Debian dla-3840 : hyperv-daemons - セキュリティ更新

high Nessus プラグイン ID 201099

概要

リモートの Debian ホストにセキュリティ関連の更新プログラムがありません。

説明

リモートの Debian 10 ホストには、dla-3840 のアドバイザリに記載された複数の脆弱性の影響を受けるパッケージがインストールされています。

------------------------------------------------------------------------- Debian LTS アドバイザリ DLA-3840-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2024 年 6 月 25 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

パッケージ : linux バージョン : 4.19.316-1 CVE ID : CVE-2021-33630 CVE-2022-48627 CVE-2023-0386 CVE-2023-6040 CVE-2023-6270 CVE-2023-7042 CVE-2023-46838 CVE-2023-47233 CVE-2023-52340 CVE-2023-52429 CVE-2023-52436 CVE-2023-52439 CVE-2023-52443 CVE-2023-52444 CVE-2023-52445 CVE-2023-52449 CVE-2023-52464 CVE-2023-52469 CVE-2023-52470 CVE-2023-52486 CVE-2023-52583 CVE-2023-52587 CVE-2023-52594 CVE-2023-52599 CVE-2023-52600 CVE-2023-52601 CVE-2023-52602 CVE-2023-52603 CVE-2023-52604 CVE-2023-52609 CVE-2023-52612 CVE-2023-52615 CVE-2023-52619 CVE-2023-52620 CVE-2023-52622 CVE-2023-52623 CVE-2023-52628 CVE-2023-52644 CVE-2023-52650 CVE-2023-52670 CVE-2023-52679 CVE-2023-52683 CVE-2023-52691 CVE-2023-52693 CVE-2023-52698 CVE-2023-52699 CVE-2023-52880 CVE-2024-0340 CVE-2024-0607 CVE-2024-1086 CVE-2024-22099 CVE-2024-23849 CVE-2024-23851 CVE-2024-24857 CVE-2024-24858 CVE-2024-24861 CVE-2024-25739 CVE-2024-26597 CVE-2024-26600 CVE-2024-26602 CVE-2024-26606 CVE-2024-26615 CVE-2024-26625 CVE-2024-26633 CVE-2024-26635 CVE-2024-26636 CVE-2024-26642 CVE-2024-26645 CVE-2024-26651 CVE-2024-26663 CVE-2024-26664 CVE-2024-26671 CVE-2024-26675 CVE-2024-26679 CVE-2024-26685 CVE-2024-26696 CVE-2024-26697 CVE-2024-26704 CVE-2024-26720 CVE-2024-26722 CVE-2024-26735 CVE-2024-26744 CVE-2024-26752 CVE-2024-26754 CVE-2024-26763 CVE-2024-26764 CVE-2024-26766 CVE-2024-26772 CVE-2024-26773 CVE-2024-26777 CVE-2024-26778 CVE-2024-26779 CVE-2024-26791 CVE-2024-26793 CVE-2024-26801 CVE-2024-26805 CVE-2024-26816 CVE-2024-26817 CVE-2024-26820 CVE-2024-26825 CVE-2024-26839 CVE-2024-26840 CVE-2024-26845 CVE-2024-26851 CVE-2024-26852 CVE-2024-26857 CVE-2024-26859 CVE-2024-26863 CVE-2024-26874 CVE-2024-26875 CVE-2024-26878 CVE-2024-26880 CVE-2024-26883 CVE-2024-26884 CVE-2024-26889 