Debian dla-3842 : linux-config-5.10 - security update

high Nessus Plugin ID 201105

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3842 advisory.

------------------------------------------------------------------------- Debian LTS Advisory DLA-3842-1 [email protected] https://www.debian.org/lts/security/ Ben Hutchings June 25, 2024 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : linux-5.10 Version : 5.10.216-1~deb10u1 CVE ID : CVE-2022-38096 CVE-2023-6270 CVE-2023-7042 CVE-2023-28746 CVE-2023-47233 CVE-2023-52429 CVE-2023-52434 CVE-2023-52435 CVE-2023-52447 CVE-2023-52458 CVE-2023-52482 CVE-2023-52486 CVE-2023-52488 CVE-2023-52489 CVE-2023-52491 CVE-2023-52492 CVE-2023-52493 CVE-2023-52497 CVE-2023-52498 CVE-2023-52583 CVE-2023-52587 CVE-2023-52594 CVE-2023-52595 CVE-2023-52597 CVE-2023-52598 CVE-2023-52599 CVE-2023-52600 CVE-2023-52601 CVE-2023-52602 CVE-2023-52603 CVE-2023-52604 CVE-2023-52606 CVE-2023-52607 CVE-2023-52614 CVE-2023-52615 CVE-2023-52616 CVE-2023-52617 CVE-2023-52618 CVE-2023-52619 CVE-2023-52620 CVE-2023-52622 CVE-2023-52623 CVE-2023-52627 CVE-2023-52635 CVE-2023-52637 CVE-2023-52642 CVE-2023-52644 CVE-2023-52650 CVE-2023-52656 CVE-2023-52669 CVE-2023-52670 CVE-2023-52672 CVE-2023-52699 CVE-2023-52880 CVE-2024-0340 CVE-2024-0565 CVE-2024-0607 CVE-2024-0841 CVE-2024-1151 CVE-2024-22099 CVE-2024-23849 CVE-2024-23850 CVE-2024-23851 CVE-2024-24857 CVE-2024-24858 CVE-2024-24861 CVE-2024-25739 CVE-2024-26581 CVE-2024-26593 CVE-2024-26600 CVE-2024-26601 CVE-2024-26602 CVE-2024-26606 CVE-2024-26610 CVE-2024-26614 CVE-2024-26615 CVE-2024-26622 CVE-2024-26625 CVE-2024-26627 CVE-2024-26635 CVE-2024-26636 CVE-2024-26640 CVE-2024-26641 CVE-2024-26642 CVE-2024-26643 CVE-2024-26644 CVE-2024-26645 CVE-2024-26651 CVE-2024-26654 CVE-2024-26659 CVE-2024-26663 CVE-2024-26664 CVE-2024-26665 CVE-2024-26671 CVE-2024-26673 CVE-2024-26675 CVE-2024-26679 CVE-2024-26684 CVE-2024-26685 CVE-2024-26687 CVE-2024-26688 CVE-2024-26689 CVE-2024-26695 CVE-2024-26696 CVE-2024-26697 CVE-2024-26698 CVE-2024-26702 CVE-2024-26704 CVE-2024-26707 CVE-2024-26712 CVE-2024-26720 CVE-2024-26722 CVE-2024-26727 CVE-2024-26733 CVE-2024-26735 CVE-2024-26736 CVE-2024-26743 CVE-2024-26744 CVE-2024-26747 CVE-2024-26748 CVE-2024-26749 CVE-2024-26751 CVE-2024-26752 CVE-2024-26753 CVE-2024-26754 CVE-2024-26763 CVE-2024-26764 CVE-2024-26766 CVE-2024-26771 CVE-2024-26772 CVE-2024-26773 CVE-2024-26776 CVE-2024-26777 CVE-2024-26778 CVE-2024-26779 CVE-2024-26781 CVE-2024-26782 CVE-2024-26787 CVE-2024-26788 CVE-2024-26790 CVE-2024-26791 CVE-2024-26793 CVE-2024-26795 CVE-2024-26801 CVE-2024-26804 CVE-2024-26805 CVE-2024-26808 CVE-2024-26809 CVE-2024-26810 CVE-2024-26812 CVE-2024-26813 CVE-2024-26814 CVE-2024-26816 CVE-2024-26817 CVE-2024-26820 CVE-2024-26825 CVE-2024-26833 CVE-2024-26835 CVE-2024-26839 