Debian dsa-5681 : affs-modules-5.10.0-29-4kc-malta-di - security update

high Nessus Plugin ID 195025

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5681 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-5681-1 [email protected] https://www.debian.org/security/ Salvatore Bonaccorso May 06, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux CVE ID : CVE-2023-6270 CVE-2023-7042 CVE-2023-28746 CVE-2023-47233 CVE-2023-52429 CVE-2023-52434 CVE-2023-52435 CVE-2023-52447 CVE-2023-52458 CVE-2023-52482 CVE-2023-52486 CVE-2023-52488 CVE-2023-52489 CVE-2023-52491 CVE-2023-52492 CVE-2023-52493 CVE-2023-52497 CVE-2023-52498 CVE-2023-52583 CVE-2023-52587 CVE-2023-52594 CVE-2023-52595 CVE-2023-52597 CVE-2023-52598 CVE-2023-52599 CVE-2023-52600 CVE-2023-52601 CVE-2023-52602 CVE-2023-52603 CVE-2023-52604 CVE-2023-52606 CVE-2023-52607 CVE-2023-52614 CVE-2023-52615 CVE-2023-52616 CVE-2023-52617 CVE-2023-52618 CVE-2023-52619 CVE-2023-52620 CVE-2023-52622 CVE-2023-52623 CVE-2023-52627 CVE-2023-52635 CVE-2023-52637 CVE-2023-52642 CVE-2023-52644 CVE-2023-52650 CVE-2024-0340 CVE-2024-0565 CVE-2024-0607 CVE-2024-0841 CVE-2024-1151 CVE-2024-22099 CVE-2024-23849 CVE-2024-23850 CVE-2024-23851 CVE-2024-24857 CVE-2024-24858 CVE-2024-24861 CVE-2024-26581 CVE-2024-26593 CVE-2024-26600 CVE-2024-26601 CVE-2024-26602 CVE-2024-26606 CVE-2024-26610 CVE-2024-26614 CVE-2024-26615 CVE-2024-26622 CVE-2024-26625 CVE-2024-26627 CVE-2024-26635 CVE-2024-26636 CVE-2024-26640 CVE-2024-26641 CVE-2024-26642 CVE-2024-26643 CVE-2024-26644 CVE-2024-26645 CVE-2024-26651 CVE-2024-26654 CVE-2024-26659 CVE-2024-26663 CVE-2024-26664 CVE-2024-26665 CVE-2024-26671 CVE-2024-26673 CVE-2024-26675 CVE-2024-26679 CVE-2024-26684 CVE-2024-26685 CVE-2024-26687 CVE-2024-26688 CVE-2024-26689 CVE-2024-26695 CVE-2024-26696 CVE-2024-26697 CVE-2024-26698 CVE-2024-26702 CVE-2024-26704 CVE-2024-26707 CVE-2024-26712 CVE-2024-26720 CVE-2024-26722 CVE-2024-26727 CVE-2024-26733 CVE-2024-26735 CVE-2024-26736 CVE-2024-26743 CVE-2024-26744 CVE-2024-26747 CVE-2024-26748 CVE-2024-26749 CVE-2024-26751 CVE-2024-26752 CVE-2024-26753 CVE-2024-26754 CVE-2024-26763 CVE-2024-26764 CVE-2024-26766 CVE-2024-26771 CVE-2024-26772 CVE-2024-26773 CVE-2024-26776 CVE-2024-26777 CVE-2024-26778 CVE-2024-26779 CVE-2024-26781 CVE-2024-26782 CVE-2024-26787 CVE-2024-26788 CVE-2024-26790 CVE-2024-26791 CVE-2024-26793 CVE-2024-26795 CVE-2024-26801 CVE-2024-26804 CVE-2024-26805 CVE-2024-26808 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26816 CVE-2024-26817 CVE-2024-26820 CVE-2024-26825 CVE-2024-26833 CVE-2024-26835 CVE-2024-26839 CVE-2024-26840 CVE-2024-26843 CVE-2024-26845 CVE-2024-26846 CVE-2024-26848 CVE-2024-26851 CVE-2024-26852 CVE-2024-26855 CVE-2024-26857 CVE-2024-26859 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26870 CVE-2024-26872 CVE-2024-26874 CVE-2024-26875 CVE-2024-26877 CVE-2024-26878 CVE-2024-26880 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26889 CVE-2024-26891 CVE-2024-26894 CVE-2024-26895 CVE-2024-26897 CVE-2024-26898 CVE-2024-26901 CVE-2024-26903 CVE-2024-26906 CVE-2024-26907 CVE-2024-26910 CVE-2024-26917 CVE-2024-26920 CVE-2024-26922 CVE-2024-26923 CVE-2024-26924 CVE-2024-26925 CVE-2024-26926 CVE-2024-26931 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26950 CVE-2024-26951 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26960 CVE-2024-26961 CVE-2024-26965 CVE-2024-26966 CVE-2024-26969 CVE-2024-26970 CVE-2024-26973 CVE-2024-26974 CVE-2024-26976 CVE-2024-26978 CVE-2024-26979 CVE-2024-26981 CVE-2024-26984 CVE-2024-26988 CVE-2024-26993 CVE-2024-26994 CVE-2024-26997 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27004 CVE-2024-27008 CVE-2024-27013 CVE-2024-27020 CVE-2024-27024 CVE-2024-27025 CVE-2024-27028 CVE-2024-27030 CVE-2024-27038 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27059 CVE-2024-27065 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27388 CVE-2024-27437

