Debian dla-4102: linux-config-6.1 - 安全性更新

high Nessus Plugin ID 233595

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 11 主機上安裝的多個套件受到 dla-4102 公告中提及的多個弱點影響。

- ------------------------------------------------- ------------------------------------ Debian LTS 公告 DLA-4102-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2025 年 3 月 31 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

套件: linux-6.1 版本: 6.1.129-1~deb11u1 CVE ID: CVE-2024-26596 CVE-2024-40945 CVE-2024-42069 CVE-2024-42122 CVE-2024-45001 CVE-2024-47726 CVE-2024-49989 CVE-2024-50061 CVE-2024-54458 CVE-2024-56549 CVE-2024-57834 CVE-2024-57973 CVE-2024-57978 CVE-2024-57979 CVE-2024-57980 CVE-2024-57981 CVE-2024-57986 CVE-2024-57993 CVE-2024-57996 CVE-2024-57997 CVE-2024-57998 CVE-2024-58001 CVE-2024-58007 CVE-2024-58009 CVE-2024-58010 CVE-2024-58011 CVE-2024-58013 CVE-2024-58014 CVE-2024-58016 CVE-2024-58017 CVE-2024-58020 CVE-2024-58034 CVE-2024-58051 CVE-2024-58052 CVE-2024-58054 CVE-2024-58055 CVE-2024-58056 CVE-2024-58058 CVE-2024-58061 CVE-2024-58063 CVE-2024-58068 CVE-2024-58069 CVE-2024-58071 CVE-2024-58072 CVE-2024-58076 CVE-2024-58077 CVE-2024-58080 CVE-2024-58083 CVE-2024-58085 CVE-2024-58086 CVE-2025-21684 CVE-2025-21700 CVE-2025-21701 CVE-2025-21703 CVE-2025-21704 CVE-2025-21705 CVE-2025-21706 CVE-2025-21707 CVE-2025-21708 CVE-2025-21711 CVE-2025-21715 CVE-2025-21716 CVE-2025-21718 CVE-2025-21719 CVE-2025-21722 CVE-2025-21724 CVE-2025-21725 CVE-2025-21726 CVE-2025-21727 CVE-2025-21728 CVE-2025-21731 CVE-2025-21734 CVE-2025-21735 CVE-2025-21736 CVE-2025-21738 CVE-2025-21744 CVE-2025-21745 CVE-2025-21748 CVE-2025-21749 CVE-2025-21750 CVE-2025-21753 CVE-2025-21758 CVE-2025-21760 CVE-2025-21761 CVE-2025-21762 CVE-2025-21763 CVE-2025-21764 CVE-2025-21765 CVE-2025-21766 CVE-2025-21767 CVE-2025-21772 CVE-2025-21775 CVE-2025-21776 CVE-2025-21779 CVE-2025-21780 CVE-2025-21781 CVE-2025-21782 CVE-2025-21785 CVE-2025-21787 CVE-2025-21790 CVE-2025-21791 CVE-2025-21792 CVE-2025-21794 CVE-2025-21795 CVE-2025-21796 CVE-2025-21799 CVE-2025-21802 CVE-2025-21804 CVE-2025-21806 CVE-2025-21811 CVE-2025-21812 CVE-2025-21814 CVE-2025-21819 CVE-2025-21820 CVE-2025-21821 CVE-2025-21823 CVE-2025-21826 CVE-2025-21829 CVE-2025-21830 CVE-2025-21832 CVE-2025-21835 Debian 錯誤: 1071562 1087807 1088159 1091517 1091858 1093371 1095435 1095745 1095764 1098250 1098354 1099138

在 Linux 核心中發現數個弱點,這些弱點可能會導致特權提升、拒絕服務或資訊洩漏。

針對 Debian 11 bullseye,已在 6.1.129-1~deb11u1 版本中修正這些問題。此外,這也包含來自穩定版更新 6.1.129的更多錯誤修正,以及針對某些 Rockchip SoC 回歸問題所做的修復。

建議您升級 linux-6.1 套件。

如需有關 linux-6.1 安全性狀態的詳細資訊,請參閱其安全追蹤頁面:
https://security-tracker.debian.org/tracker/linux-6.1

