Debian dla-3842 : linux-config-5.10 - セキュリティ更新

high Nessus プラグイン ID 201105

概要

リモートの Debian ホストにセキュリティ関連の更新プログラムがありません。

説明

リモートの Debian 10 ホストには、dla-3842 のアドバイザリに記載された複数の脆弱性の影響を受けるパッケージがインストールされています。

------------------------------------------------------------------------- Debian LTS アドバイザリ DLA-3842-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2024 年 6 月 25 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

パッケージ : linux-5.10 バージョン : 5.10.216-1~deb10u1 CVE ID : CVE-2022-38096 CVE-2023-6270 CVE-2023-7042 CVE-2023-28746 CVE-2023-47233 CVE-2023-52429 CVE-2023-52434 CVE-2023-52435 CVE-2023-52447 CVE-2023-52458 CVE-2023-52482 CVE-2023-52486 CVE-2023-52488 CVE-2023-52489 CVE-2023-52491 CVE-2023-52492 CVE-2023-52493 CVE-2023-52497 CVE-2023-52498 CVE-2023-52583 CVE-2023-52587 CVE-2023-52594 CVE-2023-52595 CVE-2023-52597 CVE-2023-52598 CVE-2023-52599 CVE-2023-52600 CVE-2023-52601 CVE-2023-52602 CVE-2023-52603 CVE-2023-52604 CVE-2023-52606 CVE-2023-52607 CVE-2023-52614 CVE-2023-52615 CVE-2023-52616 CVE-2023-52617 CVE-2023-52618 CVE-2023-52619 CVE-2023-52620 CVE-2023-52622 CVE-2023-52623 CVE-2023-52627 CVE-2023-52635 CVE-2023-52637 CVE-2023-52642 CVE-2023-52644 CVE-2023-52650 CVE-2023-52656 CVE-2023-52669 CVE-2023-52670 CVE-2023-52672 CVE-2023-52699 CVE-2023-52880 CVE-2024-0340 CVE-2024-0565 CVE-2024-0607 CVE-2024-0841 CVE-2024-1151 CVE-2024-22099 CVE-2024-23849 CVE-2024-23850 CVE-2024-23851 CVE-2024-24857 CVE-2024-24858 CVE-2024-24861 CVE-2024-25739 CVE-2024-26581 CVE-2024-26593 CVE-2024-26600 CVE-2024-26601 CVE-2024-26602 CVE-2024-26606 CVE-2024-26610 CVE-2024-26614 CVE-2024-26615 CVE-2024-26622 CVE-2024-26625 CVE-2024-26627 CVE-2024-26635 CVE-2024-26636 CVE-2024-26640 CVE-2024-26641 CVE-2024-26642 CVE-2024-26643 CVE-2024-26644 CVE-2024-26645 CVE-2024-26651 CVE-2024-26654 CVE-2024-26659 CVE-2024-26663 CVE-2024-26664 CVE-2024-26665 CVE-2024-26671 CVE-2024-26673 CVE-2024-26675 CVE-2024-26679 CVE-2024-26684 CVE-2024-26685 CVE-2024-26687 CVE-2024-26688 CVE-2024-26689 CVE-2024-26695 CVE-2024-26696 CVE-2024-26697 CVE-2024-26698 CVE-2024-26702 CVE-2024-26704 CVE-2024-26707 CVE-2024-26712 CVE-2024-26720 CVE-2024-26722 CVE-2024-26727 CVE-2024-26733 CVE-2024-26735 CVE-2024-26736 CVE-2024-26743 CVE-2024-26744 CVE-2024-26747 CVE-2024-26748 CVE-2024-26749 CVE-2024-26751 CVE-2024-26752 CVE-2024-26753 CVE-2024-26754 CVE-2024-26763 CVE-2024-26764 CVE-2024-26766 CVE-2024-26771 CVE-2024-26772 CVE-2024-26773 CVE-2024-26776 CVE-2024-26777 CVE-2024-26778 CVE-2024-26779 CVE-2024-26781 CVE-2024-26782 CVE-2024-26787 CVE-2024-26788 CVE-2024-26790 CVE-2024-26791 CVE-2024-26793 CVE-2024-26795 CVE-2024-26801 CVE-2024-26804 CVE-2024-26805 CVE-2024-26808 