CVE-2024-26840 CVE-2024-26843 CVE-2024-26845 CVE-2024-26846 CVE-2024-26848 CVE-2024-26851 CVE-2024-26852 CVE-2024-26855 CVE-2024-26857 CVE-2024-26859 CVE-2024-26861 CVE-2024-26862 CVE-2024-26863 CVE-2024-26870 CVE-2024-26872 CVE-2024-26874 CVE-2024-26875 CVE-2024-26877 CVE-2024-26878 CVE-2024-26880 CVE-2024-26882 CVE-2024-26883 CVE-2024-26884 CVE-2024-26885 CVE-2024-26889 CVE-2024-26891 CVE-2024-26894 CVE-2024-26895 CVE-2024-26897 CVE-2024-26898 CVE-2024-26901 CVE-2024-26903 CVE-2024-26906 CVE-2024-26907 CVE-2024-26910 CVE-2024-26917 CVE-2024-26922 CVE-2024-26923 CVE-2024-26924 CVE-2024-26925 CVE-2024-26926 CVE-2024-26931 CVE-2024-26934 CVE-2024-26935 CVE-2024-26937 CVE-2024-26950 CVE-2024-26951 CVE-2024-26955 CVE-2024-26956 CVE-2024-26957 CVE-2024-26958 CVE-2024-26960 CVE-2024-26961 CVE-2024-26965 CVE-2024-26966 CVE-2024-26969 CVE-2024-26970 CVE-2024-26973 CVE-2024-26974 CVE-2024-26976 CVE-2024-26978 CVE-2024-26981 CVE-2024-26984 CVE-2024-26988 CVE-2024-26993 CVE-2024-26994 CVE-2024-26997 CVE-2024-26999 CVE-2024-27000 CVE-2024-27001 CVE-2024-27004 CVE-2024-27008 CVE-2024-27013 CVE-2024-27020 CVE-2024-27024 CVE-2024-27025 CVE-2024-27028 CVE-2024-27030 CVE-2024-27038 CVE-2024-27043 CVE-2024-27044 CVE-2024-27045 CVE-2024-27046 CVE-2024-27047 CVE-2024-27051 CVE-2024-27052 CVE-2024-27053 CVE-2024-27059 CVE-2024-27065 CVE-2024-27073 CVE-2024-27074 CVE-2024-27075 CVE-2024-27076 CVE-2024-27077 CVE-2024-27078 CVE-2024-27388 CVE-2024-27395 CVE-2024-27396 CVE-2024-27405 CVE-2024-27410 CVE-2024-27412 CVE-2024-27413 CVE-2024-27414 CVE-2024-27416 CVE-2024-27417 CVE-2024-27419 CVE-2024-27431 CVE-2024-27436 CVE-2024-27437 CVE-2024-35785 CVE-2024-35789 CVE-2024-35791 CVE-2024-35796 CVE-2024-35805 CVE-2024-35806 CVE-2024-35807 CVE-2024-35809 CVE-2024-35811 CVE-2024-35813 CVE-2024-35815 CVE-2024-35819 CVE-2024-35821 CVE-2024-35822 CVE-2024-35823 CVE-2024-35825 CVE-2024-35828 CVE-2024-35829 CVE-2024-35830 CVE-2024-35833 CVE-2024-35835 CVE-2024-35837 CVE-2024-35845 CVE-2024-35847 CVE-2024-35849 CVE-2024-35852 CVE-2024-35853 CVE-2024-35854 CVE-2024-35855 CVE-2024-35871 CVE-2024-35877 CVE-2024-35879 CVE-2024-35884 CVE-2024-35886 CVE-2024-35888 CVE-2024-35893 CVE-2024-35895 CVE-2024-35896 CVE-2024-35897 CVE-2024-35898 CVE-2024-35899 CVE-2024-35900 CVE-2024-35902 CVE-2024-35905 CVE-2024-35910 CVE-2024-35915 CVE-2024-35922 CVE-2024-35925 CVE-2024-35930 CVE-2024-35933 CVE-2024-35934 CVE-2024-35935 CVE-2024-35936 CVE-2024-35940 CVE-2024-35944 CVE-2024-35950 CVE-2024-35955 CVE-2024-35958 CVE-2024-35960 CVE-2024-35962 CVE-2024-35967 CVE-2024-35969 CVE-2024-35973 CVE-2024-35976 CVE-2024-35978 CVE-2024-35982 CVE-2024-35983 CVE-2024-35984 CVE-2024-35988 CVE-2024-35990 CVE-2024-35996 CVE-2024-35997 CVE-2024-36004 CVE-2024-36005 CVE-2024-36006 CVE-2024-36007 CVE-2024-36008 CVE-2024-36020 Debian Bug : 1064035

