Debian dla-4475ata-modules-5.10.0-35-armmp-di - 安全性更新

high Nessus Plugin ID 298680

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 11 主機已安裝受到多個弱點影響的套件如 dla-4475 公告中所提及。

-------------------------------------------------- ----------------------- Debian LTS 公告 DLA-4475-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2026 年 2 月 10 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

套件:linux 版本:5.10.249-1 CVE ID:CVE-2022-48744 CVE-2022-49168 CVE-2022-49465 CVE-2022-49711 CVE-2022-49743 CVE-2023-52975 CVE-2023-54207 CVE-2023-54321 CVE-2024-36903 CVE-2024-36927 CVE-2025-22022 CVE-2025-22121 CVE-2025-37830 CVE-2025-38022 CVE-2025-38119 CVE-2025-38556 CVE-2025-38591 CVE-2025-39702 CVE-2025-40110 CVE-2025-40215 CVE-2025-68211 CVE-2025-68255 CVE-2025-68257 CVE-2025-68258 CVE-2025-68261 CVE-2025-68264 CVE-2025-68266 CVE-2025-68282 CVE-2025-68325 CVE-2025-68332 CVE-2025-68336 CVE-2025-68337 CVE-2025-68344 CVE-2025-68346 CVE-2025-68349 CVE-2025-68354 CVE-2025-68362 CVE-2025-68364 CVE-2025-68366 CVE-2025-68367 CVE-2025-68372 CVE-2025-68724 CVE-2025-68725 CVE-2025-68733 CVE-2025-68740 CVE-2025-68757 CVE-2025-68758 CVE-2025-68759 CVE-2025-68764 CVE-2025-68767 CVE-2025-68769 CVE-2025-68771 CVE-2025-68773 CVE-2025-68774 CVE-2025-68776 CVE-2025-68777 CVE-2025-68782 CVE-2025-68783 CVE-2025-68785 CVE-2025-68787 CVE-2025-68788 CVE-2025-68795 CVE-2025-68796 CVE-2025-68797 CVE-2025-68799 CVE-2025-68800 CVE-2025-68801 CVE-2025-68803 CVE-2025-68804 CVE-2025-68808 CVE-2025-68813 CVE-2025-68815 CVE-2025-68816 CVE-2025-68818 CVE-2025-68819 CVE-2025-68820 CVE-2025-71064 CVE-2025-71066 CVE-2025-71069 CVE-2025-71075 CVE-2025-71077 CVE-2025-71079 CVE-2025-71084 CVE-2025-71085 CVE-2025-71086 CVE-2025-71087 CVE-2025-71091 CVE-2025-71093 CVE-2025-71096 CVE-2025-71097 CVE-2025-71098 CVE-2025-71102 CVE-2025-71104 CVE-2025-71105 CVE-2025-71108 CVE-2025-71111 CVE-2025-71112 CVE-2025-71113 CVE-2025-71114 CVE-2025-71116 CVE-2025-71118 CVE-2025-71120 CVE-2025-71123 CVE-2025-71125 CVE-2025-71127 CVE-2025-71131 CVE-2025-71136 CVE-2025-71137 CVE-2025-71154 CVE-2025-71162 CVE-2025-71182 CVE-2025-71185 CVE-2025-71186 CVE-2025-71190 CVE-2025-71191 CVE-2025-71194 CVE-2025-71196 CVE-2025-71197 CVE-2025-71199 CVE-2026-22976 CVE-2026-22977 CVE-2026-22978 CVE-2026-22980 CVE-2026-22990 CVE-2026-22991 CVE-2026-22997 CVE-2026-22998 CVE-2026-22999 CVE-2026-23001 CVE-2026-23003 CVE-2026-23011 CVE-2026-23020 CVE-2026-23021 CVE-2026-23033 CVE-2026-23038 CVE-2026-23047 CVE-2026-23049 CVE-2026-23056 CVE-2026-23058 CVE-2026-23060 CVE-2026-23061 CVE-2026-23063 CVE-2026-23064 CVE-2026-23071 CVE-2026-23073 CVE-2026-23074 CVE-2026-23075 CVE-2026-23076 CVE-2026-23080 CVE-2026-23083 CVE-2026-23084 CVE-2026-23085 CVE-2026-23087 CVE-2026-23089 CVE-2026-23090 CVE-2026-23091 CVE-2026-23095 CVE-2026-23096 CVE-2026-23097 CVE-2026-23098 CVE-2026-23101 CVE-2026-23103 CVE-2026-23105 CVE-2026-23108 CVE-2026-23110 Debian 錯誤:1122193 1123750

