Debian dla-4404 : ata-modules-5.10.0-35-armmp-di - セキュリティ更新

high Nessus プラグイン ID 278559

概要

リモートの Debian ホストに 1 つ以上のセキュリティ関連の更新プログラムがありません。

説明

リモートのDebian 11ホストには、dla-4404アドバイザリに記載された複数の脆弱性の影響を受けるパッケージがインストールされています。

-------------------------------------------------- ----------------------- Debian LTS アドバイザリ DLA-4404-1 [email protected] https://www.debian.org/lts/security/Ben Hutchings 2025 年 12 月 12 日 https://wiki.debian.org/LTS-------------------------------------------------------------------------

パッケージ : linux バージョン : 5.10.247-1 CVE ID : CVE-2023-53498 CVE-2024-47666 CVE-2024-50143 CVE-2024-57947 CVE-2025-21861 CVE-2025-21887 CVE-2025-22058 CVE-2025-23143 CVE-2025-38678 CVE-2025-39866 CVE-2025-39869 CVE-2025-39876 CVE-2025-39883 CVE-2025-39885 CVE-2025-39907 CVE-2025-39911 CVE-2025-39913 CVE-2025-39923 CVE-2025-39937 CVE-2025-39945 CVE-2025-39949 CVE-2025-39951 CVE-2025-39953 CVE-2025-39955 CVE-2025-39964 CVE-2025-39967 CVE-2025-39968 CVE-2025-39969 CVE-2025-39970 CVE-2025-39971 CVE-2025-39972 CVE-2025-39973 CVE-2025-39980 CVE-2025-39985 CVE-2025-39986 CVE-2025-39987 CVE-2025-39993 CVE-2025-39994 CVE-2025-39995 CVE-2025-39996 CVE-2025-39998 CVE-2025-40001 CVE-2025-40006 CVE-2025-40011 CVE-2025-40018 CVE-2025-40019 CVE-2025-40020 CVE-2025-40021 CVE-2025-40022 CVE-2025-40026 CVE-2025-40027 CVE-2025-40029 CVE-2025-40030 CVE-2025-40035 CVE-2025-40042 CVE-2025-40044 CVE-2025-40048 CVE-2025-40049 CVE-2025-40053 CVE-2025-40055 CVE-2025-40070 CVE-2025-40078 CVE-2025-40081 CVE-2025-40083 CVE-2025-40087 CVE-2025-40088 CVE-2025-40105 CVE-2025-40106 CVE-2025-40109 CVE-2025-40111 CVE-2025-40115 CVE-2025-40116 CVE-2025-40118 CVE-2025-40121 CVE-2025-40125 CVE-2025-40127 CVE-2025-40134 CVE-2025-40140 CVE-2025-40153 CVE-2025-40154 CVE-2025-40167 CVE-2025-40173 CVE-2025-40178 CVE-2025-40183 CVE-2025-40186 CVE-2025-40187 CVE-2025-40188 CVE-2025-40190 CVE-2025-40194 CVE-2025-40197 CVE-2025-40198 CVE-2025-40200 CVE-2025-40204 CVE-2025-40205 CVE-2025-40211 CVE-2025-40219 CVE-2025-40220 CVE-2025-40223 CVE-2025-40231 CVE-2025-40233 CVE-2025-40240 CVE-2025-40243 CVE-2025-40244 CVE-2025-40248 CVE-2025-40254 CVE-2025-40257 CVE-2025-40258 CVE-2025-40259 CVE-2025-40261 CVE-2025-40262 CVE-2025-40263 CVE-2025-40264 CVE-2025-40269 CVE-2025-40271 CVE-2025-40273 CVE-2025-40275 CVE-2025-40277 CVE-2025-40278 CVE-2025-40280 CVE-2025-40281 CVE-2025-40282 CVE-2025-40283 CVE-2025-40304 CVE-2025-40306 CVE-2025-40308 CVE-2025-40309 CVE-2025-40312 CVE-2025-40315 CVE-2025-40317 CVE-2025-40319 CVE-2025-40321 CVE-2025-40322 CVE-2025-40324 CVE-2025-40331 CVE-2025-40342 Debian バグ : 1107479 1114557

Linux カーネルに、権限昇格、サービス拒否、または情報漏洩を引き起こす可能性がある、複数の脆弱性が発見されました。

Debian 11 bullseye においては、これらの問題はバージョン 5.10.247-1 で修正されました。このバージョンには、安定版stable更新 からのより多くのバグ修正が含まれています 5.10.245-5.10.247。破損した pktcdvd ドライバーも無効にされました。

お使いの linux パッケージをアップグレードすることを推奨します。

linux の詳細なセキュリティステータスについては、そのセキュリティトラッカーページを参照してください。
https://security-tracker.debian.org/tracker/linux