Several vulnerabilities were discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

For Debian 10 buster, these problems were fixed earlier in version 5.10.216-1~deb10u1. This update also fixed a regression in kernel documentation generation, and included many more bug fixes from stable updates 5.10.210-5.10.216 inclusive.

For the detailed security status of linux-5.10 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/linux-5.10

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: PGP signature

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the linux-config-5.10 packages.

See Also

https://security-tracker.debian.org/tracker/CVE-2023-52598

https://security-tracker.debian.org/tracker/CVE-2023-52599

https://security-tracker.debian.org/tracker/CVE-2023-52600

https://security-tracker.debian.org/tracker/CVE-2023-52601

https://security-tracker.debian.org/tracker/CVE-2023-52602

https://security-tracker.debian.org/tracker/CVE-2023-52603

https://security-tracker.debian.org/tracker/CVE-2023-52604

https://security-tracker.debian.org/tracker/CVE-2023-52606

https://security-tracker.debian.org/tracker/CVE-2023-52607

https://security-tracker.debian.org/tracker/CVE-2023-52614

https://security-tracker.debian.org/tracker/CVE-2023-52615

https://security-tracker.debian.org/tracker/CVE-2023-52616

https://security-tracker.debian.org/tracker/CVE-2023-52617

https://security-tracker.debian.org/tracker/CVE-2023-52618

https://security-tracker.debian.org/tracker/CVE-2023-52619

https://security-tracker.debian.org/tracker/CVE-2023-52620

https://security-tracker.debian.org/tracker/CVE-2023-52622

https://security-tracker.debian.org/tracker/CVE-2023-52623

https://security-tracker.debian.org/tracker/CVE-2023-52627

https://security-tracker.debian.org/tracker/CVE-2023-52635

https://security-tracker.debian.org/tracker/CVE-2023-52637

https://security-tracker.debian.org/tracker/CVE-2023-52642

https://security-tracker.debian.org/tracker/CVE-2024-26840

https://security-tracker.debian.org/tracker/CVE-2024-26843

https://security-tracker.debian.org/tracker/CVE-2024-26845

https://security-tracker.debian.org/tracker/CVE-2024-26846

https://security-tracker.debian.org/tracker/CVE-2024-26848

https://security-tracker.debian.org/tracker/CVE-2024-26851

https://security-tracker.debian.org/tracker/CVE-2024-26852

https://security-tracker.debian.org/tracker/CVE-2024-26855

https://security-tracker.debian.org/tracker/CVE-2024-26857

https://security-tracker.debian.org/tracker/CVE-2024-26859

https://security-tracker.debian.org/tracker/CVE-2024-26861

https://security-tracker.debian.org/tracker/CVE-2024-26862

https://security-tracker.debian.org/tracker/CVE-2024-26863

https://security-tracker.debian.org/tracker/CVE-2024-26870

https://security-tracker.debian.org/tracker/CVE-2024-26872

https://security-tracker.debian.org/tracker/CVE-2024-26874

https://security-tracker.debian.org/tracker/CVE-2024-26875

https://security-tracker.debian.org/tracker/source-package/linux-5.10

https://security-tracker.debian.org/tracker/CVE-2022-38096

https://security-tracker.debian.org/tracker/CVE-2023-28746

https://security-tracker.debian.org/tracker/CVE-2023-47233

https://security-tracker.debian.org/tracker/CVE-2023-52429

https://security-tracker.debian.org/tracker/CVE-2023-52434

https://security-tracker.debian.org/tracker/CVE-2023-52435

https://security-tracker.debian.org/tracker/CVE-2023-52447

https://security-tracker.debian.org/tracker/CVE-2023-52458

https://security-tracker.debian.org/tracker/CVE-2023-52482

https://security-tracker.debian.org/tracker/CVE-2023-52486

https://security-tracker.debian.org/tracker/CVE-2023-52488

https://security-tracker.debian.org/tracker/CVE-2023-52489

https://security-tracker.debian.org/tracker/CVE-2023-52491

https://security-tracker.debian.org/tracker/CVE-2023-52492

https://security-tracker.debian.org/tracker/CVE-2023-52493

https://security-tracker.debian.org/tracker/CVE-2023-52497

https://security-tracker.debian.org/tracker/CVE-2023-52498

https://security-tracker.debian.org/tracker/CVE-2023-52583

https://security-tracker.debian.org/tracker/CVE-2023-52587

https://security-tracker.debian.org/tracker/CVE-2023-52594

https://security-tracker.debian.org/tracker/CVE-2023-52595

https://security-tracker.debian.org/tracker/CVE-2023-52597

https://security-tracker.debian.org/tracker/CVE-2023-52644