在 Linux 核心中發現數個弱點,這些弱點可能會導致特權提升、拒絕服務或資訊洩漏。

針對 Debian 11 Bullseye,已在 5.10.249-1 版本中修正這些問題。此更新還可修正報告給 Debian 的多個錯誤,
此外它還包含來自穩定更新 5.10.248 和 5.10.249的更多錯誤修正。

建議您升級 linux 套件。

如需有關 linux 安全性狀態的詳細資訊,請參閱其安全追蹤頁面:
https://security-tracker.debian.org/tracker/linux

有關 Debian LTS 安全公告、如何將這些更新套用至您的系統以及常見問題的詳細資訊,請參閱:https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP signature

Tenable 已直接從 Debian 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 ata-modules-5.10.0-35-armmp-di 套件。

另請參閱

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2022-48744

https://security-tracker.debian.org/tracker/CVE-2022-49168

https://security-tracker.debian.org/tracker/CVE-2022-49465

https://security-tracker.debian.org/tracker/CVE-2022-49711

https://security-tracker.debian.org/tracker/CVE-2022-49743

https://security-tracker.debian.org/tracker/CVE-2023-52975

https://security-tracker.debian.org/tracker/CVE-2023-54207

https://security-tracker.debian.org/tracker/CVE-2023-54321

https://security-tracker.debian.org/tracker/CVE-2024-36903

https://security-tracker.debian.org/tracker/CVE-2024-36927

https://security-tracker.debian.org/tracker/CVE-2025-22022

https://security-tracker.debian.org/tracker/CVE-2025-22121

https://security-tracker.debian.org/tracker/CVE-2025-37830

https://security-tracker.debian.org/tracker/CVE-2025-38022

https://security-tracker.debian.org/tracker/CVE-2025-38119

https://security-tracker.debian.org/tracker/CVE-2025-38556

https://security-tracker.debian.org/tracker/CVE-2025-38591

https://security-tracker.debian.org/tracker/CVE-2025-39702

https://security-tracker.debian.org/tracker/CVE-2025-40110

https://security-tracker.debian.org/tracker/CVE-2025-40215

https://security-tracker.debian.org/tracker/CVE-2025-68211

https://security-tracker.debian.org/tracker/CVE-2025-68255

https://security-tracker.debian.org/tracker/CVE-2025-68257

https://security-tracker.debian.org/tracker/CVE-2025-68258

https://security-tracker.debian.org/tracker/CVE-2025-68261

https://security-tracker.debian.org/tracker/CVE-2025-68264

https://security-tracker.debian.org/tracker/CVE-2025-68266

https://security-tracker.debian.org/tracker/CVE-2025-68282

https://security-tracker.debian.org/tracker/CVE-2025-68325

https://security-tracker.debian.org/tracker/CVE-2025-68332

https://security-tracker.debian.org/tracker/CVE-2025-68336

https://security-tracker.debian.org/tracker/CVE-2025-68337

https://security-tracker.debian.org/tracker/CVE-2025-68344

https://security-tracker.debian.org/tracker/CVE-2025-68346

https://security-tracker.debian.org/tracker/CVE-2025-68349

https://security-tracker.debian.org/tracker/CVE-2025-68354

https://security-tracker.debian.org/tracker/CVE-2025-68362

https://security-tracker.debian.org/tracker/CVE-2025-68364

https://security-tracker.debian.org/tracker/CVE-2025-68366

https://security-tracker.debian.org/tracker/CVE-2025-68367

https://security-tracker.debian.org/tracker/CVE-2025-68372

https://security-tracker.debian.org/tracker/CVE-2025-68724

https://security-tracker.debian.org/tracker/CVE-2025-68725

https://security-tracker.debian.org/tracker/CVE-2025-68733

https://security-tracker.debian.org/tracker/CVE-2025-68740

https://security-tracker.debian.org/tracker/CVE-2025-68757

https://security-tracker.debian.org/tracker/CVE-2025-68758

https://security-tracker.debian.org/tracker/CVE-2025-68759

https://security-tracker.debian.org/tracker/CVE-2025-68764

https://security-tracker.debian.org/tracker/CVE-2025-68767

https://security-tracker.debian.org/tracker/CVE-2025-68769

https://security-tracker.debian.org/tracker/CVE-2025-68771

https://security-tracker.debian.org/tracker/CVE-2025-68773