CVE-2024-26894 CVE-2024-26898 CVE-2024-26901 CVE-2024-26903 CVE-2024-26917 CVE-2024-26922 CVE-2024-26923 CVE-2024-26931 CVE-2024-26934 CVE-2024-26955 CVE-2024-26956 CVE-2024-26965 CVE-2024-26966 CVE-2024-26969 CVE-2024-26973 CVE-2024-26974 CVE-2024-26976 CVE-2024-26981 CVE-2024-26984 CVE-2024-26993 CVE-2024-26994 CVE-2024-26997 CVE-2024-27001 CVE-2024-27008 CVE-2024-27013 CVE-2024-27020 CVE-2024-27024 CVE-2024-27028 CVE-2024-27043 CVE-2024-27046 CVE-2024-27059 CVE-2024-27074 CVE-2024-27075 CVE-2024-27077 CVE-2024-27078 CVE-2024-27388 CVE-2024-27395 CVE-2024-27396 CVE-2024-27398 CVE-2024-27399 CVE-2024-27401 CVE-2024-27405 CVE-2024-27410 CVE-2024-27412 CVE-2024-27413 CVE-2024-27416 CVE-2024-27419 CVE-2024-27436 CVE-2024-31076 CVE-2024-33621 CVE-2024-35789 CVE-2024-35806 CVE-2024-35807 CVE-2024-35809 CVE-2024-35811 CVE-2024-35815 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35823 CVE-2024-35825 CVE-2024-35828 CVE-2024-35830 CVE-2024-35835 CVE-2024-35847 CVE-2024-35849 CVE-2024-35877 CVE-2024-35886 CVE-2024-35888 CVE-2024-35893 CVE-2024-35898 CVE-2024-35902 CVE-2024-35910 CVE-2024-35915 CVE-2024-35922 CVE-2024-35925 CVE-2024-35930 CVE-2024-35933 CVE-2024-35935 CVE-2024-35936 CVE-2024-35944 CVE-2024-35947 CVE-2024-35955 CVE-2024-35960 CVE-2024-35969 CVE-2024-35973 CVE-2024-35978 CVE-2024-35982 CVE-2024-35984 CVE-2024-35997 CVE-2024-36004 CVE-2024-36014 CVE-2024-36015 CVE-2024-36016 CVE-2024-36017 CVE-2024-36020 CVE-2024-36286 CVE-2024-36288 CVE-2024-36883 CVE-2024-36886 CVE-2024-36902 CVE-2024-36904 CVE-2024-36905 CVE-2024-36919 CVE-2024-36933 CVE-2024-36934 CVE-2024-36940 CVE-2024-36941 CVE-2024-36946 CVE-2024-36950 CVE-2024-36954 CVE-2024-36959 CVE-2024-36960 CVE-2024-36964 CVE-2024-36971 CVE-2024-37353 CVE-2024-37356 CVE-2024-38381 CVE-2024-38549 CVE-2024-38552 CVE-2024-38558 CVE-2024-38559 CVE-2024-38560 CVE-2024-38565 CVE-2024-38567 CVE-2024-38578 CVE-2024-38579 CVE-2024-38582 CVE-2024-38583 CVE-2024-38587 CVE-2024-38589 CVE-2024-38596 CVE-2024-38598 CVE-2024-38599 CVE-2024-38601 CVE-2024-38612 CVE-2024-38618 CVE-2024-38621 CVE-2024-38627 CVE-2024-38633 CVE-2024-38634 CVE-2024-38637 CVE-2024-38659 CVE-2024-38780 CVE-2024-39292