https://security-tracker.debian.org/tracker/CVE-2023-52650

https://security-tracker.debian.org/tracker/CVE-2023-52656

https://security-tracker.debian.org/tracker/CVE-2023-52669

https://security-tracker.debian.org/tracker/CVE-2023-52670

https://security-tracker.debian.org/tracker/CVE-2023-52672

https://security-tracker.debian.org/tracker/CVE-2023-52699

https://security-tracker.debian.org/tracker/CVE-2023-52880

https://security-tracker.debian.org/tracker/CVE-2023-6270

https://security-tracker.debian.org/tracker/CVE-2023-7042

https://security-tracker.debian.org/tracker/CVE-2024-0340

https://security-tracker.debian.org/tracker/CVE-2024-0565

https://security-tracker.debian.org/tracker/CVE-2024-0607

https://security-tracker.debian.org/tracker/CVE-2024-0841

https://security-tracker.debian.org/tracker/CVE-2024-1151

https://security-tracker.debian.org/tracker/CVE-2024-22099

https://security-tracker.debian.org/tracker/CVE-2024-23849

https://security-tracker.debian.org/tracker/CVE-2024-23850

https://security-tracker.debian.org/tracker/CVE-2024-23851

https://security-tracker.debian.org/tracker/CVE-2024-24857

https://security-tracker.debian.org/tracker/CVE-2024-24858

https://security-tracker.debian.org/tracker/CVE-2024-24861

https://security-tracker.debian.org/tracker/CVE-2024-25739

https://security-tracker.debian.org/tracker/CVE-2024-26581

https://security-tracker.debian.org/tracker/CVE-2024-26593

https://security-tracker.debian.org/tracker/CVE-2024-26600

https://security-tracker.debian.org/tracker/CVE-2024-26601

https://security-tracker.debian.org/tracker/CVE-2024-26602

https://security-tracker.debian.org/tracker/CVE-2024-26606

https://security-tracker.debian.org/tracker/CVE-2024-26610

https://security-tracker.debian.org/tracker/CVE-2024-26614

https://security-tracker.debian.org/tracker/CVE-2024-26615

https://security-tracker.debian.org/tracker/CVE-2024-26622

https://security-tracker.debian.org/tracker/CVE-2024-26625

https://security-tracker.debian.org/tracker/CVE-2024-26627

https://security-tracker.debian.org/tracker/CVE-2024-26877

https://security-tracker.debian.org/tracker/CVE-2024-26878

https://security-tracker.debian.org/tracker/CVE-2024-26880

https://security-tracker.debian.org/tracker/CVE-2024-26882

https://security-tracker.debian.org/tracker/CVE-2024-26883

https://security-tracker.debian.org/tracker/CVE-2024-26884

https://security-tracker.debian.org/tracker/CVE-2024-26885

https://security-tracker.debian.org/tracker/CVE-2024-26889

https://security-tracker.debian.org/tracker/CVE-2024-26891

https://security-tracker.debian.org/tracker/CVE-2024-26894

https://security-tracker.debian.org/tracker/CVE-2024-26895

https://security-tracker.debian.org/tracker/CVE-2024-26897

https://security-tracker.debian.org/tracker/CVE-2024-26898

https://security-tracker.debian.org/tracker/CVE-2024-26901

https://security-tracker.debian.org/tracker/CVE-2024-26903

https://security-tracker.debian.org/tracker/CVE-2024-26906

https://security-tracker.debian.org/tracker/CVE-2024-26907

https://security-tracker.debian.org/tracker/CVE-2024-26910

https://security-tracker.debian.org/tracker/CVE-2024-26917

https://security-tracker.debian.org/tracker/CVE-2024-26922

https://security-tracker.debian.org/tracker/CVE-2024-26923

https://security-tracker.debian.org/tracker/CVE-2024-26924

https://security-tracker.debian.org/tracker/CVE-2024-26925

https://security-tracker.debian.org/tracker/CVE-2024-26926

https://security-tracker.debian.org/tracker/CVE-2024-26931

https://security-tracker.debian.org/tracker/CVE-2024-26934

https://security-tracker.debian.org/tracker/CVE-2024-26935

https://security-tracker.debian.org/tracker/CVE-2024-26937

https://security-tracker.debian.org/tracker/CVE-2024-26950

https://security-tracker.debian.org/tracker/CVE-2024-26951

https://security-tracker.debian.org/tracker/CVE-2024-26955

https://security-tracker.debian.org/tracker/CVE-2024-26956

https://security-tracker.debian.org/tracker/CVE-2024-26957

https://security-tracker.debian.org/tracker/CVE-2024-26958

https://security-tracker.debian.org/tracker/CVE-2024-26960

https://security-tracker.debian.org/tracker/CVE-2024-26961

https://security-tracker.debian.org/tracker/CVE-2024-26965

https://security-tracker.debian.org/tracker/CVE-2024-26966

https://security-tracker.debian.org/tracker/CVE-2024-26969

https://security-tracker.debian.org/tracker/CVE-2024-26970