Debian LTS セキュリティアドバイザリに関する詳細、これらの更新をシステムに適用する方法、およびよくある質問については、こちらを参照してください。https://wiki.debian.org/LTSAttachment:signature.ascDescription: PGP 署名

Tenable は、前述の説明ブロックを Debian セキュリティアドバイザリから直接抽出しました。

Nessus はこれらの問題をテストしておらず、代わりにアプリケーションが自己報告するバージョン番号にのみ依存していることに注意してください。

ソリューション

ata-modules-5.10.0-35-armmp-di パッケージをアップグレードしてください。

参考資料

https://security-tracker.debian.org/tracker/CVE-2025-39980

https://security-tracker.debian.org/tracker/CVE-2025-39985

https://security-tracker.debian.org/tracker/CVE-2025-39986

https://security-tracker.debian.org/tracker/CVE-2025-39987

https://security-tracker.debian.org/tracker/CVE-2025-39993

https://security-tracker.debian.org/tracker/CVE-2025-39994

https://security-tracker.debian.org/tracker/CVE-2025-39995

https://security-tracker.debian.org/tracker/CVE-2025-39996

https://security-tracker.debian.org/tracker/CVE-2025-39998

https://security-tracker.debian.org/tracker/CVE-2025-40001

https://security-tracker.debian.org/tracker/CVE-2025-40006

https://security-tracker.debian.org/tracker/CVE-2025-40011

https://security-tracker.debian.org/tracker/CVE-2025-40018

https://security-tracker.debian.org/tracker/CVE-2025-40019

https://security-tracker.debian.org/tracker/CVE-2025-40020

https://security-tracker.debian.org/tracker/CVE-2025-40021

https://security-tracker.debian.org/tracker/CVE-2025-40022

https://security-tracker.debian.org/tracker/CVE-2025-40026

https://security-tracker.debian.org/tracker/CVE-2025-40027

https://security-tracker.debian.org/tracker/CVE-2025-40029

https://security-tracker.debian.org/tracker/CVE-2025-40030

https://security-tracker.debian.org/tracker/CVE-2025-40035

https://security-tracker.debian.org/tracker/CVE-2025-40042

https://security-tracker.debian.org/tracker/CVE-2025-40044

https://security-tracker.debian.org/tracker/CVE-2025-40048

https://security-tracker.debian.org/tracker/CVE-2025-40049

https://security-tracker.debian.org/tracker/CVE-2025-40053

https://security-tracker.debian.org/tracker/CVE-2025-40055

https://security-tracker.debian.org/tracker/CVE-2025-40070

https://security-tracker.debian.org/tracker/CVE-2025-40078

https://security-tracker.debian.org/tracker/CVE-2025-40081

https://security-tracker.debian.org/tracker/CVE-2025-40083

https://security-tracker.debian.org/tracker/CVE-2025-40087

https://security-tracker.debian.org/tracker/CVE-2025-40088

https://security-tracker.debian.org/tracker/CVE-2025-40105

https://security-tracker.debian.org/tracker/CVE-2025-40106

https://security-tracker.debian.org/tracker/CVE-2025-40109

https://security-tracker.debian.org/tracker/CVE-2025-40111

https://security-tracker.debian.org/tracker/CVE-2025-40115

https://security-tracker.debian.org/tracker/CVE-2025-40116

https://security-tracker.debian.org/tracker/CVE-2025-40254

https://security-tracker.debian.org/tracker/CVE-2025-40257

https://security-tracker.debian.org/tracker/CVE-2025-40258

https://security-tracker.debian.org/tracker/CVE-2025-40259

https://security-tracker.debian.org/tracker/CVE-2025-40261

https://security-tracker.debian.org/tracker/CVE-2025-40262

https://security-tracker.debian.org/tracker/CVE-2025-40263

https://security-tracker.debian.org/tracker/CVE-2025-40264

https://security-tracker.debian.org/tracker/CVE-2025-40269

https://security-tracker.debian.org/tracker/CVE-2025-40271

https://security-tracker.debian.org/tracker/CVE-2025-40273

https://security-tracker.debian.org/tracker/CVE-2025-40275

https://security-tracker.debian.org/tracker/CVE-2025-40277

https://security-tracker.debian.org/tracker/CVE-2025-40278

https://security-tracker.debian.org/tracker/CVE-2025-40280

https://security-tracker.debian.org/tracker/CVE-2025-40281

https://security-tracker.debian.org/tracker/CVE-2025-40282

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2023-53498

https://security-tracker.debian.org/tracker/CVE-2024-47666

https://security-tracker.debian.org/tracker/CVE-2024-50143

https://security-tracker.debian.org/tracker/CVE-2024-57947

https://security-tracker.debian.org/tracker/CVE-2025-21861

https://security-tracker.debian.org/tracker/CVE-2025-21887

https://security-tracker.debian.org/tracker/CVE-2025-22058

https://security-tracker.debian.org/tracker/CVE-2025-23143

https://security-tracker.debian.org/tracker/CVE-2025-38678

https://security-tracker.debian.org/tracker/CVE-2025-39866

https://security-tracker.debian.org/tracker/CVE-2025-39869

