Debian dla-4271linux-config-6.1 - 安全性更新

medium Nessus Plugin ID 249178

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 11 主機已安裝受到多個弱點影響的套件如 dla-4271 公告中所提及。

-------------------------------------------------- ----------------------- Debian LTS 公告 DLA-4271-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2025 年 8 月 13 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

套件 linux-6.1 版本 6.1.140-1~deb11u1 CVE ID CVE-2024-26618 CVE-2024-26783 CVE-2024-26807 CVE-2024-28956 CVE-2024-35790 CVE-2024-36903 CVE-2024-36927 CVE-2024-43840 CVE-2024-46751 CVE-2024-53203 CVE-2024-53209 CVE-2024-57945 CVE-2025-21645 CVE-2025-21839 CVE-2025-21931 CVE-2025-22062 CVE-2025-37819 CVE-2025-37890 CVE-2025-37897 CVE-2025-37901 CVE-2025-37903 CVE-2025-37905 CVE-2025-37909 CVE-2025-37911 CVE-2025-37912 CVE-2025-37913 CVE-2025-37914 CVE-2025-37915 CVE-2025-37917 CVE-2025-37921 CVE-2025-37923 CVE-2025-37924 CVE-2025-37927 CVE-2025-37928 CVE-2025-37929 CVE-2025-37930 CVE-2025-37932 CVE-2025-37936 CVE-2025-37947 CVE-2025-37948 CVE-2025-37949 CVE-2025-37951 CVE-2025-37953 CVE-2025-37959 CVE-2025-37961 CVE-2025-37962 CVE-2025-37963 CVE-2025-37964 CVE-2025-37967 CVE-2025-37969 CVE-2025-37970 CVE-2025-37972 CVE-2025-37990 CVE-2025-37991 CVE-2025-37992 CVE-2025-37994 CVE-2025-37995 CVE-2025-37997 CVE-2025-37998 CVE-2025-38005 CVE-2025-38007 CVE-2025-38009 CVE-2025-38015 CVE-2025-38018 CVE-2025-38020 CVE-2025-38023 CVE-2025-38024 CVE-2025-38027 CVE-2025-38094 CVE-2025-38095 CVE-2025-38177

在 Linux 核心中發現數個弱點,這些弱點可能會導致特權提升、拒絕服務或資訊洩漏。

針對 Debian 11 Bullseye這些問題已在 6.1.140-1~deb11u1 版本中修正。還包含穩定版更新 6.1.138-6.1.140 中的許多錯誤修正。

建議您升級 linux-6.1 套件。

如需有關 linux-6.1 安全性狀態的詳細資訊,請參閱其安全追蹤頁面:
https://security-tracker.debian.org/tracker/linux-6.1

有關 Debian LTS 安全公告、如何將這些更新套用至您的系統以及常見問題的詳細資訊,請參閱: https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP 簽章

Tenable 已直接從 Debian 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 linux-config-6.1 套件。