https://security-tracker.debian.org/tracker/CVE-2024-26973

https://security-tracker.debian.org/tracker/CVE-2024-26974

https://security-tracker.debian.org/tracker/CVE-2024-26976

https://security-tracker.debian.org/tracker/CVE-2024-26978

https://security-tracker.debian.org/tracker/CVE-2024-26981

https://security-tracker.debian.org/tracker/CVE-2024-26984

https://security-tracker.debian.org/tracker/CVE-2024-26988

https://security-tracker.debian.org/tracker/CVE-2024-26993

https://security-tracker.debian.org/tracker/CVE-2024-26994

https://security-tracker.debian.org/tracker/CVE-2024-26997

https://security-tracker.debian.org/tracker/CVE-2024-26999

https://security-tracker.debian.org/tracker/CVE-2024-27000

https://security-tracker.debian.org/tracker/CVE-2024-27001

https://security-tracker.debian.org/tracker/CVE-2024-27004

https://security-tracker.debian.org/tracker/CVE-2024-27008

https://security-tracker.debian.org/tracker/CVE-2024-27013

https://security-tracker.debian.org/tracker/CVE-2024-27020

https://security-tracker.debian.org/tracker/CVE-2024-27024

https://security-tracker.debian.org/tracker/CVE-2024-27025

https://security-tracker.debian.org/tracker/CVE-2024-27028

https://security-tracker.debian.org/tracker/CVE-2024-27030

https://security-tracker.debian.org/tracker/CVE-2024-27038

https://security-tracker.debian.org/tracker/CVE-2024-27043

https://security-tracker.debian.org/tracker/CVE-2024-27044

https://security-tracker.debian.org/tracker/CVE-2024-27045

https://security-tracker.debian.org/tracker/CVE-2024-27046

https://security-tracker.debian.org/tracker/CVE-2024-27047

https://security-tracker.debian.org/tracker/CVE-2024-27051

https://security-tracker.debian.org/tracker/CVE-2024-27052

https://security-tracker.debian.org/tracker/CVE-2024-27053

https://security-tracker.debian.org/tracker/CVE-2024-27059

https://security-tracker.debian.org/tracker/CVE-2024-27065

https://security-tracker.debian.org/tracker/CVE-2024-27073

https://security-tracker.debian.org/tracker/CVE-2024-27074

https://security-tracker.debian.org/tracker/CVE-2024-27075

https://security-tracker.debian.org/tracker/CVE-2024-27076

https://security-tracker.debian.org/tracker/CVE-2024-27077

https://security-tracker.debian.org/tracker/CVE-2024-27078

https://security-tracker.debian.org/tracker/CVE-2024-27388

https://security-tracker.debian.org/tracker/CVE-2024-27395

https://security-tracker.debian.org/tracker/CVE-2024-27396

https://security-tracker.debian.org/tracker/CVE-2024-27405

https://security-tracker.debian.org/tracker/CVE-2024-27410

https://security-tracker.debian.org/tracker/CVE-2024-27412

https://security-tracker.debian.org/tracker/CVE-2024-27413

https://security-tracker.debian.org/tracker/CVE-2024-27414

https://security-tracker.debian.org/tracker/CVE-2024-27416

https://security-tracker.debian.org/tracker/CVE-2024-27417

https://security-tracker.debian.org/tracker/CVE-2024-27419

https://security-tracker.debian.org/tracker/CVE-2024-27431

https://security-tracker.debian.org/tracker/CVE-2024-27436

https://security-tracker.debian.org/tracker/CVE-2024-27437

https://security-tracker.debian.org/tracker/CVE-2024-35785

https://security-tracker.debian.org/tracker/CVE-2024-35789

https://security-tracker.debian.org/tracker/CVE-2024-35791

https://security-tracker.debian.org/tracker/CVE-2024-35796

https://security-tracker.debian.org/tracker/CVE-2024-35805

https://security-tracker.debian.org/tracker/CVE-2024-35806

https://security-tracker.debian.org/tracker/CVE-2024-35807

https://security-tracker.debian.org/tracker/CVE-2024-35809

https://security-tracker.debian.org/tracker/CVE-2024-35811

https://security-tracker.debian.org/tracker/CVE-2024-35813

https://security-tracker.debian.org/tracker/CVE-2024-35815

https://security-tracker.debian.org/tracker/CVE-2024-35819

https://security-tracker.debian.org/tracker/CVE-2024-35821

https://security-tracker.debian.org/tracker/CVE-2024-35822

https://security-tracker.debian.org/tracker/CVE-2024-35823

https://security-tracker.debian.org/tracker/CVE-2024-35825

https://security-tracker.debian.org/tracker/CVE-2024-35828

https://security-tracker.debian.org/tracker/CVE-2024-35829

https://security-tracker.debian.org/tracker/CVE-2024-35830

https://security-tracker.debian.org/tracker/CVE-2024-35833

https://security-tracker.debian.org/tracker/CVE-2024-35835