Linux カーネルに、権限昇格、サービス拒否、または情報漏洩を引き起こす可能性がある、複数の脆弱性が発見されました。

Debian 10 buster では、これらの問題はバージョン 4.19.316-1で修正されています。

お使いの linux パッケージをアップグレードすることを推奨します。

linux の詳細なセキュリティステータスについては、そのセキュリティトラッカーページを参照してください:
https://security-tracker.debian.org/tracker/linux

Debian LTS セキュリティアドバイザリに関する詳細、これらの更新をシステムに適用する方法、およびよくある質問については、こちらを参照してください。https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP 署名

Tenable は、前述の説明ブロックを Debian セキュリティアドバイザリから直接抽出しました。

Nessus はこれらの問題をテストしておらず、代わりにアプリケーションが自己報告するバージョン番号にのみ依存していることに注意してください。

ソリューション

hyperv-daemons パッケージをアップグレードしてください。

参考資料

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2021-33630

https://security-tracker.debian.org/tracker/CVE-2022-48627

https://security-tracker.debian.org/tracker/CVE-2023-0386

https://security-tracker.debian.org/tracker/CVE-2023-46838

https://security-tracker.debian.org/tracker/CVE-2023-47233

https://security-tracker.debian.org/tracker/CVE-2023-52340

https://security-tracker.debian.org/tracker/CVE-2023-52429

https://security-tracker.debian.org/tracker/CVE-2023-52436

https://security-tracker.debian.org/tracker/CVE-2023-52439

https://security-tracker.debian.org/tracker/CVE-2023-52443

https://security-tracker.debian.org/tracker/CVE-2023-52444

https://security-tracker.debian.org/tracker/CVE-2023-52445

https://security-tracker.debian.org/tracker/CVE-2023-52449

https://security-tracker.debian.org/tracker/CVE-2023-52464

https://security-tracker.debian.org/tracker/CVE-2023-52469

https://security-tracker.debian.org/tracker/CVE-2023-52470

https://security-tracker.debian.org/tracker/CVE-2023-52486

https://security-tracker.debian.org/tracker/CVE-2023-52583

https://security-tracker.debian.org/tracker/CVE-2023-52587

https://security-tracker.debian.org/tracker/CVE-2023-52594

https://security-tracker.debian.org/tracker/CVE-2023-52599

https://security-tracker.debian.org/tracker/CVE-2023-52600

https://security-tracker.debian.org/tracker/CVE-2023-52601

https://security-tracker.debian.org/tracker/CVE-2023-52602

https://security-tracker.debian.org/tracker/CVE-2023-52603

https://security-tracker.debian.org/tracker/CVE-2023-52604

https://security-tracker.debian.org/tracker/CVE-2023-52609

https://security-tracker.debian.org/tracker/CVE-2023-52612

https://security-tracker.debian.org/tracker/CVE-2023-52615

https://security-tracker.debian.org/tracker/CVE-2023-52619

https://security-tracker.debian.org/tracker/CVE-2023-52620

https://security-tracker.debian.org/tracker/CVE-2023-52622

https://security-tracker.debian.org/tracker/CVE-2023-52623

https://security-tracker.debian.org/tracker/CVE-2023-52628

https://security-tracker.debian.org/tracker/CVE-2023-52644

https://security-tracker.debian.org/tracker/CVE-2023-52650

https://security-tracker.debian.org/tracker/CVE-2023-52670

https://security-tracker.debian.org/tracker/CVE-2023-52679

https://security-tracker.debian.org/tracker/CVE-2023-52683

https://security-tracker.debian.org/tracker/CVE-2023-52691

https://security-tracker.debian.org/tracker/CVE-2023-52693

https://security-tracker.debian.org/tracker/CVE-2023-52698

https://security-tracker.debian.org/tracker/CVE-2023-52699

https://security-tracker.debian.org/tracker/CVE-2023-52880

https://security-tracker.debian.org/tracker/CVE-2023-6040

https://security-tracker.debian.org/tracker/CVE-2023-6270

https://security-tracker.debian.org/tracker/CVE-2023-7042

https://security-tracker.debian.org/tracker/CVE-2024-0340

https://security-tracker.debian.org/tracker/CVE-2024-0607

https://security-tracker.debian.org/tracker/CVE-2024-1086

https://security-tracker.debian.org/tracker/CVE-2024-22099