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26816 CVE-2024-26817 CVE-2024-26820 CVE-2024-26825 CVE-2024-26833 CVE-2024-26835 CVE-2024-26839 CVE-2024-26840 CVE-2024-26843 CVE-2024-26845 CVE-2024-26846 CVE-2024-26848 CVE-2024-26851 CVE-2024-26852 CVE-2024-26855 CVE-2024-26857 CVE-2024-26859 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26870 CVE-2024-26872 CVE-2024-26874 CVE-2024-26875 CVE-2024-26877 CVE-2024-26878 CVE-2024-26880 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26889 CVE-2024-26891 CVE-2024-26894 CVE-2024-26895 CVE-2024-26897 CVE-2024-26898 CVE-2024-26901 CVE-2024-26903 CVE-2024-26906 CVE-2024-26907 CVE-2024-26910 CVE-2024-26917 CVE-2024-26922 CVE-2024-26923 CVE-2024-26924 CVE-2024-26925 CVE-2024-26926 CVE-2024-26931 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26950 CVE-2024-26951 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26960 CVE-2024-26961 CVE-2024-26965 CVE-2024-26966 CVE-2024-26969 CVE-2024-26970 CVE-2024-26973 CVE-2024-26974 CVE-2024-26976 CVE-2024-26978 CVE-2024-26981 CVE-2024-26984 CVE-2024-26988 CVE-2024-26993 CVE-2024-26994 CVE-2024-26997 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27004 CVE-2024-27008 CVE-2024-27013 CVE-2024-27020 CVE-2024-27024 CVE-2024-27025 CVE-2024-27028 CVE-2024-27030 CVE-2024-27038 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27059 CVE-2024-27065 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27388 CVE-2024-27395 CVE-2024-27396 CVE-2024-27405 CVE-2024-27410 CVE-2024-27412 CVE-2024-27413 CVE-2024-27414 CVE-2024-27416 CVE-2024-27417 CVE-2024-27419 CVE-2024-27431 CVE-2024-27436 CVE-2024-27437 CVE-2024-35785 CVE-2024-35789 CVE-2024-35791 CVE-2024-35796 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35809 CVE-2024-35811 CVE-2024-35813 CVE-2024-35815 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35823 CVE-2024-35825 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35833 CVE-2024-35835 CVE-2024-35837 CVE-2024-35845 CVE-2024-35847 CVE-2024-35849 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35871 CVE-2024-35877 CVE-2024-35879 CVE-2024-35884 CVE-2024-35886 CVE-2024-35888 CVE-2024-35893 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35902 CVE-2024-35905 CVE-2024-35910 CVE-2024-35915 CVE-2024-35922 CVE-2024-35925 CVE-2024-35930 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35940 CVE-2024-35944 CVE-2024-35950 CVE-2024-35955 CVE-2024-35958 CVE-2024-35960 CVE-2024-35962 CVE-2024-35967 CVE-2024-35969 CVE-2024-35973 CVE-2024-35976 CVE-2024-35978 CVE-2024-35982 CVE-2024-35983 CVE-2024-35984 CVE-2024-35988 CVE-2024-35990 CVE-2024-35996 CVE-2024-35997 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36020 Debian バグ : 1064035