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

For the oldstable distribution (bullseye), these problems have been fixed in version 5.10.216-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the affs-modules-5.10.0-29-4kc-malta-di packages.

See Also

https://security-tracker.debian.org/tracker/CVE-2023-52604

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2023-28746

https://security-tracker.debian.org/tracker/CVE-2023-47233

https://security-tracker.debian.org/tracker/CVE-2023-52429

https://security-tracker.debian.org/tracker/CVE-2023-52434

https://security-tracker.debian.org/tracker/CVE-2023-52435

https://security-tracker.debian.org/tracker/CVE-2023-52447

https://security-tracker.debian.org/tracker/CVE-2023-52458

https://security-tracker.debian.org/tracker/CVE-2023-52482

https://security-tracker.debian.org/tracker/CVE-2023-52486

https://security-tracker.debian.org/tracker/CVE-2023-52488

https://security-tracker.debian.org/tracker/CVE-2023-52489

https://security-tracker.debian.org/tracker/CVE-2023-52491

https://security-tracker.debian.org/tracker/CVE-2023-52492

https://security-tracker.debian.org/tracker/CVE-2023-52493

https://security-tracker.debian.org/tracker/CVE-2023-52497

https://security-tracker.debian.org/tracker/CVE-2023-52498

https://security-tracker.debian.org/tracker/CVE-2023-52583

https://security-tracker.debian.org/tracker/CVE-2023-52587

https://security-tracker.debian.org/tracker/CVE-2023-52594

https://security-tracker.debian.org/tracker/CVE-2023-52595

https://security-tracker.debian.org/tracker/CVE-2023-52597

https://security-tracker.debian.org/tracker/CVE-2023-52598

https://security-tracker.debian.org/tracker/CVE-2023-52606

https://security-tracker.debian.org/tracker/CVE-2023-52607

https://security-tracker.debian.org/tracker/CVE-2023-52614

https://security-tracker.debian.org/tracker/CVE-2023-52615

https://security-tracker.debian.org/tracker/CVE-2024-26689

https://security-tracker.debian.org/tracker/CVE-2024-26695

https://security-tracker.debian.org/tracker/CVE-2024-26696

https://security-tracker.debian.org/tracker/CVE-2024-26697

https://security-tracker.debian.org/tracker/CVE-2024-26698

https://security-tracker.debian.org/tracker/CVE-2024-26702

https://security-tracker.debian.org/tracker/CVE-2024-26704

https://security-tracker.debian.org/tracker/CVE-2024-26707

https://security-tracker.debian.org/tracker/CVE-2024-26712

https://security-tracker.debian.org/tracker/CVE-2024-26720

https://security-tracker.debian.org/tracker/CVE-2024-26722

https://security-tracker.debian.org/tracker/CVE-2024-26727

https://security-tracker.debian.org/tracker/CVE-2024-26753

https://security-tracker.debian.org/tracker/CVE-2024-26754

https://security-tracker.debian.org/tracker/CVE-2024-26763

https://security-tracker.debian.org/tracker/CVE-2024-26764

https://security-tracker.debian.org/tracker/CVE-2024-26766

https://security-tracker.debian.org/tracker/CVE-2024-26771

https://security-tracker.debian.org/tracker/CVE-2024-26772

https://security-tracker.debian.org/tracker/CVE-2024-26773

https://security-tracker.debian.org/tracker/CVE-2024-26776

https://security-tracker.debian.org/tracker/CVE-2024-26777

https://security-tracker.debian.org/tracker/CVE-2024-26801

https://security-tracker.debian.org/tracker/CVE-2024-26804

https://security-tracker.debian.org/tracker/CVE-2024-26805

https://security-tracker.debian.org/tracker/CVE-2024-26808

https://security-tracker.debian.org/tracker/CVE-2024-26809

https://security-tracker.debian.org/tracker/CVE-2024-26810

https://security-tracker.debian.org/tracker/CVE-2024-26812

https://security-tracker.debian.org/tracker/CVE-2024-26813

https://security-tracker.debian.org/tracker/CVE-2024-26814

https://security-tracker.debian.org/tracker/CVE-2024-26816

https://security-tracker.debian.org/tracker/CVE-2024-26817

https://security-tracker.debian.org/tracker/CVE-2024-26820

https://security-tracker.debian.org/tracker/CVE-2024-26825