https://security-tracker.debian.org/tracker/CVE-2024-23849

https://security-tracker.debian.org/tracker/CVE-2024-23851

https://security-tracker.debian.org/tracker/CVE-2024-24857

https://security-tracker.debian.org/tracker/CVE-2024-24858

https://security-tracker.debian.org/tracker/CVE-2024-24861

https://security-tracker.debian.org/tracker/CVE-2024-25739

https://security-tracker.debian.org/tracker/CVE-2024-26597

https://security-tracker.debian.org/tracker/CVE-2024-26600

https://security-tracker.debian.org/tracker/CVE-2024-26602

https://security-tracker.debian.org/tracker/CVE-2024-26606

https://security-tracker.debian.org/tracker/CVE-2024-26615

https://security-tracker.debian.org/tracker/CVE-2024-26625

https://security-tracker.debian.org/tracker/CVE-2024-26633

https://security-tracker.debian.org/tracker/CVE-2024-26635

https://security-tracker.debian.org/tracker/CVE-2024-26636

https://security-tracker.debian.org/tracker/CVE-2024-26642

https://security-tracker.debian.org/tracker/CVE-2024-26645

https://security-tracker.debian.org/tracker/CVE-2024-26651

https://security-tracker.debian.org/tracker/CVE-2024-26663

https://security-tracker.debian.org/tracker/CVE-2024-26664

https://security-tracker.debian.org/tracker/CVE-2024-26671

https://security-tracker.debian.org/tracker/CVE-2024-26675

https://security-tracker.debian.org/tracker/CVE-2024-26679

https://security-tracker.debian.org/tracker/CVE-2024-26685

https://security-tracker.debian.org/tracker/CVE-2024-26696

https://security-tracker.debian.org/tracker/CVE-2024-26697

https://security-tracker.debian.org/tracker/CVE-2024-26704

https://security-tracker.debian.org/tracker/CVE-2024-26720

https://security-tracker.debian.org/tracker/CVE-2024-26722

https://security-tracker.debian.org/tracker/CVE-2024-26735

https://security-tracker.debian.org/tracker/CVE-2024-26744

https://security-tracker.debian.org/tracker/CVE-2024-26752

https://security-tracker.debian.org/tracker/CVE-2024-26754

https://security-tracker.debian.org/tracker/CVE-2024-26763

https://security-tracker.debian.org/tracker/CVE-2024-26764

https://security-tracker.debian.org/tracker/CVE-2024-26766

https://security-tracker.debian.org/tracker/CVE-2024-26772

https://security-tracker.debian.org/tracker/CVE-2024-26773

https://security-tracker.debian.org/tracker/CVE-2024-26777

https://security-tracker.debian.org/tracker/CVE-2024-26778

https://security-tracker.debian.org/tracker/CVE-2024-26779

https://security-tracker.debian.org/tracker/CVE-2024-26791

https://security-tracker.debian.org/tracker/CVE-2024-26793

https://security-tracker.debian.org/tracker/CVE-2024-26801

https://security-tracker.debian.org/tracker/CVE-2024-26805

https://security-tracker.debian.org/tracker/CVE-2024-26816

https://security-tracker.debian.org/tracker/CVE-2024-26817

https://security-tracker.debian.org/tracker/CVE-2024-26820

https://security-tracker.debian.org/tracker/CVE-2024-26825

https://security-tracker.debian.org/tracker/CVE-2024-26839

https://security-tracker.debian.org/tracker/CVE-2024-26840

https://security-tracker.debian.org/tracker/CVE-2024-26845

https://security-tracker.debian.org/tracker/CVE-2024-26851

https://security-tracker.debian.org/tracker/CVE-2024-26852

https://security-tracker.debian.org/tracker/CVE-2024-26857

https://security-tracker.debian.org/tracker/CVE-2024-26859

https://security-tracker.debian.org/tracker/CVE-2024-26863

https://security-tracker.debian.org/tracker/CVE-2024-26874

https://security-tracker.debian.org/tracker/CVE-2024-26875

https://security-tracker.debian.org/tracker/CVE-2024-26878

https://security-tracker.debian.org/tracker/CVE-2024-26880