Linux カーネルに、権限昇格、サービス拒否、または情報漏洩を引き起こす可能性がある、複数の脆弱性が発見されました。

Debian 10 buster では、これらの問題はバージョン 5.10.216-1~deb10u1 で修正されています。この更新は、カーネルドキュメント生成のリグレッションも修正しており、安定更新 5.10.210-5.10.216 以降のさらに多くのバグ修正も含んでいます。

linux-5.10 の詳細なセキュリティステータスについては、そのセキュリティトラッカーページを参照してください:
https://security-tracker.debian.org/tracker/linux-5.10

Debian LTS セキュリティアドバイザリに関する詳細、これらの更新をシステムに適用する方法、およびよくある質問については、こちらを参照してください。https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP 署名

Tenable は、前述の説明ブロックを Debian セキュリティアドバイザリから直接抽出しました。

Nessus はこれらの問題をテストしておらず、代わりにアプリケーションが自己報告するバージョン番号にのみ依存していることに注意してください。

ソリューション

linux-config-5.10 パッケージをアップグレードしてください。

参考資料

https://security-tracker.debian.org/tracker/source-package/linux-5.10

https://security-tracker.debian.org/tracker/CVE-2022-38096

https://security-tracker.debian.org/tracker/CVE-2023-28746

https://security-tracker.debian.org/tracker/CVE-2023-47233

https://security-tracker.debian.org/tracker/CVE-2023-52429

https://security-tracker.debian.org/tracker/CVE-2023-52434

https://security-tracker.debian.org/tracker/CVE-2023-52435

https://security-tracker.debian.org/tracker/CVE-2023-52447

https://security-tracker.debian.org/tracker/CVE-2023-52458

https://security-tracker.debian.org/tracker/CVE-2023-52482

https://security-tracker.debian.org/tracker/CVE-2023-52486

https://security-tracker.debian.org/tracker/CVE-2023-52488

https://security-tracker.debian.org/tracker/CVE-2023-52489

https://security-tracker.debian.org/tracker/CVE-2023-52491

https://security-tracker.debian.org/tracker/CVE-2023-52492

https://security-tracker.debian.org/tracker/CVE-2023-52493

https://security-tracker.debian.org/tracker/CVE-2023-52497

https://security-tracker.debian.org/tracker/CVE-2023-52498

https://security-tracker.debian.org/tracker/CVE-2023-52583

https://security-tracker.debian.org/tracker/CVE-2023-52587

https://security-tracker.debian.org/tracker/CVE-2023-52594

https://security-tracker.debian.org/tracker/CVE-2023-52595

https://security-tracker.debian.org/tracker/CVE-2023-52597

https://security-tracker.debian.org/tracker/CVE-2023-52598

https://security-tracker.debian.org/tracker/CVE-2023-52599

https://security-tracker.debian.org/tracker/CVE-2023-52600

https://security-tracker.debian.org/tracker/CVE-2023-52601

https://security-tracker.debian.org/tracker/CVE-2023-52602

https://security-tracker.debian.org/tracker/CVE-2023-52603

https://security-tracker.debian.org/tracker/CVE-2023-52604

https://security-tracker.debian.org/tracker/CVE-2023-52606

https://security-tracker.debian.org/tracker/CVE-2023-52607

https://security-tracker.debian.org/tracker/CVE-2023-52614

https://security-tracker.debian.org/tracker/CVE-2023-52615

https://security-tracker.debian.org/tracker/CVE-2023-52616

https://security-tracker.debian.org/tracker/CVE-2023-52617

https://security-tracker.debian.org/tracker/CVE-2023-52618

https://security-tracker.debian.org/tracker/CVE-2023-52619

https://security-tracker.debian.org/tracker/CVE-2023-52620

https://security-tracker.debian.org/tracker/CVE-2023-52622

https://security-tracker.debian.org/tracker/CVE-2023-52623

https://security-tracker.debian.org/tracker/CVE-2023-52627

https://security-tracker.debian.org/tracker/CVE-2023-52635

https://security-tracker.debian.org/tracker/CVE-2023-52637

https://security-tracker.debian.org/tracker/CVE-2023-52642

https://security-tracker.debian.org/tracker/CVE-2023-52644

https://security-tracker.debian.org/tracker/CVE-2023-52650

https://security-tracker.debian.org/tracker/CVE-2023-52656

https://security-tracker.debian.org/tracker/CVE-2023-52669

https://security-tracker.debian.org/tracker/CVE-2023-52670

https://security-tracker.debian.org/tracker/CVE-2023-52672

https://security-tracker.debian.org/tracker/CVE-2023-52699

https://security-tracker.debian.org/tracker/CVE-2023-52880

https://security-tracker.debian.org/tracker/CVE-2023-6270

https://security-tracker.debian.org/tracker/CVE-2023-7042

https://security-tracker.debian.org/tracker/CVE-2024-0340

https://security-tracker.debian.org/tracker/CVE-2024-0565

https://security-tracker.debian.org/tracker/CVE-2024-0607

https://security-tracker.debian.org/tracker/CVE-2024-0841

https://security-tracker.debian.org/tracker/CVE-2024-1151

https://security-tracker.debian.org/tracker/CVE-2024-22099

https://security-tracker.debian.org/tracker/CVE-2024-23849

https://security-tracker.debian.org/tracker/CVE-2024-23850

https://security-tracker.debian.org/tracker/CVE-2024-23851

https://security-tracker.debian.org/tracker/CVE-2024-24857

https://security-tracker.debian.org/tracker/CVE-2024-24858

https://security-tracker.debian.org/tracker/CVE-2024-24861