有關 Debian LTS 安全公告、如何將這些更新套用至您的系統以及常見問題的詳細資訊,請參閱: https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP 簽章

Tenable 已直接從 Debian 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 linux-config-6.1 套件。

另請參閱

https://security-tracker.debian.org/tracker/CVE-2024-58009

https://security-tracker.debian.org/tracker/CVE-2024-58010

https://security-tracker.debian.org/tracker/CVE-2024-58011

https://security-tracker.debian.org/tracker/CVE-2024-58013

https://security-tracker.debian.org/tracker/CVE-2024-58014

https://security-tracker.debian.org/tracker/CVE-2024-58016

https://security-tracker.debian.org/tracker/CVE-2024-58017

https://security-tracker.debian.org/tracker/CVE-2024-58020

https://security-tracker.debian.org/tracker/CVE-2024-58034

https://security-tracker.debian.org/tracker/CVE-2024-58051

https://security-tracker.debian.org/tracker/CVE-2024-58052

https://security-tracker.debian.org/tracker/CVE-2024-58083

https://security-tracker.debian.org/tracker/CVE-2024-58085

https://security-tracker.debian.org/tracker/CVE-2024-58086

https://security-tracker.debian.org/tracker/CVE-2025-21684

https://security-tracker.debian.org/tracker/CVE-2025-21700

https://security-tracker.debian.org/tracker/CVE-2025-21701

https://security-tracker.debian.org/tracker/CVE-2025-21703

https://security-tracker.debian.org/tracker/CVE-2025-21704

https://security-tracker.debian.org/tracker/CVE-2025-21731

https://security-tracker.debian.org/tracker/CVE-2025-21734

https://security-tracker.debian.org/tracker/CVE-2025-21735

https://security-tracker.debian.org/tracker/CVE-2025-21736

https://security-tracker.debian.org/tracker/CVE-2025-21738

https://security-tracker.debian.org/tracker/CVE-2025-21744

https://security-tracker.debian.org/tracker/CVE-2025-21745

https://security-tracker.debian.org/tracker/CVE-2025-21748

https://security-tracker.debian.org/tracker/CVE-2025-21749

https://security-tracker.debian.org/tracker/CVE-2025-21750

https://security-tracker.debian.org/tracker/CVE-2025-21753

https://security-tracker.debian.org/tracker/CVE-2025-21758

https://security-tracker.debian.org/tracker/CVE-2025-21760

https://security-tracker.debian.org/tracker/CVE-2025-21761

https://security-tracker.debian.org/tracker/CVE-2025-21762

https://security-tracker.debian.org/tracker/CVE-2025-21763

https://security-tracker.debian.org/tracker/CVE-2025-21764

https://security-tracker.debian.org/tracker/CVE-2025-21765

https://security-tracker.debian.org/tracker/CVE-2025-21766

https://security-tracker.debian.org/tracker/CVE-2025-21767

https://security-tracker.debian.org/tracker/CVE-2025-21772

https://security-tracker.debian.org/tracker/CVE-2025-21775

https://security-tracker.debian.org/tracker/CVE-2025-21776

https://security-tracker.debian.org/tracker/CVE-2025-21779

https://security-tracker.debian.org/tracker/CVE-2025-21780

https://security-tracker.debian.org/tracker/CVE-2025-21781

https://security-tracker.debian.org/tracker/CVE-2025-21782

https://security-tracker.debian.org/tracker/CVE-2025-21785

https://security-tracker.debian.org/tracker/CVE-2025-21787

https://security-tracker.debian.org/tracker/CVE-2025-21790

https://security-tracker.debian.org/tracker/CVE-2025-21791

https://security-tracker.debian.org/tracker/CVE-2025-21792

https://security-tracker.debian.org/tracker/CVE-2025-21794

https://security-tracker.debian.org/tracker/CVE-2025-21795

https://security-tracker.debian.org/tracker/CVE-2025-21796

https://security-tracker.debian.org/tracker/CVE-2025-21799

https://security-tracker.debian.org/tracker/CVE-2025-21802

https://security-tracker.debian.org/tracker/CVE-2025-21804

https://security-tracker.debian.org/tracker/source-package/linux-6.1

https://security-tracker.debian.org/tracker/CVE-2024-26596

https://security-tracker.debian.org/tracker/CVE-2024-40945