https://security-tracker.debian.org/tracker/CVE-2024-26833

https://security-tracker.debian.org/tracker/CVE-2024-26835

https://security-tracker.debian.org/tracker/CVE-2024-26839

https://security-tracker.debian.org/tracker/CVE-2024-26840

https://security-tracker.debian.org/tracker/CVE-2024-26843

https://security-tracker.debian.org/tracker/CVE-2024-26845

https://security-tracker.debian.org/tracker/CVE-2024-26846

https://security-tracker.debian.org/tracker/CVE-2024-26848

https://security-tracker.debian.org/tracker/CVE-2024-26851

https://security-tracker.debian.org/tracker/CVE-2024-26907

https://security-tracker.debian.org/tracker/CVE-2024-26910

https://security-tracker.debian.org/tracker/CVE-2024-26917

https://security-tracker.debian.org/tracker/CVE-2024-26920

https://security-tracker.debian.org/tracker/CVE-2024-26922

https://security-tracker.debian.org/tracker/CVE-2024-26923

https://security-tracker.debian.org/tracker/CVE-2024-26924

https://security-tracker.debian.org/tracker/CVE-2024-26925

https://security-tracker.debian.org/tracker/CVE-2024-26926

https://security-tracker.debian.org/tracker/CVE-2024-26931

https://security-tracker.debian.org/tracker/CVE-2024-26934

https://security-tracker.debian.org/tracker/CVE-2024-26935

https://security-tracker.debian.org/tracker/CVE-2024-26937

https://security-tracker.debian.org/tracker/CVE-2024-26950

https://security-tracker.debian.org/tracker/CVE-2024-26951

https://security-tracker.debian.org/tracker/CVE-2024-26955

https://security-tracker.debian.org/tracker/CVE-2024-26956

https://security-tracker.debian.org/tracker/CVE-2024-26957

https://security-tracker.debian.org/tracker/CVE-2024-26958

https://security-tracker.debian.org/tracker/CVE-2024-26960

https://security-tracker.debian.org/tracker/CVE-2024-26961

https://security-tracker.debian.org/tracker/CVE-2024-26965

https://security-tracker.debian.org/tracker/CVE-2024-26966

https://security-tracker.debian.org/tracker/CVE-2024-26969

https://security-tracker.debian.org/tracker/CVE-2024-26970

https://security-tracker.debian.org/tracker/CVE-2024-26973

https://security-tracker.debian.org/tracker/CVE-2024-26974

https://security-tracker.debian.org/tracker/CVE-2024-27388

https://security-tracker.debian.org/tracker/CVE-2023-52599

https://security-tracker.debian.org/tracker/CVE-2023-52600

https://security-tracker.debian.org/tracker/CVE-2023-52601

https://security-tracker.debian.org/tracker/CVE-2023-52602

https://security-tracker.debian.org/tracker/CVE-2023-52603

https://security-tracker.debian.org/tracker/CVE-2023-52616

https://security-tracker.debian.org/tracker/CVE-2023-52617

https://security-tracker.debian.org/tracker/CVE-2023-52618

https://security-tracker.debian.org/tracker/CVE-2023-52619

https://security-tracker.debian.org/tracker/CVE-2023-52620

https://security-tracker.debian.org/tracker/CVE-2023-52622

https://security-tracker.debian.org/tracker/CVE-2023-52623

https://security-tracker.debian.org/tracker/CVE-2023-52627

https://security-tracker.debian.org/tracker/CVE-2023-52635

https://security-tracker.debian.org/tracker/CVE-2023-52637

https://security-tracker.debian.org/tracker/CVE-2023-52642

https://security-tracker.debian.org/tracker/CVE-2023-52644

https://security-tracker.debian.org/tracker/CVE-2023-52650

https://security-tracker.debian.org/tracker/CVE-2023-6270

https://security-tracker.debian.org/tracker/CVE-2023-7042

https://security-tracker.debian.org/tracker/CVE-2024-0340

https://security-tracker.debian.org/tracker/CVE-2024-0565

https://security-tracker.debian.org/tracker/CVE-2024-0607

https://security-tracker.debian.org/tracker/CVE-2024-0841

https://security-tracker.debian.org/tracker/CVE-2024-1151

https://security-tracker.debian.org/tracker/CVE-2024-22099

https://security-tracker.debian.org/tracker/CVE-2024-23849

https://security-tracker.debian.org/tracker/CVE-2024-23850

https://security-tracker.debian.org/tracker/CVE-2024-23851

https://security-tracker.debian.org/tracker/CVE-2024-24857