https://security-tracker.debian.org/tracker/CVE-2025-39876

https://security-tracker.debian.org/tracker/CVE-2025-39883

https://security-tracker.debian.org/tracker/CVE-2025-39885

https://security-tracker.debian.org/tracker/CVE-2025-39907

https://security-tracker.debian.org/tracker/CVE-2025-39911

https://security-tracker.debian.org/tracker/CVE-2025-39913

https://security-tracker.debian.org/tracker/CVE-2025-39923

https://security-tracker.debian.org/tracker/CVE-2025-39937

https://security-tracker.debian.org/tracker/CVE-2025-39945

https://security-tracker.debian.org/tracker/CVE-2025-39949

https://security-tracker.debian.org/tracker/CVE-2025-39951

https://security-tracker.debian.org/tracker/CVE-2025-39953

https://security-tracker.debian.org/tracker/CVE-2025-39955

https://security-tracker.debian.org/tracker/CVE-2025-39964

https://security-tracker.debian.org/tracker/CVE-2025-39967

https://security-tracker.debian.org/tracker/CVE-2025-39968

https://security-tracker.debian.org/tracker/CVE-2025-39969

https://security-tracker.debian.org/tracker/CVE-2025-39970

https://security-tracker.debian.org/tracker/CVE-2025-39971

https://security-tracker.debian.org/tracker/CVE-2025-39972

https://security-tracker.debian.org/tracker/CVE-2025-39973

https://security-tracker.debian.org/tracker/CVE-2025-40118

https://security-tracker.debian.org/tracker/CVE-2025-40121

https://security-tracker.debian.org/tracker/CVE-2025-40125

https://security-tracker.debian.org/tracker/CVE-2025-40127

https://security-tracker.debian.org/tracker/CVE-2025-40134

https://security-tracker.debian.org/tracker/CVE-2025-40140

https://security-tracker.debian.org/tracker/CVE-2025-40153

https://security-tracker.debian.org/tracker/CVE-2025-40154

https://security-tracker.debian.org/tracker/CVE-2025-40167

https://security-tracker.debian.org/tracker/CVE-2025-40173

https://security-tracker.debian.org/tracker/CVE-2025-40178

https://security-tracker.debian.org/tracker/CVE-2025-40183

https://security-tracker.debian.org/tracker/CVE-2025-40186

https://security-tracker.debian.org/tracker/CVE-2025-40187

https://security-tracker.debian.org/tracker/CVE-2025-40188

https://security-tracker.debian.org/tracker/CVE-2025-40190

https://security-tracker.debian.org/tracker/CVE-2025-40194

https://security-tracker.debian.org/tracker/CVE-2025-40197

https://security-tracker.debian.org/tracker/CVE-2025-40198

https://security-tracker.debian.org/tracker/CVE-2025-40200

https://security-tracker.debian.org/tracker/CVE-2025-40204

https://security-tracker.debian.org/tracker/CVE-2025-40205

https://security-tracker.debian.org/tracker/CVE-2025-40211

https://security-tracker.debian.org/tracker/CVE-2025-40219

https://security-tracker.debian.org/tracker/CVE-2025-40220

https://security-tracker.debian.org/tracker/CVE-2025-40223

https://security-tracker.debian.org/tracker/CVE-2025-40231

https://security-tracker.debian.org/tracker/CVE-2025-40233

https://security-tracker.debian.org/tracker/CVE-2025-40240

https://security-tracker.debian.org/tracker/CVE-2025-40243

https://security-tracker.debian.org/tracker/CVE-2025-40244

https://security-tracker.debian.org/tracker/CVE-2025-40248

https://security-tracker.debian.org/tracker/CVE-2025-40283

https://security-tracker.debian.org/tracker/CVE-2025-40304

https://security-tracker.debian.org/tracker/CVE-2025-40306

https://security-tracker.debian.org/tracker/CVE-2025-40308

https://security-tracker.debian.org/tracker/CVE-2025-40309

https://security-tracker.debian.org/tracker/CVE-2025-40312

https://security-tracker.debian.org/tracker/CVE-2025-40315

https://security-tracker.debian.org/tracker/CVE-2025-40317

https://security-tracker.debian.org/tracker/CVE-2025-40319

https://security-tracker.debian.org/tracker/CVE-2025-40321

https://security-tracker.debian.org/tracker/CVE-2025-40322

https://security-tracker.debian.org/tracker/CVE-2025-40324

https://security-tracker.debian.org/tracker/CVE-2025-40331

https://security-tracker.debian.org/tracker/CVE-2025-40342

https://packages.debian.org/source/bullseye/linux

プラグインの詳細

深刻度: High

ID: 278559

ファイル名: debian_DLA-4404.nasl

バージョン: 1.1

タイプ: local

エージェント: unix

公開日: 2025/12/12

更新日: 2025/12/12

サポートされているセンサー: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

リスク情報

VPR

リスクファクター: High

スコア: 7.4

CVSS v2

リスクファクター: Medium

基本値: 6.8

現状値: 5.3

ベクトル: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS スコアのソース: CVE-2024-50143