https://security-tracker.debian.org/tracker/CVE-2024-25739

https://security-tracker.debian.org/tracker/CVE-2024-26581

https://security-tracker.debian.org/tracker/CVE-2024-26593

https://security-tracker.debian.org/tracker/CVE-2024-26600

https://security-tracker.debian.org/tracker/CVE-2024-26601

https://security-tracker.debian.org/tracker/CVE-2024-26602

https://security-tracker.debian.org/tracker/CVE-2024-26606

https://security-tracker.debian.org/tracker/CVE-2024-26610

https://security-tracker.debian.org/tracker/CVE-2024-26614

https://security-tracker.debian.org/tracker/CVE-2024-26615

https://security-tracker.debian.org/tracker/CVE-2024-26622

https://security-tracker.debian.org/tracker/CVE-2024-26625

https://security-tracker.debian.org/tracker/CVE-2024-26627

https://security-tracker.debian.org/tracker/CVE-2024-26635

https://security-tracker.debian.org/tracker/CVE-2024-26636

https://security-tracker.debian.org/tracker/CVE-2024-26640

https://security-tracker.debian.org/tracker/CVE-2024-26641

https://security-tracker.debian.org/tracker/CVE-2024-26642

https://security-tracker.debian.org/tracker/CVE-2024-26643

https://security-tracker.debian.org/tracker/CVE-2024-26644

https://security-tracker.debian.org/tracker/CVE-2024-26645

https://security-tracker.debian.org/tracker/CVE-2024-26651

https://security-tracker.debian.org/tracker/CVE-2024-26654

https://security-tracker.debian.org/tracker/CVE-2024-26659

https://security-tracker.debian.org/tracker/CVE-2024-26663

https://security-tracker.debian.org/tracker/CVE-2024-26664

https://security-tracker.debian.org/tracker/CVE-2024-26665

https://security-tracker.debian.org/tracker/CVE-2024-26671

https://security-tracker.debian.org/tracker/CVE-2024-26673

https://security-tracker.debian.org/tracker/CVE-2024-26675

https://security-tracker.debian.org/tracker/CVE-2024-26679

https://security-tracker.debian.org/tracker/CVE-2024-26684

https://security-tracker.debian.org/tracker/CVE-2024-26685

https://security-tracker.debian.org/tracker/CVE-2024-26687

https://security-tracker.debian.org/tracker/CVE-2024-26688

https://security-tracker.debian.org/tracker/CVE-2024-26689

https://security-tracker.debian.org/tracker/CVE-2024-26695

https://security-tracker.debian.org/tracker/CVE-2024-26696

https://security-tracker.debian.org/tracker/CVE-2024-26697

https://security-tracker.debian.org/tracker/CVE-2024-26698

https://security-tracker.debian.org/tracker/CVE-2024-26702

https://security-tracker.debian.org/tracker/CVE-2024-26704

https://security-tracker.debian.org/tracker/CVE-2024-26707

https://security-tracker.debian.org/tracker/CVE-2024-26712

https://security-tracker.debian.org/tracker/CVE-2024-26720

https://security-tracker.debian.org/tracker/CVE-2024-26722

https://security-tracker.debian.org/tracker/CVE-2024-26727

https://security-tracker.debian.org/tracker/CVE-2024-26733

https://security-tracker.debian.org/tracker/CVE-2024-26735

https://security-tracker.debian.org/tracker/CVE-2024-26736

https://security-tracker.debian.org/tracker/CVE-2024-26743

https://security-tracker.debian.org/tracker/CVE-2024-26744

https://security-tracker.debian.org/tracker/CVE-2024-26747

https://security-tracker.debian.org/tracker/CVE-2024-26748

https://security-tracker.debian.org/tracker/CVE-2024-26749

https://security-tracker.debian.org/tracker/CVE-2024-26751

https://security-tracker.debian.org/tracker/CVE-2024-26752

https://security-tracker.debian.org/tracker/CVE-2024-26753

https://security-tracker.debian.org/tracker/CVE-2024-26754

https://security-tracker.debian.org/tracker/CVE-2024-26763

https://security-tracker.debian.org/tracker/CVE-2024-26764

https://security-tracker.debian.org/tracker/CVE-2024-26766

https://security-tracker.debian.org/tracker/CVE-2024-26771

https://security-tracker.debian.org/tracker/CVE-2024-26772

https://security-tracker.debian.org/tracker/CVE-2024-26773

https://security-tracker.debian.org/tracker/CVE-2024-26776

https://security-tracker.debian.org/tracker/CVE-2024-26777

https://security-tracker.debian.org/tracker/CVE-2024-26778

https://security-tracker.debian.org/tracker/CVE-2024-26779

https://security-tracker.debian.org/tracker/CVE-2024-26781

https://security-tracker.debian.org/tracker/CVE-2024-26782

https://security-tracker.debian.org/tracker/CVE-2024-26787

https://security-tracker.debian.org/tracker/CVE-2024-26788

https://security-tracker.debian.org/tracker/CVE-2024-26790

https://security-tracker.debian.org/tracker/CVE-2024-26791

https://security-tracker.debian.org/tracker/CVE-2024-26793

https://security-tracker.debian.org/tracker/CVE-2024-26795