https://security-tracker.debian.org/tracker/CVE-2025-68774

https://security-tracker.debian.org/tracker/CVE-2025-68776

https://security-tracker.debian.org/tracker/CVE-2025-68777

https://security-tracker.debian.org/tracker/CVE-2025-68782

https://security-tracker.debian.org/tracker/CVE-2025-68783

https://security-tracker.debian.org/tracker/CVE-2025-68785

https://security-tracker.debian.org/tracker/CVE-2025-68787

https://security-tracker.debian.org/tracker/CVE-2025-68788

https://security-tracker.debian.org/tracker/CVE-2025-68795

https://security-tracker.debian.org/tracker/CVE-2025-68796

https://security-tracker.debian.org/tracker/CVE-2025-68797

https://security-tracker.debian.org/tracker/CVE-2025-68799

https://security-tracker.debian.org/tracker/CVE-2025-68800

https://security-tracker.debian.org/tracker/CVE-2025-68801

https://security-tracker.debian.org/tracker/CVE-2025-68803

https://security-tracker.debian.org/tracker/CVE-2025-68804

https://security-tracker.debian.org/tracker/CVE-2025-68808

https://security-tracker.debian.org/tracker/CVE-2025-68813

https://security-tracker.debian.org/tracker/CVE-2025-68815

https://security-tracker.debian.org/tracker/CVE-2025-68816

https://security-tracker.debian.org/tracker/CVE-2025-68818

https://security-tracker.debian.org/tracker/CVE-2025-68819

https://security-tracker.debian.org/tracker/CVE-2025-68820

https://security-tracker.debian.org/tracker/CVE-2025-71064

https://security-tracker.debian.org/tracker/CVE-2025-71066

https://security-tracker.debian.org/tracker/CVE-2025-71069

https://security-tracker.debian.org/tracker/CVE-2025-71075

https://security-tracker.debian.org/tracker/CVE-2025-71077

https://security-tracker.debian.org/tracker/CVE-2025-71079

https://security-tracker.debian.org/tracker/CVE-2025-71084

https://security-tracker.debian.org/tracker/CVE-2025-71085

https://security-tracker.debian.org/tracker/CVE-2025-71086

https://security-tracker.debian.org/tracker/CVE-2025-71087

https://security-tracker.debian.org/tracker/CVE-2025-71091

https://security-tracker.debian.org/tracker/CVE-2025-71093

https://security-tracker.debian.org/tracker/CVE-2025-71096

https://security-tracker.debian.org/tracker/CVE-2025-71097

https://security-tracker.debian.org/tracker/CVE-2025-71098

https://security-tracker.debian.org/tracker/CVE-2025-71102

https://security-tracker.debian.org/tracker/CVE-2025-71104

https://security-tracker.debian.org/tracker/CVE-2025-71105

https://security-tracker.debian.org/tracker/CVE-2025-71108

https://security-tracker.debian.org/tracker/CVE-2025-71111

https://security-tracker.debian.org/tracker/CVE-2025-71112

https://security-tracker.debian.org/tracker/CVE-2025-71113

https://security-tracker.debian.org/tracker/CVE-2025-71114

https://security-tracker.debian.org/tracker/CVE-2025-71116

https://security-tracker.debian.org/tracker/CVE-2025-71118

https://security-tracker.debian.org/tracker/CVE-2025-71120

https://security-tracker.debian.org/tracker/CVE-2025-71123

https://security-tracker.debian.org/tracker/CVE-2025-71125

https://security-tracker.debian.org/tracker/CVE-2025-71127

https://security-tracker.debian.org/tracker/CVE-2025-71131

https://security-tracker.debian.org/tracker/CVE-2025-71136

https://security-tracker.debian.org/tracker/CVE-2025-71137

https://security-tracker.debian.org/tracker/CVE-2025-71154

https://security-tracker.debian.org/tracker/CVE-2025-71162

https://security-tracker.debian.org/tracker/CVE-2025-71182

https://security-tracker.debian.org/tracker/CVE-2025-71185

https://security-tracker.debian.org/tracker/CVE-2025-71186

https://security-tracker.debian.org/tracker/CVE-2025-71190