https://security-tracker.debian.org/tracker/CVE-2024-26883

https://security-tracker.debian.org/tracker/CVE-2024-26884

https://security-tracker.debian.org/tracker/CVE-2024-26889

https://security-tracker.debian.org/tracker/CVE-2024-26894

https://security-tracker.debian.org/tracker/CVE-2024-26898

https://security-tracker.debian.org/tracker/CVE-2024-26901

https://security-tracker.debian.org/tracker/CVE-2024-26903

https://security-tracker.debian.org/tracker/CVE-2024-26917

https://security-tracker.debian.org/tracker/CVE-2024-26922

https://security-tracker.debian.org/tracker/CVE-2024-26923

https://security-tracker.debian.org/tracker/CVE-2024-26931

https://security-tracker.debian.org/tracker/CVE-2024-26934

https://security-tracker.debian.org/tracker/CVE-2024-26955

https://security-tracker.debian.org/tracker/CVE-2024-26956

https://security-tracker.debian.org/tracker/CVE-2024-26965

https://security-tracker.debian.org/tracker/CVE-2024-26966

https://security-tracker.debian.org/tracker/CVE-2024-26969

https://security-tracker.debian.org/tracker/CVE-2024-26973

https://security-tracker.debian.org/tracker/CVE-2024-26974

https://security-tracker.debian.org/tracker/CVE-2024-26976

https://security-tracker.debian.org/tracker/CVE-2024-26981

https://security-tracker.debian.org/tracker/CVE-2024-26984

https://security-tracker.debian.org/tracker/CVE-2024-26993

https://security-tracker.debian.org/tracker/CVE-2024-26994

https://security-tracker.debian.org/tracker/CVE-2024-26997

https://security-tracker.debian.org/tracker/CVE-2024-27001

https://security-tracker.debian.org/tracker/CVE-2024-27008

https://security-tracker.debian.org/tracker/CVE-2024-27013

https://security-tracker.debian.org/tracker/CVE-2024-27020

https://security-tracker.debian.org/tracker/CVE-2024-27024

https://security-tracker.debian.org/tracker/CVE-2024-27028

https://security-tracker.debian.org/tracker/CVE-2024-27043

https://security-tracker.debian.org/tracker/CVE-2024-27046

https://security-tracker.debian.org/tracker/CVE-2024-27059

https://security-tracker.debian.org/tracker/CVE-2024-27074

https://security-tracker.debian.org/tracker/CVE-2024-27075

https://security-tracker.debian.org/tracker/CVE-2024-27077

https://security-tracker.debian.org/tracker/CVE-2024-27078

https://security-tracker.debian.org/tracker/CVE-2024-27388

https://security-tracker.debian.org/tracker/CVE-2024-27395

https://security-tracker.debian.org/tracker/CVE-2024-27396

https://security-tracker.debian.org/tracker/CVE-2024-27398

https://security-tracker.debian.org/tracker/CVE-2024-27399

https://security-tracker.debian.org/tracker/CVE-2024-27401

https://security-tracker.debian.org/tracker/CVE-2024-27405

https://security-tracker.debian.org/tracker/CVE-2024-27410

https://security-tracker.debian.org/tracker/CVE-2024-27412

https://security-tracker.debian.org/tracker/CVE-2024-27413

https://security-tracker.debian.org/tracker/CVE-2024-27416

https://security-tracker.debian.org/tracker/CVE-2024-27419

https://security-tracker.debian.org/tracker/CVE-2024-27436

https://security-tracker.debian.org/tracker/CVE-2024-31076

https://security-tracker.debian.org/tracker/CVE-2024-33621

https://security-tracker.debian.org/tracker/CVE-2024-35789

https://security-tracker.debian.org/tracker/CVE-2024-35806

https://security-tracker.debian.org/tracker/CVE-2024-35807

https://security-tracker.debian.org/tracker/CVE-2024-35809

https://security-tracker.debian.org/tracker/CVE-2024-35811

https://security-tracker.debian.org/tracker/CVE-2024-35815

https://security-tracker.debian.org/tracker/CVE-2024-35819

https://security-tracker.debian.org/tracker/CVE-2024-35821