https://security-tracker.debian.org/tracker/CVE-2024-26801

https://security-tracker.debian.org/tracker/CVE-2024-26804

https://security-tracker.debian.org/tracker/CVE-2024-26805

https://security-tracker.debian.org/tracker/CVE-2024-26808

https://security-tracker.debian.org/tracker/CVE-2024-26809

https://security-tracker.debian.org/tracker/CVE-2024-26810

https://security-tracker.debian.org/tracker/CVE-2024-26812

https://security-tracker.debian.org/tracker/CVE-2024-26813

https://security-tracker.debian.org/tracker/CVE-2024-26814

https://security-tracker.debian.org/tracker/CVE-2024-26816

https://security-tracker.debian.org/tracker/CVE-2024-26817

https://security-tracker.debian.org/tracker/CVE-2024-26820

https://security-tracker.debian.org/tracker/CVE-2024-26825

https://security-tracker.debian.org/tracker/CVE-2024-26833

https://security-tracker.debian.org/tracker/CVE-2024-26835

https://security-tracker.debian.org/tracker/CVE-2024-26839

https://security-tracker.debian.org/tracker/CVE-2024-26840

https://security-tracker.debian.org/tracker/CVE-2024-26843

https://security-tracker.debian.org/tracker/CVE-2024-26845

https://security-tracker.debian.org/tracker/CVE-2024-26846

https://security-tracker.debian.org/tracker/CVE-2024-26848

https://security-tracker.debian.org/tracker/CVE-2024-26851

https://security-tracker.debian.org/tracker/CVE-2024-26852

https://security-tracker.debian.org/tracker/CVE-2024-26855

https://security-tracker.debian.org/tracker/CVE-2024-26857

https://security-tracker.debian.org/tracker/CVE-2024-26859

https://security-tracker.debian.org/tracker/CVE-2024-26861

https://security-tracker.debian.org/tracker/CVE-2024-26862

https://security-tracker.debian.org/tracker/CVE-2024-27044

https://security-tracker.debian.org/tracker/CVE-2024-27045

https://security-tracker.debian.org/tracker/CVE-2024-27046

https://security-tracker.debian.org/tracker/CVE-2024-27047

https://security-tracker.debian.org/tracker/CVE-2024-27051

https://security-tracker.debian.org/tracker/CVE-2024-27052

https://security-tracker.debian.org/tracker/CVE-2024-27053

https://security-tracker.debian.org/tracker/CVE-2024-27059

https://security-tracker.debian.org/tracker/CVE-2024-27065

https://security-tracker.debian.org/tracker/CVE-2024-27073

https://security-tracker.debian.org/tracker/CVE-2024-27074

https://security-tracker.debian.org/tracker/CVE-2024-27075

https://security-tracker.debian.org/tracker/CVE-2024-27076

https://security-tracker.debian.org/tracker/CVE-2024-27077

https://security-tracker.debian.org/tracker/CVE-2024-27078

https://security-tracker.debian.org/tracker/CVE-2024-27388

https://security-tracker.debian.org/tracker/CVE-2024-27395

https://security-tracker.debian.org/tracker/CVE-2024-27396

https://security-tracker.debian.org/tracker/CVE-2024-27405

https://security-tracker.debian.org/tracker/CVE-2024-27410

https://security-tracker.debian.org/tracker/CVE-2024-27412

https://security-tracker.debian.org/tracker/CVE-2024-27413

https://security-tracker.debian.org/tracker/CVE-2024-27414

https://security-tracker.debian.org/tracker/CVE-2024-27416

https://security-tracker.debian.org/tracker/CVE-2024-27417

https://security-tracker.debian.org/tracker/CVE-2024-27419

https://security-tracker.debian.org/tracker/CVE-2024-27431

https://security-tracker.debian.org/tracker/CVE-2024-27436

https://security-tracker.debian.org/tracker/CVE-2024-27437

https://security-tracker.debian.org/tracker/CVE-2024-35785

https://security-tracker.debian.org/tracker/CVE-2024-35789

https://security-tracker.debian.org/tracker/CVE-2024-35791

https://security-tracker.debian.org/tracker/CVE-2024-35796

https://security-tracker.debian.org/tracker/CVE-2024-35805

https://security-tracker.debian.org/tracker/CVE-2024-35806

https://security-tracker.debian.org/tracker/CVE-2024-35807

https://security-tracker.debian.org/tracker/CVE-2024-35809

https://security-tracker.debian.org/tracker/CVE-2024-35811

https://security-tracker.debian.org/tracker/CVE-2024-35813

https://security-tracker.debian.org/tracker/CVE-2024-35815

https://security-tracker.debian.org/tracker/CVE-2024-35819

https://security-tracker.debian.org/tracker/CVE-2024-35821

https://security-tracker.debian.org/tracker/CVE-2024-35822

https://security-tracker.debian.org/tracker/CVE-2024-35823

https://security-tracker.debian.org/tracker/CVE-2024-35825

https://security-tracker.debian.org/tracker/CVE-2024-35828

https://security-tracker.debian.org/tracker/CVE-2024-35829

https://security-tracker.debian.org/tracker/CVE-2024-35830

https://security-tracker.debian.org/tracker/CVE-2024-35833

https://security-tracker.debian.org/tracker/CVE-2024-35835