https://security-tracker.debian.org/tracker/CVE-2025-71191

https://security-tracker.debian.org/tracker/CVE-2025-71194

https://security-tracker.debian.org/tracker/CVE-2025-71196

https://security-tracker.debian.org/tracker/CVE-2025-71197

https://security-tracker.debian.org/tracker/CVE-2025-71199

https://security-tracker.debian.org/tracker/CVE-2026-22976

https://security-tracker.debian.org/tracker/CVE-2026-22977

https://security-tracker.debian.org/tracker/CVE-2026-22978

https://security-tracker.debian.org/tracker/CVE-2026-22980

https://security-tracker.debian.org/tracker/CVE-2026-22990

https://security-tracker.debian.org/tracker/CVE-2026-22991

https://security-tracker.debian.org/tracker/CVE-2026-22997

https://security-tracker.debian.org/tracker/CVE-2026-22998

https://security-tracker.debian.org/tracker/CVE-2026-22999

https://security-tracker.debian.org/tracker/CVE-2026-23001

https://security-tracker.debian.org/tracker/CVE-2026-23003

https://security-tracker.debian.org/tracker/CVE-2026-23011

https://security-tracker.debian.org/tracker/CVE-2026-23020

https://security-tracker.debian.org/tracker/CVE-2026-23021

https://security-tracker.debian.org/tracker/CVE-2026-23033

https://security-tracker.debian.org/tracker/CVE-2026-23038

https://security-tracker.debian.org/tracker/CVE-2026-23047

https://security-tracker.debian.org/tracker/CVE-2026-23049

https://security-tracker.debian.org/tracker/CVE-2026-23056

https://security-tracker.debian.org/tracker/CVE-2026-23058

https://security-tracker.debian.org/tracker/CVE-2026-23060

https://security-tracker.debian.org/tracker/CVE-2026-23061

https://security-tracker.debian.org/tracker/CVE-2026-23063

https://security-tracker.debian.org/tracker/CVE-2026-23064

https://security-tracker.debian.org/tracker/CVE-2026-23071

https://security-tracker.debian.org/tracker/CVE-2026-23073

https://security-tracker.debian.org/tracker/CVE-2026-23074

https://security-tracker.debian.org/tracker/CVE-2026-23075

https://security-tracker.debian.org/tracker/CVE-2026-23076

https://security-tracker.debian.org/tracker/CVE-2026-23080

https://security-tracker.debian.org/tracker/CVE-2026-23083

https://security-tracker.debian.org/tracker/CVE-2026-23084

https://security-tracker.debian.org/tracker/CVE-2026-23085

https://security-tracker.debian.org/tracker/CVE-2026-23087

https://security-tracker.debian.org/tracker/CVE-2026-23089

https://security-tracker.debian.org/tracker/CVE-2026-23090

https://security-tracker.debian.org/tracker/CVE-2026-23091

https://security-tracker.debian.org/tracker/CVE-2026-23095

https://security-tracker.debian.org/tracker/CVE-2026-23096

https://security-tracker.debian.org/tracker/CVE-2026-23097

https://security-tracker.debian.org/tracker/CVE-2026-23098

https://security-tracker.debian.org/tracker/CVE-2026-23101

https://security-tracker.debian.org/tracker/CVE-2026-23103

https://security-tracker.debian.org/tracker/CVE-2026-23105

https://security-tracker.debian.org/tracker/CVE-2026-23108

https://security-tracker.debian.org/tracker/CVE-2026-23110

https://packages.debian.org/source/bullseye/linux

Plugin 詳細資訊

嚴重性: High

ID: 298680

檔案名稱: debian_DLA-4475.nasl

版本: 1.1

類型: local

代理程式: unix

已發布: 2026/2/11

已更新: 2026/2/11

支援的感應器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

風險資訊

VPR

風險因素: High

分數: 7.4

CVSS v2

風險因素: Medium

基本分數: 6.8

時間性分數: 5.3

媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2025-38022

CVSS v3

風險因素: High

基本分數: 7.8

時間性分數: 7