https://security-tracker.debian.org/tracker/CVE-2024-35822

https://security-tracker.debian.org/tracker/CVE-2024-35823

https://security-tracker.debian.org/tracker/CVE-2024-35825

https://security-tracker.debian.org/tracker/CVE-2024-35828

https://security-tracker.debian.org/tracker/CVE-2024-35830

https://security-tracker.debian.org/tracker/CVE-2024-35835

https://security-tracker.debian.org/tracker/CVE-2024-35847

https://security-tracker.debian.org/tracker/CVE-2024-35849

https://security-tracker.debian.org/tracker/CVE-2024-35877

https://security-tracker.debian.org/tracker/CVE-2024-35886

https://security-tracker.debian.org/tracker/CVE-2024-35888

https://security-tracker.debian.org/tracker/CVE-2024-35893

https://security-tracker.debian.org/tracker/CVE-2024-35898

https://security-tracker.debian.org/tracker/CVE-2024-35902

https://security-tracker.debian.org/tracker/CVE-2024-35910

https://security-tracker.debian.org/tracker/CVE-2024-35915

https://security-tracker.debian.org/tracker/CVE-2024-35922

https://security-tracker.debian.org/tracker/CVE-2024-35925

https://security-tracker.debian.org/tracker/CVE-2024-35930

https://security-tracker.debian.org/tracker/CVE-2024-35933

https://security-tracker.debian.org/tracker/CVE-2024-35935

https://security-tracker.debian.org/tracker/CVE-2024-35936

https://security-tracker.debian.org/tracker/CVE-2024-35944

https://security-tracker.debian.org/tracker/CVE-2024-35947

https://security-tracker.debian.org/tracker/CVE-2024-35955

https://security-tracker.debian.org/tracker/CVE-2024-35960

https://security-tracker.debian.org/tracker/CVE-2024-35969

https://security-tracker.debian.org/tracker/CVE-2024-35973

https://security-tracker.debian.org/tracker/CVE-2024-35978

https://security-tracker.debian.org/tracker/CVE-2024-35982

https://security-tracker.debian.org/tracker/CVE-2024-35984

https://security-tracker.debian.org/tracker/CVE-2024-35997

https://security-tracker.debian.org/tracker/CVE-2024-36004

https://security-tracker.debian.org/tracker/CVE-2024-36014

https://security-tracker.debian.org/tracker/CVE-2024-36015

https://security-tracker.debian.org/tracker/CVE-2024-36016

https://security-tracker.debian.org/tracker/CVE-2024-36017

https://security-tracker.debian.org/tracker/CVE-2024-36020

https://security-tracker.debian.org/tracker/CVE-2024-36286

https://security-tracker.debian.org/tracker/CVE-2024-36288

https://security-tracker.debian.org/tracker/CVE-2024-36883

https://security-tracker.debian.org/tracker/CVE-2024-36886

https://security-tracker.debian.org/tracker/CVE-2024-36902

https://security-tracker.debian.org/tracker/CVE-2024-36904

https://security-tracker.debian.org/tracker/CVE-2024-36905

https://security-tracker.debian.org/tracker/CVE-2024-36919

https://security-tracker.debian.org/tracker/CVE-2024-36933

https://security-tracker.debian.org/tracker/CVE-2024-36934

https://security-tracker.debian.org/tracker/CVE-2024-36940

https://security-tracker.debian.org/tracker/CVE-2024-36941

https://security-tracker.debian.org/tracker/CVE-2024-36946

https://security-tracker.debian.org/tracker/CVE-2024-36950

https://security-tracker.debian.org/tracker/CVE-2024-36954

https://security-tracker.debian.org/tracker/CVE-2024-36959

https://security-tracker.debian.org/tracker/CVE-2024-36960

https://security-tracker.debian.org/tracker/CVE-2024-36964

https://security-tracker.debian.org/tracker/CVE-2024-36971

https://security-tracker.debian.org/tracker/CVE-2024-37353

https://security-tracker.debian.org/tracker/CVE-2024-37356

https://security-tracker.debian.org/tracker/CVE-2024-38381

https://security-tracker.debian.org/tracker/CVE-2024-38549