https://security-tracker.debian.org/tracker/CVE-2024-35837

https://security-tracker.debian.org/tracker/CVE-2024-35845

https://security-tracker.debian.org/tracker/CVE-2024-35847

https://security-tracker.debian.org/tracker/CVE-2024-35849

https://security-tracker.debian.org/tracker/CVE-2024-35852

https://security-tracker.debian.org/tracker/CVE-2024-35853

https://security-tracker.debian.org/tracker/CVE-2024-35854

https://security-tracker.debian.org/tracker/CVE-2024-35855

https://security-tracker.debian.org/tracker/CVE-2024-35871

https://security-tracker.debian.org/tracker/CVE-2024-35877

https://security-tracker.debian.org/tracker/CVE-2024-35879

https://security-tracker.debian.org/tracker/CVE-2024-35884

https://security-tracker.debian.org/tracker/CVE-2024-35886

https://security-tracker.debian.org/tracker/CVE-2024-35888

https://security-tracker.debian.org/tracker/CVE-2024-35893

https://security-tracker.debian.org/tracker/CVE-2024-35895

https://security-tracker.debian.org/tracker/CVE-2024-35896

https://security-tracker.debian.org/tracker/CVE-2024-35897

https://security-tracker.debian.org/tracker/CVE-2024-35898

https://security-tracker.debian.org/tracker/CVE-2024-35899

https://security-tracker.debian.org/tracker/CVE-2024-35900

https://security-tracker.debian.org/tracker/CVE-2024-35902

https://security-tracker.debian.org/tracker/CVE-2024-35905

https://security-tracker.debian.org/tracker/CVE-2024-35910

https://security-tracker.debian.org/tracker/CVE-2024-35915

https://security-tracker.debian.org/tracker/CVE-2024-35922

https://security-tracker.debian.org/tracker/CVE-2024-35925

https://security-tracker.debian.org/tracker/CVE-2024-35930

https://security-tracker.debian.org/tracker/CVE-2024-35933

https://security-tracker.debian.org/tracker/CVE-2024-35934

https://security-tracker.debian.org/tracker/CVE-2024-35935

https://security-tracker.debian.org/tracker/CVE-2024-35936

https://security-tracker.debian.org/tracker/CVE-2024-35940

https://security-tracker.debian.org/tracker/CVE-2024-35944

https://security-tracker.debian.org/tracker/CVE-2024-35950

https://security-tracker.debian.org/tracker/CVE-2024-35955

https://security-tracker.debian.org/tracker/CVE-2024-35958

https://security-tracker.debian.org/tracker/CVE-2024-35960

https://security-tracker.debian.org/tracker/CVE-2024-35962

https://security-tracker.debian.org/tracker/CVE-2024-35967

https://security-tracker.debian.org/tracker/CVE-2024-35969

https://security-tracker.debian.org/tracker/CVE-2024-35973

https://security-tracker.debian.org/tracker/CVE-2024-35976

https://security-tracker.debian.org/tracker/CVE-2024-35978

https://security-tracker.debian.org/tracker/CVE-2024-35982

https://security-tracker.debian.org/tracker/CVE-2024-35983

https://security-tracker.debian.org/tracker/CVE-2024-35984

https://security-tracker.debian.org/tracker/CVE-2024-35988

https://security-tracker.debian.org/tracker/CVE-2024-35990

https://security-tracker.debian.org/tracker/CVE-2024-35996

https://security-tracker.debian.org/tracker/CVE-2024-35997

https://security-tracker.debian.org/tracker/CVE-2024-36004

https://security-tracker.debian.org/tracker/CVE-2024-36005

https://security-tracker.debian.org/tracker/CVE-2024-36006

https://security-tracker.debian.org/tracker/CVE-2024-36007

https://security-tracker.debian.org/tracker/CVE-2024-36008

https://security-tracker.debian.org/tracker/CVE-2024-36020

https://packages.debian.org/source/buster/linux-5.10

https://security-tracker.debian.org/tracker/CVE-2024-26863

https://security-tracker.debian.org/tracker/CVE-2024-26870

https://security-tracker.debian.org/tracker/CVE-2024-26872

https://security-tracker.debian.org/tracker/CVE-2024-26874

https://security-tracker.debian.org/tracker/CVE-2024-26875

https://security-tracker.debian.org/tracker/CVE-2024-26877

https://security-tracker.debian.org/tracker/CVE-2024-26878

https://security-tracker.debian.org/tracker/CVE-2024-26880

https://security-tracker.debian.org/tracker/CVE-2024-26882

https://security-tracker.debian.org/tracker/CVE-2024-26883

https://security-tracker.debian.org/tracker/CVE-2024-26884

https://security-tracker.debian.org/tracker/CVE-2024-26885

https://security-tracker.debian.org/tracker/CVE-2024-26889

https://security-tracker.debian.org/tracker/CVE-2024-26891

https://security-tracker.debian.org/tracker/CVE-2024-26894

https://security-tracker.debian.org/tracker/CVE-2024-26895

https://security-tracker.debian.org/tracker/CVE-2024-26897

https://security-tracker.debian.org/tracker/CVE-2024-26898

https://security-tracker.debian.org/tracker/CVE-2024-26901