https://security-tracker.debian.org/tracker/CVE-2024-24858

https://security-tracker.debian.org/tracker/CVE-2024-24861

https://security-tracker.debian.org/tracker/CVE-2024-26581

https://security-tracker.debian.org/tracker/CVE-2024-26593

https://security-tracker.debian.org/tracker/CVE-2024-26600

https://security-tracker.debian.org/tracker/CVE-2024-26601

https://security-tracker.debian.org/tracker/CVE-2024-26602

https://security-tracker.debian.org/tracker/CVE-2024-26606

https://security-tracker.debian.org/tracker/CVE-2024-26610

https://security-tracker.debian.org/tracker/CVE-2024-26614

https://security-tracker.debian.org/tracker/CVE-2024-26615

https://security-tracker.debian.org/tracker/CVE-2024-26622

https://security-tracker.debian.org/tracker/CVE-2024-26625

https://security-tracker.debian.org/tracker/CVE-2024-26627

https://security-tracker.debian.org/tracker/CVE-2024-26635

https://security-tracker.debian.org/tracker/CVE-2024-26636

https://security-tracker.debian.org/tracker/CVE-2024-26640

https://security-tracker.debian.org/tracker/CVE-2024-26641

https://security-tracker.debian.org/tracker/CVE-2024-26642

https://security-tracker.debian.org/tracker/CVE-2024-26643

https://security-tracker.debian.org/tracker/CVE-2024-26644

https://security-tracker.debian.org/tracker/CVE-2024-26645

https://security-tracker.debian.org/tracker/CVE-2024-26651

https://security-tracker.debian.org/tracker/CVE-2024-26654

https://security-tracker.debian.org/tracker/CVE-2024-26659

https://security-tracker.debian.org/tracker/CVE-2024-26663

https://security-tracker.debian.org/tracker/CVE-2024-26664

https://security-tracker.debian.org/tracker/CVE-2024-26665

https://security-tracker.debian.org/tracker/CVE-2024-26671

https://security-tracker.debian.org/tracker/CVE-2024-26673

https://security-tracker.debian.org/tracker/CVE-2024-26675

https://security-tracker.debian.org/tracker/CVE-2024-26679

https://security-tracker.debian.org/tracker/CVE-2024-26684

https://security-tracker.debian.org/tracker/CVE-2024-26685

https://security-tracker.debian.org/tracker/CVE-2024-26687

https://security-tracker.debian.org/tracker/CVE-2024-26688

https://security-tracker.debian.org/tracker/CVE-2024-26733

https://security-tracker.debian.org/tracker/CVE-2024-26735

https://security-tracker.debian.org/tracker/CVE-2024-26736

https://security-tracker.debian.org/tracker/CVE-2024-26743

https://security-tracker.debian.org/tracker/CVE-2024-26744

https://security-tracker.debian.org/tracker/CVE-2024-26747

https://security-tracker.debian.org/tracker/CVE-2024-26748

https://security-tracker.debian.org/tracker/CVE-2024-26749

https://security-tracker.debian.org/tracker/CVE-2024-26751

https://security-tracker.debian.org/tracker/CVE-2024-26752

https://security-tracker.debian.org/tracker/CVE-2024-26778

https://security-tracker.debian.org/tracker/CVE-2024-26779

https://security-tracker.debian.org/tracker/CVE-2024-26781

https://security-tracker.debian.org/tracker/CVE-2024-26782

https://security-tracker.debian.org/tracker/CVE-2024-26787

https://security-tracker.debian.org/tracker/CVE-2024-26788

https://security-tracker.debian.org/tracker/CVE-2024-26790

https://security-tracker.debian.org/tracker/CVE-2024-26791

https://security-tracker.debian.org/tracker/CVE-2024-26793

https://security-tracker.debian.org/tracker/CVE-2024-26795

https://security-tracker.debian.org/tracker/CVE-2024-26852

https://security-tracker.debian.org/tracker/CVE-2024-26855

https://security-tracker.debian.org/tracker/CVE-2024-26857

https://security-tracker.debian.org/tracker/CVE-2024-26859

https://security-tracker.debian.org/tracker/CVE-2024-26861

https://security-tracker.debian.org/tracker/CVE-2024-26862

https://security-tracker.debian.org/tracker/CVE-2024-26863

https://security-tracker.debian.org/tracker/CVE-2024-26870

https://security-tracker.debian.org/tracker/CVE-2024-26872

https://security-tracker.debian.org/tracker/CVE-2024-26874

https://security-tracker.debian.org/tracker/CVE-2024-26875