https://security-tracker.debian.org/tracker/CVE-2024-35837

https://security-tracker.debian.org/tracker/CVE-2024-35845

https://security-tracker.debian.org/tracker/CVE-2024-35847

https://security-tracker.debian.org/tracker/CVE-2024-35849

https://security-tracker.debian.org/tracker/CVE-2024-26635

https://security-tracker.debian.org/tracker/CVE-2024-26636

https://security-tracker.debian.org/tracker/CVE-2024-26640

https://security-tracker.debian.org/tracker/CVE-2024-26641

https://security-tracker.debian.org/tracker/CVE-2024-26642

https://security-tracker.debian.org/tracker/CVE-2024-26643

https://security-tracker.debian.org/tracker/CVE-2024-26644

https://security-tracker.debian.org/tracker/CVE-2024-26645

https://security-tracker.debian.org/tracker/CVE-2024-26651

https://security-tracker.debian.org/tracker/CVE-2024-26654

https://security-tracker.debian.org/tracker/CVE-2024-26659

https://security-tracker.debian.org/tracker/CVE-2024-26663

https://security-tracker.debian.org/tracker/CVE-2024-26664

https://security-tracker.debian.org/tracker/CVE-2024-26665

https://security-tracker.debian.org/tracker/CVE-2024-26671

https://security-tracker.debian.org/tracker/CVE-2024-26673

https://security-tracker.debian.org/tracker/CVE-2024-26675

https://security-tracker.debian.org/tracker/CVE-2024-26679

https://security-tracker.debian.org/tracker/CVE-2024-26684

https://security-tracker.debian.org/tracker/CVE-2024-26685

https://security-tracker.debian.org/tracker/CVE-2024-26687

https://security-tracker.debian.org/tracker/CVE-2024-26688

https://security-tracker.debian.org/tracker/CVE-2024-26689

https://security-tracker.debian.org/tracker/CVE-2024-26695

https://security-tracker.debian.org/tracker/CVE-2024-26696

https://security-tracker.debian.org/tracker/CVE-2024-26697

https://security-tracker.debian.org/tracker/CVE-2024-26698

https://security-tracker.debian.org/tracker/CVE-2024-26702

https://security-tracker.debian.org/tracker/CVE-2024-26704

https://security-tracker.debian.org/tracker/CVE-2024-26707

https://security-tracker.debian.org/tracker/CVE-2024-26712

https://security-tracker.debian.org/tracker/CVE-2024-26720

https://security-tracker.debian.org/tracker/CVE-2024-26722

https://security-tracker.debian.org/tracker/CVE-2024-26727

https://security-tracker.debian.org/tracker/CVE-2024-26733

https://security-tracker.debian.org/tracker/CVE-2024-26735

https://security-tracker.debian.org/tracker/CVE-2024-26736

https://security-tracker.debian.org/tracker/CVE-2024-26743

https://security-tracker.debian.org/tracker/CVE-2024-26744

https://security-tracker.debian.org/tracker/CVE-2024-26747

https://security-tracker.debian.org/tracker/CVE-2024-26748

https://security-tracker.debian.org/tracker/CVE-2024-26749

https://security-tracker.debian.org/tracker/CVE-2024-26751

https://security-tracker.debian.org/tracker/CVE-2024-26752

https://security-tracker.debian.org/tracker/CVE-2024-26753

https://security-tracker.debian.org/tracker/CVE-2024-26754

https://security-tracker.debian.org/tracker/CVE-2024-26763

https://security-tracker.debian.org/tracker/CVE-2024-26764

https://security-tracker.debian.org/tracker/CVE-2024-26766

https://security-tracker.debian.org/tracker/CVE-2024-26771

https://security-tracker.debian.org/tracker/CVE-2024-26772

https://security-tracker.debian.org/tracker/CVE-2024-26773

https://security-tracker.debian.org/tracker/CVE-2024-26776

https://security-tracker.debian.org/tracker/CVE-2024-26777

https://security-tracker.debian.org/tracker/CVE-2024-26778

https://security-tracker.debian.org/tracker/CVE-2024-26779

https://security-tracker.debian.org/tracker/CVE-2024-26781

https://security-tracker.debian.org/tracker/CVE-2024-26782

https://security-tracker.debian.org/tracker/CVE-2024-26787

https://security-tracker.debian.org/tracker/CVE-2024-26788

https://security-tracker.debian.org/tracker/CVE-2024-26790

https://security-tracker.debian.org/tracker/CVE-2024-26791

https://security-tracker.debian.org/tracker/CVE-2024-26793

https://security-tracker.debian.org/tracker/CVE-2024-26795

https://security-tracker.debian.org/tracker/CVE-2024-26801

https://security-tracker.debian.org/tracker/CVE-2024-26804

https://security-tracker.debian.org/tracker/CVE-2024-26805

https://security-tracker.debian.org/tracker/CVE-2024-26808

https://security-tracker.debian.org/tracker/CVE-2024-26809