https://security-tracker.debian.org/tracker/CVE-2024-26903

https://security-tracker.debian.org/tracker/CVE-2024-26906

https://security-tracker.debian.org/tracker/CVE-2024-26907

https://security-tracker.debian.org/tracker/CVE-2024-26910

https://security-tracker.debian.org/tracker/CVE-2024-26917

https://security-tracker.debian.org/tracker/CVE-2024-26922

https://security-tracker.debian.org/tracker/CVE-2024-26923

https://security-tracker.debian.org/tracker/CVE-2024-26924

https://security-tracker.debian.org/tracker/CVE-2024-26925

https://security-tracker.debian.org/tracker/CVE-2024-26926

https://security-tracker.debian.org/tracker/CVE-2024-26931

https://security-tracker.debian.org/tracker/CVE-2024-26934

https://security-tracker.debian.org/tracker/CVE-2024-26935

https://security-tracker.debian.org/tracker/CVE-2024-26937

https://security-tracker.debian.org/tracker/CVE-2024-26950

https://security-tracker.debian.org/tracker/CVE-2024-26951

https://security-tracker.debian.org/tracker/CVE-2024-26955

https://security-tracker.debian.org/tracker/CVE-2024-26956

https://security-tracker.debian.org/tracker/CVE-2024-26957

https://security-tracker.debian.org/tracker/CVE-2024-26958

https://security-tracker.debian.org/tracker/CVE-2024-26960

https://security-tracker.debian.org/tracker/CVE-2024-26961

https://security-tracker.debian.org/tracker/CVE-2024-26965

https://security-tracker.debian.org/tracker/CVE-2024-26966

https://security-tracker.debian.org/tracker/CVE-2024-26969

https://security-tracker.debian.org/tracker/CVE-2024-26970

https://security-tracker.debian.org/tracker/CVE-2024-26973

https://security-tracker.debian.org/tracker/CVE-2024-26974

https://security-tracker.debian.org/tracker/CVE-2024-26976

https://security-tracker.debian.org/tracker/CVE-2024-26978

https://security-tracker.debian.org/tracker/CVE-2024-26981

https://security-tracker.debian.org/tracker/CVE-2024-26984

https://security-tracker.debian.org/tracker/CVE-2024-26988

https://security-tracker.debian.org/tracker/CVE-2024-26993

https://security-tracker.debian.org/tracker/CVE-2024-26994

https://security-tracker.debian.org/tracker/CVE-2024-26997

https://security-tracker.debian.org/tracker/CVE-2024-26999

https://security-tracker.debian.org/tracker/CVE-2024-27000

https://security-tracker.debian.org/tracker/CVE-2024-27001

https://security-tracker.debian.org/tracker/CVE-2024-27004

https://security-tracker.debian.org/tracker/CVE-2024-27008

https://security-tracker.debian.org/tracker/CVE-2024-27013

https://security-tracker.debian.org/tracker/CVE-2024-27020

https://security-tracker.debian.org/tracker/CVE-2024-27024

https://security-tracker.debian.org/tracker/CVE-2024-27025

https://security-tracker.debian.org/tracker/CVE-2024-27028

https://security-tracker.debian.org/tracker/CVE-2024-27030

https://security-tracker.debian.org/tracker/CVE-2024-27038

https://security-tracker.debian.org/tracker/CVE-2024-27043

プラグインの詳細

深刻度: High

ID: 201105

ファイル名: debian_DLA-3842.nasl

バージョン: 1.1

タイプ: local

エージェント: unix

公開日: 2024/6/27

更新日: 2024/6/27

サポートされているセンサー: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

リスク情報

VPR

リスクファクター: High

スコア: 7.4

CVSS v2

リスクファクター: High

基本値: 7.7

現状値: 5.7

ベクトル: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C

CVSS スコアのソース: CVE-2024-0565

CVSS v3

リスクファクター: High

基本値: 8

現状値: 7

ベクトル: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

現状ベクトル: CVSS:3.0/E:U/RL:O/RC:C

CVSS スコアのソース: CVE-2023-52434

脆弱性情報

CPE: p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-common, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.27, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-common, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.24, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-common, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-686, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-common-rt, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-686-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.30, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-armmp, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.28, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.26, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.29, p-cpe:/a:debian:debian_linux:linux-image-5.10-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-686-dbg, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-common, p-cpe:/a:debian:debian_linux:linux-image-5.10-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-common, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-common, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-686

