Language:
https://packages.debian.org/source/stretch/linux
https://security-tracker.debian.org/tracker/CVE-2020-24586
https://security-tracker.debian.org/tracker/CVE-2020-24587
https://security-tracker.debian.org/tracker/CVE-2020-24588
https://security-tracker.debian.org/tracker/CVE-2020-25670
https://security-tracker.debian.org/tracker/CVE-2020-25671
https://security-tracker.debian.org/tracker/CVE-2020-25672
https://security-tracker.debian.org/tracker/CVE-2020-26139
https://security-tracker.debian.org/tracker/CVE-2020-26147
https://security-tracker.debian.org/tracker/CVE-2020-26558
https://security-tracker.debian.org/tracker/CVE-2020-29374
https://security-tracker.debian.org/tracker/CVE-2020-36322
https://security-tracker.debian.org/tracker/CVE-2021-0129
https://security-tracker.debian.org/tracker/CVE-2021-20292
https://security-tracker.debian.org/tracker/CVE-2021-23133
https://security-tracker.debian.org/tracker/CVE-2021-23134
https://security-tracker.debian.org/tracker/CVE-2021-26930
https://security-tracker.debian.org/tracker/CVE-2021-28660
https://security-tracker.debian.org/tracker/CVE-2021-28688
https://security-tracker.debian.org/tracker/CVE-2021-28950
https://security-tracker.debian.org/tracker/CVE-2021-28964
https://security-tracker.debian.org/tracker/CVE-2021-28971
https://security-tracker.debian.org/tracker/CVE-2021-29154
https://security-tracker.debian.org/tracker/CVE-2021-29265
https://security-tracker.debian.org/tracker/CVE-2021-29647
https://security-tracker.debian.org/tracker/CVE-2021-29650
https://security-tracker.debian.org/tracker/CVE-2021-30002
https://security-tracker.debian.org/tracker/CVE-2021-31916
https://security-tracker.debian.org/tracker/CVE-2021-32399
https://security-tracker.debian.org/tracker/CVE-2021-33034
https://security-tracker.debian.org/tracker/CVE-2021-3428
https://security-tracker.debian.org/tracker/CVE-2021-3483
https://security-tracker.debian.org/tracker/CVE-2021-3564
https://security-tracker.debian.org/tracker/CVE-2021-3573
https://security-tracker.debian.org/tracker/CVE-2021-3587
https://security-tracker.debian.org/tracker/source-package/linux
深刻度: High
ID: 150985
ファイル名: debian_DLA-2689.nasl
バージョン: 1.8
タイプ: local
エージェント: unix
ファミリー: Debian Local Security Checks
公開日: 2021/6/24
更新日: 2025/9/24
サポートされているセンサー: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: High
スコア: 7.4
リスクファクター: High
基本値: 8.3
現状値: 6.5
ベクトル: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2021-28660
リスクファクター: High
基本値: 8.8
現状値: 7.9
ベクトル: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:debian:debian_linux:9.0, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:libusbip-dev, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:linux-source-4.9, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-arm, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-6-x86, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-686, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-all, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-all-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-marvell, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-686, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-marvell, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-doc-4.9, p-cpe:/a:debian:debian_linux:linux-kbuild-4.9, p-cpe:/a:debian:debian_linux:linux-manual-4.9, p-cpe:/a:debian:debian_linux:linux-perf-4.9, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-common, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.9.0-14-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-amd64, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-4.9.0-14-marvell-dbg, p-cpe:/a:debian:debian_linux:linux-support-4.9.0-14
必要な KB アイテム: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2021/6/22
脆弱性公開日: 2020/11/28
CVE: CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-26139, CVE-2020-26147, CVE-2020-26558, CVE-2020-29374, CVE-2020-36322, CVE-2021-0129, CVE-2021-20292, CVE-2021-23133, CVE-2021-23134, CVE-2021-26930, CVE-2021-28660, CVE-2021-28688, CVE-2021-28950, CVE-2021-28964, CVE-2021-28971, CVE-2021-29154, CVE-2021-29265, CVE-2021-29647, CVE-2021-29650, CVE-2021-30002, CVE-2021-31916, CVE-2021-32399, CVE-2021-33034, CVE-2021-3428, CVE-2021-3483, CVE-2021-3564, CVE-2021-3573