https://security-tracker.debian.org/tracker/CVE-2024-38552

https://security-tracker.debian.org/tracker/CVE-2024-38558

https://security-tracker.debian.org/tracker/CVE-2024-38559

https://security-tracker.debian.org/tracker/CVE-2024-38560

https://security-tracker.debian.org/tracker/CVE-2024-38565

https://security-tracker.debian.org/tracker/CVE-2024-38567

https://security-tracker.debian.org/tracker/CVE-2024-38578

https://security-tracker.debian.org/tracker/CVE-2024-38579

https://security-tracker.debian.org/tracker/CVE-2024-38582

https://security-tracker.debian.org/tracker/CVE-2024-38583

https://security-tracker.debian.org/tracker/CVE-2024-38587

https://security-tracker.debian.org/tracker/CVE-2024-38589

https://security-tracker.debian.org/tracker/CVE-2024-38596

https://security-tracker.debian.org/tracker/CVE-2024-38598

https://security-tracker.debian.org/tracker/CVE-2024-38599

https://security-tracker.debian.org/tracker/CVE-2024-38601

https://security-tracker.debian.org/tracker/CVE-2024-38612

https://security-tracker.debian.org/tracker/CVE-2024-38618

https://security-tracker.debian.org/tracker/CVE-2024-38621

https://security-tracker.debian.org/tracker/CVE-2024-38627

https://security-tracker.debian.org/tracker/CVE-2024-38633

https://security-tracker.debian.org/tracker/CVE-2024-38634

https://security-tracker.debian.org/tracker/CVE-2024-38637

https://security-tracker.debian.org/tracker/CVE-2024-38659

https://security-tracker.debian.org/tracker/CVE-2024-38780

https://security-tracker.debian.org/tracker/CVE-2024-39292

https://packages.debian.org/source/buster/linux

プラグインの詳細

深刻度: High

ID: 201099

ファイル名: debian_DLA-3840.nasl

バージョン: 1.2

タイプ: local

エージェント: unix

公開日: 2024/6/27

更新日: 2024/6/28

サポートされているセンサー: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

リスク情報

VPR

リスクファクター: Critical

スコア: 9.6

CVSS v2

リスクファクター: Medium

基本値: 6.8

現状値: 5.9

ベクトル: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS スコアのソース: CVE-2024-36971

CVSS v3

リスクファクター: High

基本値: 7.8

現状値: 7.5

ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C

脆弱性情報

CPE: p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-rt-686-pae, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-common, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:linux-kbuild-4.19, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-686-dbg, p-cpe:/a:debian:debian_linux:linux-source-4.19, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-amd64, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-8-arm, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:libbpf4.19, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-686, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-all-i386, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:libbpf-dev, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-all, p-cpe:/a:debian:debian_linux:linux-perf-4.19, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-8-x86, p-cpe:/a:debian:debian_linux:linux-support-4.19.0-26, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-armmp, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-all-armhf, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-armmp-dbg, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:linux-image-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-doc-4.19, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-amd64-dbg, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-all-arm64, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-config-4.19, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-4.19.0-26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-4.19.0-26-cloud-amd64-dbg