https://security-tracker.debian.org/tracker/CVE-2024-42069

https://security-tracker.debian.org/tracker/CVE-2024-42122

https://security-tracker.debian.org/tracker/CVE-2024-45001

https://security-tracker.debian.org/tracker/CVE-2024-47726

https://security-tracker.debian.org/tracker/CVE-2024-49989

https://security-tracker.debian.org/tracker/CVE-2024-50061

https://security-tracker.debian.org/tracker/CVE-2024-54458

https://security-tracker.debian.org/tracker/CVE-2024-56549

https://security-tracker.debian.org/tracker/CVE-2024-57834

https://security-tracker.debian.org/tracker/CVE-2024-57973

https://security-tracker.debian.org/tracker/CVE-2024-57978

https://security-tracker.debian.org/tracker/CVE-2024-57979

https://security-tracker.debian.org/tracker/CVE-2024-57980

https://security-tracker.debian.org/tracker/CVE-2024-57981

https://security-tracker.debian.org/tracker/CVE-2024-57986

https://security-tracker.debian.org/tracker/CVE-2024-57993

https://security-tracker.debian.org/tracker/CVE-2024-57996

https://security-tracker.debian.org/tracker/CVE-2024-57997

https://security-tracker.debian.org/tracker/CVE-2024-57998

https://security-tracker.debian.org/tracker/CVE-2024-58001

https://security-tracker.debian.org/tracker/CVE-2024-58007

https://security-tracker.debian.org/tracker/CVE-2024-58054

https://security-tracker.debian.org/tracker/CVE-2024-58055

https://security-tracker.debian.org/tracker/CVE-2024-58056

https://security-tracker.debian.org/tracker/CVE-2024-58058

https://security-tracker.debian.org/tracker/CVE-2024-58061

https://security-tracker.debian.org/tracker/CVE-2024-58063

https://security-tracker.debian.org/tracker/CVE-2024-58068

https://security-tracker.debian.org/tracker/CVE-2024-58069

https://security-tracker.debian.org/tracker/CVE-2024-58071

https://security-tracker.debian.org/tracker/CVE-2024-58072

https://security-tracker.debian.org/tracker/CVE-2024-58076

https://security-tracker.debian.org/tracker/CVE-2024-58077

https://security-tracker.debian.org/tracker/CVE-2024-58080

https://security-tracker.debian.org/tracker/CVE-2025-21705

https://security-tracker.debian.org/tracker/CVE-2025-21706

https://security-tracker.debian.org/tracker/CVE-2025-21707

https://security-tracker.debian.org/tracker/CVE-2025-21708

https://security-tracker.debian.org/tracker/CVE-2025-21711

https://security-tracker.debian.org/tracker/CVE-2025-21715

https://security-tracker.debian.org/tracker/CVE-2025-21716

https://security-tracker.debian.org/tracker/CVE-2025-21718

https://security-tracker.debian.org/tracker/CVE-2025-21719

https://security-tracker.debian.org/tracker/CVE-2025-21722

https://security-tracker.debian.org/tracker/CVE-2025-21724

https://security-tracker.debian.org/tracker/CVE-2025-21725

https://security-tracker.debian.org/tracker/CVE-2025-21726

https://security-tracker.debian.org/tracker/CVE-2025-21727

https://security-tracker.debian.org/tracker/CVE-2025-21728

https://security-tracker.debian.org/tracker/CVE-2025-21806

https://security-tracker.debian.org/tracker/CVE-2025-21811

https://security-tracker.debian.org/tracker/CVE-2025-21812

https://security-tracker.debian.org/tracker/CVE-2025-21814

https://security-tracker.debian.org/tracker/CVE-2025-21819

https://security-tracker.debian.org/tracker/CVE-2025-21820

https://security-tracker.debian.org/tracker/CVE-2025-21821

https://security-tracker.debian.org/tracker/CVE-2025-21823

https://security-tracker.debian.org/tracker/CVE-2025-21826

https://security-tracker.debian.org/tracker/CVE-2025-21829

https://security-tracker.debian.org/tracker/CVE-2025-21830

https://security-tracker.debian.org/tracker/CVE-2025-21832

https://security-tracker.debian.org/tracker/CVE-2025-21835

https://packages.debian.org/source/bullseye/linux-6.1

Plugin 詳細資訊

嚴重性: High

ID: 233595

檔案名稱: debian_DLA-4102.nasl

版本: 1.1

類型: local