https://security-tracker.debian.org/tracker/CVE-2024-26810

https://security-tracker.debian.org/tracker/CVE-2024-26812

https://security-tracker.debian.org/tracker/CVE-2024-26813

https://security-tracker.debian.org/tracker/CVE-2024-26814

https://security-tracker.debian.org/tracker/CVE-2024-26816

https://security-tracker.debian.org/tracker/CVE-2024-26817

https://security-tracker.debian.org/tracker/CVE-2024-26820

https://security-tracker.debian.org/tracker/CVE-2024-26825

https://security-tracker.debian.org/tracker/CVE-2024-26833

https://security-tracker.debian.org/tracker/CVE-2024-26835

https://security-tracker.debian.org/tracker/CVE-2024-26839

https://security-tracker.debian.org/tracker/CVE-2024-35934

https://security-tracker.debian.org/tracker/CVE-2024-35935

https://security-tracker.debian.org/tracker/CVE-2024-35936

https://security-tracker.debian.org/tracker/CVE-2024-35940

https://security-tracker.debian.org/tracker/CVE-2024-35944

https://security-tracker.debian.org/tracker/CVE-2024-35950

https://security-tracker.debian.org/tracker/CVE-2024-35955

https://security-tracker.debian.org/tracker/CVE-2024-35958

https://security-tracker.debian.org/tracker/CVE-2024-35960

https://security-tracker.debian.org/tracker/CVE-2024-35962

https://security-tracker.debian.org/tracker/CVE-2024-35967

https://security-tracker.debian.org/tracker/CVE-2024-35969

https://security-tracker.debian.org/tracker/CVE-2024-35973

https://security-tracker.debian.org/tracker/CVE-2024-35976

https://security-tracker.debian.org/tracker/CVE-2024-35978

https://security-tracker.debian.org/tracker/CVE-2024-35982

https://security-tracker.debian.org/tracker/CVE-2024-35983

https://security-tracker.debian.org/tracker/CVE-2024-35984

https://security-tracker.debian.org/tracker/CVE-2024-35988

https://security-tracker.debian.org/tracker/CVE-2024-35990

https://security-tracker.debian.org/tracker/CVE-2024-35996

https://security-tracker.debian.org/tracker/CVE-2024-35997

https://security-tracker.debian.org/tracker/CVE-2024-36004

https://security-tracker.debian.org/tracker/CVE-2024-36005

https://security-tracker.debian.org/tracker/CVE-2024-36006

https://security-tracker.debian.org/tracker/CVE-2024-36007

https://security-tracker.debian.org/tracker/CVE-2024-36008

https://security-tracker.debian.org/tracker/CVE-2024-36020

https://packages.debian.org/source/buster/linux-5.10

https://security-tracker.debian.org/tracker/CVE-2024-35852

https://security-tracker.debian.org/tracker/CVE-2024-35853

https://security-tracker.debian.org/tracker/CVE-2024-35854

https://security-tracker.debian.org/tracker/CVE-2024-35855

https://security-tracker.debian.org/tracker/CVE-2024-35871

https://security-tracker.debian.org/tracker/CVE-2024-35877

https://security-tracker.debian.org/tracker/CVE-2024-35879

https://security-tracker.debian.org/tracker/CVE-2024-35884

https://security-tracker.debian.org/tracker/CVE-2024-35886

https://security-tracker.debian.org/tracker/CVE-2024-35888

https://security-tracker.debian.org/tracker/CVE-2024-35893

https://security-tracker.debian.org/tracker/CVE-2024-35895

https://security-tracker.debian.org/tracker/CVE-2024-35896

https://security-tracker.debian.org/tracker/CVE-2024-35897

https://security-tracker.debian.org/tracker/CVE-2024-35898

https://security-tracker.debian.org/tracker/CVE-2024-35899

https://security-tracker.debian.org/tracker/CVE-2024-35900

https://security-tracker.debian.org/tracker/CVE-2024-35902

https://security-tracker.debian.org/tracker/CVE-2024-35905

https://security-tracker.debian.org/tracker/CVE-2024-35910

https://security-tracker.debian.org/tracker/CVE-2024-35915

https://security-tracker.debian.org/tracker/CVE-2024-35922

https://security-tracker.debian.org/tracker/CVE-2024-35925

https://security-tracker.debian.org/tracker/CVE-2024-35930

https://security-tracker.debian.org/tracker/CVE-2024-35933

Plugin Details

Severity: High

ID: 201105

File Name: debian_DLA-3842.nasl

Version: 1.2

Type: local

Agent: unix

Published: 6/27/2024

Updated: 9/10/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.7

Temporal Score: 6

Vector: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-0565

CVSS v3

Risk Factor: High

Base Score: 8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2023-52434