另請參閱

https://security-tracker.debian.org/tracker/source-package/linux-6.1

https://security-tracker.debian.org/tracker/CVE-2024-26618

https://security-tracker.debian.org/tracker/CVE-2024-26783

https://security-tracker.debian.org/tracker/CVE-2024-26807

https://security-tracker.debian.org/tracker/CVE-2024-28956

https://security-tracker.debian.org/tracker/CVE-2024-35790

https://security-tracker.debian.org/tracker/CVE-2024-36903

https://security-tracker.debian.org/tracker/CVE-2024-36927

https://security-tracker.debian.org/tracker/CVE-2024-43840

https://security-tracker.debian.org/tracker/CVE-2024-46751

https://security-tracker.debian.org/tracker/CVE-2024-53203

https://security-tracker.debian.org/tracker/CVE-2024-53209

https://security-tracker.debian.org/tracker/CVE-2024-57945

https://security-tracker.debian.org/tracker/CVE-2025-21645

https://security-tracker.debian.org/tracker/CVE-2025-21839

https://security-tracker.debian.org/tracker/CVE-2025-21931

https://security-tracker.debian.org/tracker/CVE-2025-22062

https://security-tracker.debian.org/tracker/CVE-2025-37819

https://security-tracker.debian.org/tracker/CVE-2025-37890

https://security-tracker.debian.org/tracker/CVE-2025-37897

https://security-tracker.debian.org/tracker/CVE-2025-37901

https://security-tracker.debian.org/tracker/CVE-2025-37903

https://security-tracker.debian.org/tracker/CVE-2025-37905

https://security-tracker.debian.org/tracker/CVE-2025-37909

https://security-tracker.debian.org/tracker/CVE-2025-37911

https://security-tracker.debian.org/tracker/CVE-2025-37912

https://security-tracker.debian.org/tracker/CVE-2025-37913

https://security-tracker.debian.org/tracker/CVE-2025-37914

https://security-tracker.debian.org/tracker/CVE-2025-37915

https://security-tracker.debian.org/tracker/CVE-2025-37917

https://security-tracker.debian.org/tracker/CVE-2025-37921

https://security-tracker.debian.org/tracker/CVE-2025-37923

https://security-tracker.debian.org/tracker/CVE-2025-37924

https://security-tracker.debian.org/tracker/CVE-2025-37927

https://security-tracker.debian.org/tracker/CVE-2025-37928

https://security-tracker.debian.org/tracker/CVE-2025-37929

https://security-tracker.debian.org/tracker/CVE-2025-37930

https://security-tracker.debian.org/tracker/CVE-2025-37932

https://security-tracker.debian.org/tracker/CVE-2025-37936

https://security-tracker.debian.org/tracker/CVE-2025-37947

https://security-tracker.debian.org/tracker/CVE-2025-37948

https://security-tracker.debian.org/tracker/CVE-2025-37949

https://security-tracker.debian.org/tracker/CVE-2025-37951

https://security-tracker.debian.org/tracker/CVE-2025-37953

https://security-tracker.debian.org/tracker/CVE-2025-37959

https://security-tracker.debian.org/tracker/CVE-2025-37961

https://security-tracker.debian.org/tracker/CVE-2025-37962

https://security-tracker.debian.org/tracker/CVE-2025-37963

https://security-tracker.debian.org/tracker/CVE-2025-37964

https://security-tracker.debian.org/tracker/CVE-2025-37967

https://security-tracker.debian.org/tracker/CVE-2025-37969

https://security-tracker.debian.org/tracker/CVE-2025-37970

https://security-tracker.debian.org/tracker/CVE-2025-37972

https://security-tracker.debian.org/tracker/CVE-2025-37990

https://security-tracker.debian.org/tracker/CVE-2025-37991

https://security-tracker.debian.org/tracker/CVE-2025-37992

https://security-tracker.debian.org/tracker/CVE-2025-37994

https://security-tracker.debian.org/tracker/CVE-2025-37995

https://security-tracker.debian.org/tracker/CVE-2025-37997

https://security-tracker.debian.org/tracker/CVE-2025-37998

https://security-tracker.debian.org/tracker/CVE-2025-38005

https://security-tracker.debian.org/tracker/CVE-2025-38007

https://security-tracker.debian.org/tracker/CVE-2025-38009

https://security-tracker.debian.org/tracker/CVE-2025-38015

https://security-tracker.debian.org/tracker/CVE-2025-38018

https://security-tracker.debian.org/tracker/CVE-2025-38020

https://security-tracker.debian.org/tracker/CVE-2025-38023

https://security-tracker.debian.org/tracker/CVE-2025-38024

https://security-tracker.debian.org/tracker/CVE-2025-38027

https://security-tracker.debian.org/tracker/CVE-2025-38094

https://security-tracker.debian.org/tracker/CVE-2025-38095

https://security-tracker.debian.org/tracker/CVE-2025-38177

https://packages.debian.org/source/bullseye/linux-6.1

Plugin 詳細資訊

嚴重性: Medium

ID: 249178

檔案名稱: debian_DLA-4271.nasl

版本: 1.1

類型: local

代理程式: unix

已發布: 2025/8/13

已更新: 2025/8/13

支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Medium

基本分數: 6.8

時間性分數: 5.3

媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2024-53203

CVSS v3

風險因素: High

基本分數: 7.8

時間性分數: 7

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

風險因素: Medium

Base Score: 5.7

Threat Score: 4.7

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS 評分資料來源: CVE-2024-28956

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-armmp, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-common, p-cpe:/a:debian:debian_linux:linux-image-6.1-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-armmp, p-cpe:/a:debian:debian_linux:linux-config-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-doc-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-686, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.37, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-source-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.35-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.37-common, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.35-rt-arm64, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.35, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.37-amd64-dbg

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2025/8/13

弱點發布日期: 2024/2/29

參考資訊

CVE: CVE-2024-26618, CVE-2024-26783, CVE-2024-26807, CVE-2024-28956, CVE-2024-35790, CVE-2024-36903, CVE-2024-36927, CVE-2024-43840, CVE-2024-46751, CVE-2024-53203, CVE-2024-53209, CVE-2024-57945, CVE-2025-21645, CVE-2025-21839, CVE-2025-21931, CVE-2025-22062, CVE-2025-37819, CVE-2025-37890, CVE-2025-37897, CVE-2025-37901, CVE-2025-37903, CVE-2025-37905, CVE-2025-37909, CVE-2025-37911, CVE-2025-37912, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37917, CVE-2025-37921, CVE-2025-37923, CVE-2025-37924, CVE-2025-37927, CVE-2025-37928, CVE-2025-37929, CVE-2025-37930, CVE-2025-37932, CVE-2025-37936, CVE-2025-37947, CVE-2025-37948, CVE-2025-37949, CVE-2025-37951, CVE-2025-37953, CVE-2025-37959, CVE-2025-37961, CVE-2025-37962, CVE-2025-37963, CVE-2025-37964, CVE-2025-37967, CVE-2025-37969, CVE-2025-37970, CVE-2025-37972, CVE-2025-37990, CVE-2025-37991, CVE-2025-37992, CVE-2025-37994, CVE-2025-37995, CVE-2025-37997, CVE-2025-37998, CVE-2025-38005, CVE-2025-38007, CVE-2025-38009, CVE-2025-38015, CVE-2025-38018, CVE-2025-38020, CVE-2025-38023, CVE-2025-38024, CVE-2025-38027, CVE-2025-38094, CVE-2025-38095, CVE-2025-38177