必要な KB アイテム: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

エクスプロイトが利用可能: true

エクスプロイトの容易さ: Exploits are available

パッチ公開日: 2024/6/25

脆弱性公開日: 2020/4/28

CISA の既知の悪用された脆弱性の期限日: 2024/6/20

エクスプロイト可能

Core Impact

参照情報

CVE: CVE-2021-33630, CVE-2022-48627, CVE-2023-0386, CVE-2023-46838, CVE-2023-47233, CVE-2023-52340, CVE-2023-52429, CVE-2023-52436, CVE-2023-52439, CVE-2023-52443, CVE-2023-52444, CVE-2023-52445, CVE-2023-52449, CVE-2023-52464, CVE-2023-52469, CVE-2023-52470, CVE-2023-52486, CVE-2023-52583, CVE-2023-52587, CVE-2023-52594, CVE-2023-52599, CVE-2023-52600, CVE-2023-52601, CVE-2023-52602, CVE-2023-52603, CVE-2023-52604, CVE-2023-52609, CVE-2023-52612, CVE-2023-52615, CVE-2023-52619, CVE-2023-52620, CVE-2023-52622, CVE-2023-52623, CVE-2023-52628, CVE-2023-52644, CVE-2023-52650, CVE-2023-52670, CVE-2023-52679, CVE-2023-52683, CVE-2023-52691, CVE-2023-52693, CVE-2023-52698, CVE-2023-52699, CVE-2023-52880, CVE-2023-6040, CVE-2023-6270, CVE-2023-7042, CVE-2024-0340, CVE-2024-0607, CVE-2024-1086, CVE-2024-22099, CVE-2024-23849, CVE-2024-23851, CVE-2024-24857, CVE-2024-24858, CVE-2024-24861, CVE-2024-25739, CVE-2024-26597, CVE-2024-26600, CVE-2024-26602, CVE-2024-26606, CVE-2024-26615, CVE-2024-26625, CVE-2024-26633, CVE-2024-26635, CVE-2024-26636, CVE-2024-26642, CVE-2024-26645, CVE-2024-26651, CVE-2024-26663, CVE-2024-26664, CVE-2024-26671, CVE-2024-26675, CVE-2024-26679, CVE-2024-26685, CVE-2024-26696, CVE-2024-26697, CVE-2024-26704, CVE-2024-26720, CVE-2024-26722, CVE-2024-26735, CVE-2024-26744, CVE-2024-26752, CVE-2024-26754, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26791, CVE-2024-26793, CVE-2024-26801, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26839, CVE-2024-26840, CVE-2024-26845, CVE-2024-26851, CVE-2024-26852, CVE-2024-26857, CVE-2024-26859, CVE-2024-26863, CVE-2024-26874, CVE-2024-26875, CVE-2024-26878, CVE-2024-26880, CVE-2024-26883, CVE-2024-26884, CVE-2024-26889, CVE-2024-26894, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26917, CVE-2024-26922, CVE-2024-26923, CVE-2024-26931, CVE-2024-26934, CVE-2024-26955, CVE-2024-26956, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26973, CVE-2024-26974, CVE-2024-26976, CVE-2024-26981, CVE-2024-26984, CVE-2024-26993, CVE-2024-26994, CVE-2024-26997, CVE-2024-27001, CVE-2024-27008, CVE-2024-27013, CVE-2024-27020, CVE-2024-27024, CVE-2024-27028, CVE-2024-27043, CVE-2024-27046, CVE-2024-27059, CVE-2024-27074, CVE-2024-27075, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27395, CVE-2024-27396, CVE-2024-27398, CVE-2024-27399, CVE-2024-27401, CVE-2024-27405, CVE-2024-27410, CVE-2024-27412, CVE-2024-27413, CVE-2024-27416, CVE-2024-27419, CVE-2024-27436, CVE-2024-31076, CVE-2024-33621, CVE-2024-35789, CVE-2024-35806, CVE-2024-35807, CVE-2024-35809, CVE-2024-35811, CVE-2024-35815, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35825, CVE-2024-35828, CVE-2024-35830, CVE-2024-35835, CVE-2024-35847, CVE-2024-35849, CVE-2024-35877, CVE-2024-35886, CVE-2024-35888, CVE-2024-35893, CVE-2024-35898, CVE-2024-35902, CVE-2024-35910, CVE-2024-35915, CVE-2024-35922, CVE-2024-35925, CVE-2024-35930, CVE-2024-35933, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35947, CVE-2024-35955, CVE-2024-35960, CVE-2024-35969, CVE-2024-35973, CVE-2024-35978, CVE-2024-35982, CVE-2024-35984, CVE-2024-35997, CVE-2024-36004, CVE-2024-36014, CVE-2024-36015, CVE-2024-36016, CVE-2024-36017, CVE-2024-36020, CVE-2024-36286, CVE-2024-36288, CVE-2024-36883, CVE-2024-36886, CVE-2024-36902, CVE-2024-36904, CVE-2024-36905, CVE-2024-36919, CVE-2024-36933, CVE-2024-36934, CVE-2024-36940, CVE-2024-36941, CVE-2024-36946, CVE-2024-36950, CVE-2024-36954, CVE-2024-36959, CVE-2024-36960, CVE-2024-36964, CVE-2024-36971, CVE-2024-37353, CVE-2024-37356, CVE-2024-38381, CVE-2024-38549, CVE-2024-38552, CVE-2024-38558, CVE-2024-38559, CVE-2024-38560, CVE-2024-38565, CVE-2024-38567, CVE-2024-38578, CVE-2024-38579, CVE-2024-38582, CVE-2024-38583, CVE-2024-38587, CVE-2024-38589, CVE-2024-38596, CVE-2024-38598, CVE-2024-38599, CVE-2024-38601, CVE-2024-38612, CVE-2024-38618, CVE-2024-38621, CVE-2024-38627, CVE-2024-38633, CVE-2024-38634, CVE-2024-38637, CVE-2024-38659, CVE-2024-38780, CVE-2024-39292