https://security-tracker.debian.org/tracker/CVE-2024-26877

https://security-tracker.debian.org/tracker/CVE-2024-26878

https://security-tracker.debian.org/tracker/CVE-2024-26880

https://security-tracker.debian.org/tracker/CVE-2024-26882

https://security-tracker.debian.org/tracker/CVE-2024-26883

https://security-tracker.debian.org/tracker/CVE-2024-26884

https://security-tracker.debian.org/tracker/CVE-2024-26885

https://security-tracker.debian.org/tracker/CVE-2024-26889

https://security-tracker.debian.org/tracker/CVE-2024-26891

https://security-tracker.debian.org/tracker/CVE-2024-26894

https://security-tracker.debian.org/tracker/CVE-2024-26895

https://security-tracker.debian.org/tracker/CVE-2024-26897

https://security-tracker.debian.org/tracker/CVE-2024-26898

https://security-tracker.debian.org/tracker/CVE-2024-26901

https://security-tracker.debian.org/tracker/CVE-2024-26903

https://security-tracker.debian.org/tracker/CVE-2024-26906

https://security-tracker.debian.org/tracker/CVE-2024-26976

https://security-tracker.debian.org/tracker/CVE-2024-26978

https://security-tracker.debian.org/tracker/CVE-2024-26979

https://security-tracker.debian.org/tracker/CVE-2024-26981

https://security-tracker.debian.org/tracker/CVE-2024-26984

https://security-tracker.debian.org/tracker/CVE-2024-26988

https://security-tracker.debian.org/tracker/CVE-2024-26993

https://security-tracker.debian.org/tracker/CVE-2024-26994

https://security-tracker.debian.org/tracker/CVE-2024-26997

https://security-tracker.debian.org/tracker/CVE-2024-26999

https://security-tracker.debian.org/tracker/CVE-2024-27000

https://security-tracker.debian.org/tracker/CVE-2024-27001

https://security-tracker.debian.org/tracker/CVE-2024-27004

https://security-tracker.debian.org/tracker/CVE-2024-27008

https://security-tracker.debian.org/tracker/CVE-2024-27013

https://security-tracker.debian.org/tracker/CVE-2024-27020

https://security-tracker.debian.org/tracker/CVE-2024-27024

https://security-tracker.debian.org/tracker/CVE-2024-27025

https://security-tracker.debian.org/tracker/CVE-2024-27028

https://security-tracker.debian.org/tracker/CVE-2024-27030

https://security-tracker.debian.org/tracker/CVE-2024-27038

https://security-tracker.debian.org/tracker/CVE-2024-27043

https://security-tracker.debian.org/tracker/CVE-2024-27044

https://security-tracker.debian.org/tracker/CVE-2024-27045

https://security-tracker.debian.org/tracker/CVE-2024-27046

https://security-tracker.debian.org/tracker/CVE-2024-27047

https://security-tracker.debian.org/tracker/CVE-2024-27051

https://security-tracker.debian.org/tracker/CVE-2024-27052

https://security-tracker.debian.org/tracker/CVE-2024-27053

https://security-tracker.debian.org/tracker/CVE-2024-27059

https://security-tracker.debian.org/tracker/CVE-2024-27065

https://security-tracker.debian.org/tracker/CVE-2024-27073

https://security-tracker.debian.org/tracker/CVE-2024-27074

https://security-tracker.debian.org/tracker/CVE-2024-27075

https://security-tracker.debian.org/tracker/CVE-2024-27076

https://security-tracker.debian.org/tracker/CVE-2024-27077

https://security-tracker.debian.org/tracker/CVE-2024-27078

https://security-tracker.debian.org/tracker/CVE-2024-27437

https://packages.debian.org/source/bullseye/linux

Plugin Details

Severity: High

ID: 195025

File Name: debian_DSA-5681.nasl

Version: 1.4

Type: local

Agent: unix

Published: 5/6/2024

Updated: 9/10/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 7.7

Temporal Score: 6

Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-0565

CVSS v3

Risk Factor: High

Base Score: 8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2023-52434