必要な KB アイテム: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

エクスプロイトの容易さ: No known exploits are available

パッチ公開日: 2024/6/25

脆弱性公開日: 2022/9/9

参照情報

CVE: CVE-2022-38096, CVE-2023-28746, CVE-2023-47233, CVE-2023-52429, CVE-2023-52434, CVE-2023-52435, CVE-2023-52447, CVE-2023-52458, CVE-2023-52482, CVE-2023-52486, CVE-2023-52488, CVE-2023-52489, CVE-2023-52491, CVE-2023-52492, CVE-2023-52493, CVE-2023-52497, CVE-2023-52498, CVE-2023-52583, CVE-2023-52587, CVE-2023-52594, CVE-2023-52595, CVE-2023-52597, CVE-2023-52598, CVE-2023-52599, CVE-2023-52600, CVE-2023-52601, CVE-2023-52602, CVE-2023-52603, CVE-2023-52604, CVE-2023-52606, CVE-2023-52607, CVE-2023-52614, CVE-2023-52615, CVE-2023-52616, CVE-2023-52617, CVE-2023-52618, CVE-2023-52619, CVE-2023-52620, CVE-2023-52622, CVE-2023-52623, CVE-2023-52627, CVE-2023-52635, CVE-2023-52637, CVE-2023-52642, CVE-2023-52644, CVE-2023-52650, CVE-2023-52656, CVE-2023-52669, CVE-2023-52670, CVE-2023-52672, CVE-2023-52699, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2024-0340, CVE-2024-0565, CVE-2024-0607, CVE-2024-0841, CVE-2024-1151, CVE-2024-22099, CVE-2024-23849, CVE-2024-23850, CVE-2024-23851, CVE-2024-24857, CVE-2024-24858, CVE-2024-24861, CVE-2024-25739, CVE-2024-26581, CVE-2024-26593, CVE-2024-26600, CVE-2024-26601, CVE-2024-26602, CVE-2024-26606, CVE-2024-26610, CVE-2024-26614, CVE-2024-26615, CVE-2024-26622, CVE-2024-26625, CVE-2024-26627, CVE-2024-26635, CVE-2024-26636, CVE-2024-26640, CVE-2024-26641, CVE-2024-26642, CVE-2024-26643, CVE-2024-26644, CVE-2024-26645, CVE-2024-26651, CVE-2024-26654, CVE-2024-26659, CVE-2024-26663, CVE-2024-26664, CVE-2024-26665, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26695, CVE-2024-26696, CVE-2024-26697, CVE-2024-26698, CVE-2024-26702, CVE-2024-26704, CVE-2024-26707, CVE-2024-26712, CVE-2024-26720, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26735, CVE-2024-26736, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26748, CVE-2024-26749, CVE-2024-26751, CVE-2024-26752, CVE-2024-26753, CVE-2024-26754, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26781, CVE-2024-26782, CVE-2024-26787, CVE-2024-26788, CVE-2024-26790, CVE-2024-26791, CVE-2024-26793, CVE-2024-26795, CVE-2024-26801, CVE-2024-26804, CVE-2024-26805, CVE-2024-26808, CVE-2024-26809, CVE-2024-26810, CVE-2024-26812, CVE-2024-26813, CVE-2024-26814, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26833, CVE-2024-26835, CVE-2024-26839, CVE-2024-26840, CVE-2024-26843, CVE-2024-26845, CVE-2024-26846, CVE-2024-26848, CVE-2024-26851, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26870, CVE-2024-26872, CVE-2024-26874, CVE-2024-26875, CVE-2024-26877, CVE-2024-26878, CVE-2024-26880, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26889, CVE-2024-26891, CVE-2024-26894, CVE-2024-26895, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26907, CVE-2024-26910, CVE-2024-26917, CVE-2024-26922, CVE-2024-26923, CVE-2024-26924, CVE-2024-26925, CVE-2024-26926, CVE-2024-26931, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26973, CVE-2024-26974, CVE-2024-26976, CVE-2024-26978, CVE-2024-26981, CVE-2024-26984, CVE-2024-26988, CVE-2024-26993, CVE-2024-26994, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27004, CVE-2024-27008, CVE-2024-27013, CVE-2024-27020, CVE-2024-27024, CVE-2024-27025, CVE-2024-27028, CVE-2024-27030, CVE-2024-27038, CVE-2024-27043, CVE-2024-27044, CVE-2024-27045, CVE-2024-27046, CVE-2024-27047, CVE-2024-27051, CVE-2024-27052, CVE-2024-27053, CVE-2024-27059, CVE-2024-27065, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27395, CVE-2024-27396, CVE-2024-27405, CVE-2024-27410, CVE-2024-27412, CVE-2024-27413, CVE-2024-27414, CVE-2024-27416, CVE-2024-27417, CVE-2024-27419, CVE-2024-27431, CVE-2024-27436, CVE-2024-27437, CVE-2024-35785, CVE-2024-35789, CVE-2024-35791, CVE-2024-35796, CVE-2024-35805, CVE-2024-35806, CVE-2024-35807, CVE-2024-35809, CVE-2024-35811, CVE-2024-35813, CVE-2024-35815, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35835, CVE-2024-35837, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35852, CVE-2024-35853, CVE-2024-35854, CVE-2024-35855, CVE-2024-35871, CVE-2024-35877, CVE-2024-35879, CVE-2024-35884, CVE-2024-35886, CVE-2024-35888, CVE-2024-35893, CVE-2024-35895, CVE-2024-35896, CVE-2024-35897, CVE-2024-35898, CVE-2024-35899, CVE-2024-35900, CVE-2024-35902, CVE-2024-35905, CVE-2024-35910, CVE-2024-35915, CVE-2024-35922, CVE-2024-35925, CVE-2024-35930, CVE-2024-35933, CVE-2024-35934, CVE-2024-35935, CVE-2024-35936, CVE-2024-35940, CVE-2024-35944, CVE-2024-35950, CVE-2024-35955, CVE-2024-35958, CVE-2024-35960, CVE-2024-35962, CVE-2024-35967, CVE-2024-35969, CVE-2024-35973, CVE-2024-35976, CVE-2024-35978, CVE-2024-35982, CVE-2024-35983, CVE-2024-35984, CVE-2024-35988, CVE-2024-35990, CVE-2024-35996, CVE-2024-35997, CVE-2024-36004, CVE-2024-36005, CVE-2024-36006, CVE-2024-36007, CVE-2024-36008, CVE-2024-36020