CVE-2024-43879, CVE-2024-43880, CVE-2024-43882, CVE-2024-43883, CVE-2024-43884, CVE-2024-43889, CVE-2024-43890, CVE-2024-43892, CVE-2024-43893, CVE-2024-43894, CVE-2024-43905, CVE-2024-43907, CVE-2024-43908, CVE-2024-43914, CVE-2024-44935, CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-44948, CVE-2024-44952, CVE-2024-44954, CVE-2024-44960, CVE-2024-44965, CVE-2024-44968, CVE-2024-44971, CVE-2024-44974, CVE-2024-44987, CVE-2024-44988, CVE-2024-44989, CVE-2024-44990, CVE-2024-44995, CVE-2024-44998, CVE-2024-44999, CVE-2024-45003, CVE-2024-45006, CVE-2024-45008, CVE-2024-45016, CVE-2024-45018, CVE-2024-45021, CVE-2024-45025, CVE-2024-45028, CVE-2024-46673, CVE-2024-46674, CVE-2024-46675, CVE-2024-46676, CVE-2024-46677, CVE-2024-46679, CVE-2024-46685, CVE-2024-46689, CVE-2024-46702, CVE-2024-46707, CVE-2024-46713, CVE-2024-46714, CVE-2024-46719, CVE-2024-46721, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46731, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46740, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46747, CVE-2024-46750, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46763, CVE-2024-46771, CVE-2024-46777, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46791, CVE-2024-46798, CVE-2024-46800, CVE-2024-46804, CVE-2024-46814, CVE-2024-46815, CVE-2024-46817, CVE-2024-46818, CVE-2024-46819, CVE-2024-46822, CVE-2024-46828, CVE-2024-46829, CVE-2024-46840, CVE-2024-46844