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-common, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5kc-malta, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp-dbg, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-5kc-malta, p-cpe:/a:debian:debian_linux:dasd-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-5kc-malta-dbg, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-4kc-malta, p-cpe:/a:debian:debian_linux:linux-image-5kc-malta-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-marvell, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-rpi, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-armmp, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-rt-armmp, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:hypervisor-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:serial-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:mtd-core-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:mtd-core-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:affs-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rpi, p-cpe:/a:debian:debian_linux:linux-image-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-s390x-dbg, p-cpe:/a:debian:debian_linux:linux-image-marvell-dbg, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:dasd-extra-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:xfs-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-5kc-malta, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:mtd-core-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-powerpc64le, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-dbg, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:nfs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-octeon, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:firewire-core-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:firewire-core-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-s390x, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-loongson-3-dbg, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-arm, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-image-loongson-3-dbg, p-cpe:/a:debian:debian_linux:jffs2-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-4kc-malta, p-cpe:/a:debian:debian_linux:linux-image-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rpi-dbg, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp, p-cpe:/a:debian:debian_linux:mouse-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:mouse-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:minix-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-dbg, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-armmp-lpae, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-4kc-malta, p-cpe:/a:debian:debian_linux:xfs-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-loongson-3, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-arm64, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:mmc-core-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:sound-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-29, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-s390x-dbg, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rpi, p-cpe:/a:debian:debian_linux:mmc-core-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:xfs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-octeon-dbg, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-octeon-dbg, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:xfs-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp, p-cpe:/a:debian:debian_linux:xfs-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-powerpc64le, p-cpe:/a:debian:debian_linux:mtd-core-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-doc, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-s390x, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-perf, p-cpe:/a:debian:debian_linux:speakup-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-4kc-malta-dbg, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:sound-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-image-686-pae-dbg, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-amd64, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-arm64-dbg, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:minix-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-marvell