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-37-armmp-di, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-amd64, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-armmp, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-arm64, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-i386-signed-template, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-perf, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-arm, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-arm64, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:bpftool, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-686-pae-dbg, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-dbg, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-35, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-rt-armmp, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-source, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-x86, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686-pae, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-dbg, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common-rt, p-cpe:/a:debian:debian_linux:linux-doc, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-arm64-dbg, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-686-pae, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-dbg, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-armmp-lpae, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-dbg, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-36-armmp-di

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2026/2/10

弱點發布日期: 2022/11/15

參考資訊

CVE: CVE-2022-48744, CVE-2022-49168, CVE-2022-49465, CVE-2022-49711, CVE-2022-49743, CVE-2023-52975, CVE-2023-54207, CVE-2023-54321, CVE-2024-36903, CVE-2024-36927, CVE-2025-22022, CVE-2025-22121, CVE-2025-37830, CVE-2025-38022, CVE-2025-38119, CVE-2025-38556, CVE-2025-38591, CVE-2025-39702, CVE-2025-40110, CVE-2025-40215, CVE-2025-68211, CVE-2025-68255, CVE-2025-68257, CVE-2025-68258, CVE-2025-68261, CVE-2025-68264, CVE-2025-68266, CVE-2025-68282, CVE-2025-68325, CVE-2025-68332, CVE-2025-68336, CVE-2025-68337, CVE-2025-68344, CVE-2025-68346, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68364, CVE-2025-68366, CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68725, CVE-2025-68733, CVE-2025-68740, CVE-2025-68757, CVE-2025-68758, CVE-2025-68759, CVE-2025-68764, CVE-2025-68767, CVE-2025-68769, CVE-2025-68771, CVE-2025-68773, CVE-2025-68774, CVE-2025-68776, CVE-2025-68777, CVE-2025-68782, CVE-2025-68783, CVE-2025-68785, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795, CVE-2025-68796, CVE-2025-68797, CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68808, CVE-2025-68813, CVE-2025-68815, CVE-2025-68816, CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-71064, CVE-2025-71066, CVE-2025-71069, CVE-2025-71075, CVE-2025-71077, CVE-2025-71079, CVE-2025-71084, CVE-2025-71085, CVE-2025-71086, CVE-2025-71087, CVE-2025-71091, CVE-2025-71093, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098, CVE-2025-71102, CVE-2025-71104, CVE-2025-71105, CVE-2025-71108, CVE-2025-71111, CVE-2025-71112, CVE-2025-71113, CVE-2025-71114, CVE-2025-71116, CVE-2025-71118, CVE-2025-71120, CVE-2025-71123, CVE-2025-71125, CVE-2025-71127, CVE-2025-71131, CVE-2025-71136, CVE-2025-71137, CVE-2025-71154, CVE-2025-71162, CVE-2025-71182, CVE-2025-71185, CVE-2025-71186, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22980, CVE-2026-22990, CVE-2026-22991, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23020, CVE-2026-23021, CVE-2026-23033, CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058, CVE-2026-23060, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071, CVE-2026-23073, CVE-2026-23074, CVE-2026-23075, CVE-2026-23076, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23110