CVSS v3

リスクファクター: High

基本値: 7.8

現状値: 7

ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C

脆弱性情報

CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-i386-signed-template, p-cpe:/a:debian:debian_linux:bpftool, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-arm, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-x86, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:linux-doc, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:linux-headers-armmp, p-cpe:/a:debian:debian_linux:linux-headers-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-armmp, p-cpe:/a:debian:debian_linux:linux-image-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:linux-perf, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:linux-source, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-35, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-37-armmp-di

必要な KB アイテム: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

エクスプロイトが利用可能: true

エクスプロイトの容易さ: Exploits are available

パッチ公開日: 2025/12/12

脆弱性公開日: 2024/8/28

参照情報

CVE: CVE-2023-53498, CVE-2024-47666, CVE-2024-50143, CVE-2024-57947, CVE-2025-21861, CVE-2025-21887, CVE-2025-22058, CVE-2025-23143, CVE-2025-38678, CVE-2025-39866, CVE-2025-39869, CVE-2025-39876, CVE-2025-39883, CVE-2025-39885, CVE-2025-39907, CVE-2025-39911, CVE-2025-39913, CVE-2025-39923, CVE-2025-39937, CVE-2025-39945, CVE-2025-39949, CVE-2025-39951, CVE-2025-39953, CVE-2025-39955, CVE-2025-39964, CVE-2025-39967, CVE-2025-39968, CVE-2025-39969, CVE-2025-39970, CVE-2025-39971, CVE-2025-39972, CVE-2025-39973, CVE-2025-39980, CVE-2025-39985, CVE-2025-39986, CVE-2025-39987, CVE-2025-39993, CVE-2025-39994, CVE-2025-39995, CVE-2025-39996, CVE-2025-39998, CVE-2025-40001, CVE-2025-40006, CVE-2025-40011, CVE-2025-40018, CVE-2025-40019, CVE-2025-40020, CVE-2025-40021, CVE-2025-40022, CVE-2025-40026, CVE-2025-40027, CVE-2025-40029, CVE-2025-40030, CVE-2025-40035, CVE-2025-40042, CVE-2025-40044, CVE-2025-40048, CVE-2025-40049, CVE-2025-40053, CVE-2025-40055, CVE-2025-40070, CVE-2025-40078, CVE-2025-40081, CVE-2025-40083, CVE-2025-40087, CVE-2025-40088, CVE-2025-40105, CVE-2025-40106, CVE-2025-40109, CVE-2025-40111, CVE-2025-40115, CVE-2025-40116, CVE-2025-40118, CVE-2025-40121, CVE-2025-40125, CVE-2025-40127, CVE-2025-40134, CVE-2025-40140, CVE-2025-40153, CVE-2025-40154, CVE-2025-40167, CVE-2025-40173, CVE-2025-40178, CVE-2025-40183, CVE-2025-40186, CVE-2025-40187, CVE-2025-40188, CVE-2025-40190, CVE-2025-40194, CVE-2025-40197, CVE-2025-40198, CVE-2025-40200, CVE-2025-40204, CVE-2025-40205, CVE-2025-40211, CVE-2025-40219, CVE-2025-40220, CVE-2025-40223, CVE-2025-40231, CVE-2025-40233, CVE-2025-40240, CVE-2025-40243, CVE-2025-40244, CVE-2025-40248, CVE-2025-40254, CVE-2025-40257, CVE-2025-40258, CVE-2025-40259, CVE-2025-40261, CVE-2025-40262, CVE-2025-40263, CVE-2025-40264, CVE-2025-40269, CVE-2025-40271, CVE-2025-40273, CVE-2025-40275, CVE-2025-40277, CVE-2025-40278, CVE-2025-40280, CVE-2025-40281, CVE-2025-40282, CVE-2025-40283, CVE-2025-40304, CVE-2025-40306, CVE-2025-40308, CVE-2025-40309, CVE-2025-40312, CVE-2025-40315, CVE-2025-40317, CVE-2025-40319, CVE-2025-40321, CVE-2025-40322, CVE-2025-40324, CVE-2025-40331, CVE-2025-40342