-dbg, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-octeon, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-x86, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:sound-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-686-dbg, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-marvell, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-rt-686-pae, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-powerpc64le, p-cpe:/a:debian:debian_linux:mtd-core-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:bpftool, p-cpe:/a:debian:debian_linux:ipv6-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-powerpc64le-dbg, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-686-dbg, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-marvell, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-arm64, p-cpe:/a:debian:debian_linux:minix-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:affs-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-powerpc64le-dbg, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-loongson-3, p-cpe:/a:debian:debian_linux:linux-source, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-loongson-3, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-dbg, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:sound-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-s390, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:linux-image-rpi-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-armmp, p-cpe:/a:debian:debian_linux:rtc-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-i386-signed-template, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-amd64, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-powerpc64le, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-rpi, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:fancontrol-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-loongson-3, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-octeon, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-4kc-malta-dbg, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:affs-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:mmc-core-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-powerpc64le-di, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-cloud-amd64, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:affs-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-headers-s390x, p-cpe:/a:debian:debian_linux:linux-headers-armmp, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-cloud-arm64, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp-lpae, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-29-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:minix-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-armmp-lpae, p-cpe:/a:debian:debian_linux:minix-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:mouse-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-marvell, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-s390x, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-29-s390x-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:mtd-core-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:xfs-modules-5.10.0-29-octeon-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-common-rt, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-29-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:mouse-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-29-5kc-malta-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-29-4kc-malta-di, p-cpe:/a:debian:debian_linux:linux-image-4kc-malta, p-cpe:/a:debian:debian_linux:linux-headers-octeon, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-29-686, p-cpe:/a:debian:debian_linux:linux-image-5kc-malta, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-29-powerpc64le-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-29-loongson-3-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-29-marvell-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-29-powerpc64le-di