代理程式: unix

已發布: 2025/4/1

已更新: 2025/4/1

支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Medium

基本分數: 6.8

時間性分數: 5

媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2025-21791

CVSS v3

風險因素: High

基本分數: 7.8

時間性分數: 6.8

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.25, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.26, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-686-pae-dbg, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-common, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-686-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.32, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-686, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-686, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.31, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-config-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-common, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-source-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-686-dbg, p-cpe:/a:debian:debian_linux:linux-doc-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.32-common, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.28-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.28-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-armmp, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.28, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.31-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.25-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-686, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.32-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.31-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.26-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.26-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.25-armmp-lpae

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2025/3/31

弱點發布日期: 2024/2/23

參考資訊

CVE: CVE-2024-26596, CVE-2024-40945, CVE-2024-42069, CVE-2024-42122, CVE-2024-45001, CVE-2024-47726, CVE-2024-49989, CVE-2024-50061, CVE-2024-54458, CVE-2024-56549, CVE-2024-57834, CVE-2024-57973, CVE-2024-57978, CVE-2024-57979, CVE-2024-57980, CVE-2024-57981, CVE-2024-57986, CVE-2024-57993, CVE-2024-57996, CVE-2024-57997, CVE-2024-57998, CVE-2024-58001, CVE-2024-58007, CVE-2024-58009, CVE-2024-58010, CVE-2024-58011, CVE-2024-58013, CVE-2024-58014, CVE-2024-58016, CVE-2024-58017, CVE-2024-58020, CVE-2024-58034, CVE-2024-58051, CVE-2024-58052, CVE-2024-58054, CVE-2024-58055, CVE-2024-58056, CVE-2024-58058, CVE-2024-58061, CVE-2024-58063, CVE-2024-58068, CVE-2024-58069, CVE-2024-58071, CVE-2024-58072, CVE-2024-58076, CVE-2024-58077, CVE-2024-58080, CVE-2024-58083, CVE-2024-58085, CVE-2024-58086, CVE-2025-21684, CVE-2025-21700, CVE-2025-21701, CVE-2025-21703, CVE-2025-21704, CVE-2025-21705, CVE-2025-21706, CVE-2025-21707, CVE-2025-21708, CVE-2025-21711, CVE-2025-21715, CVE-2025-21716, CVE-2025-21718, CVE-2025-21719, CVE-2025-21722, CVE-2025-21724, CVE-2025-21725, CVE-2025-21726, CVE-2025-21727, CVE-2025-21728, CVE-2025-21731, CVE-2025-21734, CVE-2025-21735, CVE-2025-21736, CVE-2025-21738, CVE-2025-21744, CVE-2025-21745, CVE-2025-21748, CVE-2025-21749, CVE-2025-21750, CVE-2025-21753, CVE-2025-21758, CVE-2025-21760, CVE-2025-21761, CVE-2025-21762, CVE-2025-21763, CVE-2025-21764, CVE-2025-21765, CVE-2025-21766, CVE-2025-21767, CVE-2025-21772, CVE-2025-21775, CVE-2025-21776, CVE-2025-21779, CVE-2025-21780, CVE-2025-21781, CVE-2025-21782, CVE-2025-21785, CVE-2025-21787, CVE-2025-21790, CVE-2025-21791, CVE-2025-21792, CVE-2025-21794, CVE-2025-21795, CVE-2025-21796, CVE-2025-21799, CVE-2025-21802, CVE-2025-21804, CVE-2025-21806, CVE-2025-21811, CVE-2025-21812, CVE-2025-21814, CVE-2025-21819, CVE-2025-21820, CVE-2025-21821, CVE-2025-21823, CVE-2025-21826, CVE-2025-21829, CVE-2025-21830, CVE-2025-21832, CVE-2025-21835