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/6/2024

Vulnerability Publication Date: 11/3/2023

Reference Information

CVE: CVE-2023-28746, CVE-2023-47233, CVE-2023-52429, CVE-2023-52434, CVE-2023-52435, CVE-2023-52447, CVE-2023-52458, CVE-2023-52482, CVE-2023-52486, CVE-2023-52488, CVE-2023-52489, CVE-2023-52491, CVE-2023-52492, CVE-2023-52493, CVE-2023-52497, CVE-2023-52498, CVE-2023-52583, CVE-2023-52587, CVE-2023-52594, CVE-2023-52595, CVE-2023-52597, CVE-2023-52598, CVE-2023-52599, CVE-2023-52600, CVE-2023-52601, CVE-2023-52602, CVE-2023-52603, CVE-2023-52604, CVE-2023-52606, CVE-2023-52607, CVE-2023-52614, CVE-2023-52615, CVE-2023-52616, CVE-2023-52617, CVE-2023-52618, CVE-2023-52619, CVE-2023-52620, CVE-2023-52622, CVE-2023-52623, CVE-2023-52627, CVE-2023-52635, CVE-2023-52637, CVE-2023-52642, CVE-2023-52644, CVE-2023-52650, CVE-2023-6270, CVE-2023-7042, CVE-2024-0340, CVE-2024-0565, CVE-2024-0607, CVE-2024-0841, CVE-2024-1151, CVE-2024-22099, CVE-2024-23849, CVE-2024-23850, CVE-2024-23851, CVE-2024-24857, CVE-2024-24858, CVE-2024-24861, CVE-2024-26581, CVE-2024-26593, CVE-2024-26600, CVE-2024-26601, CVE-2024-26602, CVE-2024-26606, CVE-2024-26610, CVE-2024-26614, CVE-2024-26615, CVE-2024-26622, CVE-2024-26625, CVE-2024-26627, CVE-2024-26635, CVE-2024-26636, CVE-2024-26640, CVE-2024-26641, CVE-2024-26642, CVE-2024-26643, CVE-2024-26644, CVE-2024-26645, CVE-2024-26651, CVE-2024-26654, CVE-2024-26659, CVE-2024-26663, CVE-2024-26664, CVE-2024-26665, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26695, CVE-2024-26696, CVE-2024-26697, CVE-2024-26698, CVE-2024-26702, CVE-2024-26704, CVE-2024-26707, CVE-2024-26712, CVE-2024-26720, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26735, CVE-2024-26736, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26748, CVE-2024-26749, CVE-2024-26751, CVE-2024-26752, CVE-2024-26753, CVE-2024-26754, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26781, CVE-2024-26782, CVE-2024-26787, CVE-2024-26788, CVE-2024-26790, CVE-2024-26791, CVE-2024-26793, CVE-2024-26795, CVE-2024-26801, CVE-2024-26804, CVE-2024-26805, CVE-2024-26808, CVE-2024-26809, CVE-2024-26810, CVE-2024-26812, CVE-2024-26813, CVE-2024-26814, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26833, CVE-2024-26835, CVE-2024-26839, CVE-2024-26840, CVE-2024-26843, CVE-2024-26845, CVE-2024-26846, CVE-2024-26848, CVE-2024-26851, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26870, CVE-2024-26872, CVE-2024-26874, CVE-2024-26875, CVE-2024-26877, CVE-2024-26878, CVE-2024-26880, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26889, CVE-2024-26891, CVE-2024-26894, CVE-2024-26895, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26907, CVE-2024-26910, CVE-2024-26917, CVE-2024-26920, CVE-2024-26922, CVE-2024-26923, CVE-2024-26924, CVE-2024-26925, CVE-2024-26926, CVE-2024-26931, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26973, CVE-2024-26974, CVE-2024-26976, CVE-2024-26978, CVE-2024-26979, CVE-2024-26981, CVE-2024-26984, CVE-2024-26988, CVE-2024-26993, CVE-2024-26994, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27004, CVE-2024-27008, CVE-2024-27013, CVE-2024-27020, CVE-2024-27024, CVE-2024-27025, CVE-2024-27028, CVE-2024-27030, CVE-2024-27038, CVE-2024-27043, CVE-2024-27044, CVE-2024-27045, CVE-2024-27046, CVE-2024-27047, CVE-2024-27051, CVE-2024-27052, CVE-2024-27053, CVE-2024-27059, CVE-2024-27065, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27437