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-common, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.27, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-686, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-common-rt, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-686-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.30, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-armmp, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.28, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.26, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.29, p-cpe:/a:debian:debian_linux:linux-image-5.10-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-686-dbg, cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-common, p-cpe:/a:debian:debian_linux:linux-image-5.10-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-common, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-common, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-common, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.27-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.24, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-common, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.24-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.24-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.29-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.26-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.28-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.27-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.28-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.26-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-common-rt, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.30-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.29-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.30-686

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/25/2024

Vulnerability Publication Date: 9/9/2022

Reference Information

CVE: CVE-2022-38096, CVE-2023-28746, CVE-2023-47233, CVE-2023-52429, CVE-2023-52434, CVE-2023-52435, CVE-2023-52447, CVE-2023-52458, CVE-2023-52482, CVE-2023-52486, CVE-2023-52488, CVE-2023-52489, CVE-2023-52491, CVE-2023-52492, CVE-2023-52493, CVE-2023-52497, CVE-2023-52498, CVE-2023-52583, CVE-2023-52587, CVE-2023-52594, CVE-2023-52595, CVE-2023-52597, CVE-2023-52598, CVE-2023-52599, CVE-2023-52600, CVE-2023-52601, CVE-2023-52602, CVE-2023-52603, CVE-2023-52604, CVE-2023-52606, CVE-2023-52607, CVE-2023-52614, CVE-2023-52615, CVE-2023-52616, CVE-2023-52617, CVE-2023-52618, CVE-2023-52619, CVE-2023-52620, CVE-2023-52622, CVE-2023-52623, CVE-2023-52627, CVE-2023-52635, CVE-2023-52637, CVE-2023-52642, CVE-2023-52644, CVE-2023-52650, CVE-2023-52656, CVE-2023-52669, CVE-2023-52670, CVE-2023-52672, CVE-2023-52699, CVE-2023-52880, CVE-2023-6270, CVE-2023-7042, CVE-2024-0340, CVE-2024-0565, CVE-2024-0607, CVE-2024-0841, CVE-2024-1151, CVE-2024-22099, CVE-2024-23849, CVE-2024-23850, CVE-2024-23851, CVE-2024-24857, CVE-2024-24858, CVE-2024-24861, CVE-2024-25739, CVE-2024-26581, CVE-2024-26593, CVE-2024-26600, CVE-2024-26601, CVE-2024-26602, CVE-2024-26606, CVE-2024-26610, CVE-2024-26614, CVE-2024-26615, CVE-2024-26622, CVE-2024-26625, CVE-2024-26627, CVE-2024-26635, CVE-2024-26636, CVE-2024-26640, CVE-2024-26641, CVE-2024-26642, CVE-2024-26643, CVE-2024-26644, CVE-2024-26645, CVE-2024-26651, CVE-2024-26654, CVE-2024-26659, CVE-2024-26663, CVE-2024-26664, CVE-2024-26665, CVE-2024-26671, CVE-2024-26673, CVE-2024-26675, CVE-2024-26679, CVE-2024-26684, CVE-2024-26685, CVE-2024-26687, CVE-2024-26688, CVE-2024-26689, CVE-2024-26695, CVE-2024-26696, CVE-2024-26697, CVE-2024-26698, CVE-2024-26702, CVE-2024-26704, CVE-2024-26707, CVE-2024-26712, CVE-2024-26720, CVE-2024-26722, CVE-2024-26727, CVE-2024-26733, CVE-2024-26735, CVE-2024-26736, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26748, CVE-2024-26749, CVE-2024-26751, CVE-2024-26752, CVE-2024-26753, CVE-2024-26754, CVE-2024-26763, CVE-2024-26764, CVE-2024-26766, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26776, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26781, CVE-2024-26782, CVE-2024-26787, CVE-2024-26788, CVE-2024-26790, CVE-2024-26791, CVE-2024-26793, CVE-2024-26795, CVE-2024-26801, CVE-2024-26804, CVE-2024-26805, CVE-2024-26808, CVE-2024-26809, CVE-2024-26810, CVE-2024-26812, CVE-2024-26813, CVE-2024-26814, CVE-2024-26816, CVE-2024-26817, CVE-2024-26820, CVE-2024-26825, CVE-2024-26833, CVE-2024-26835, CVE-2024-26839, CVE-2024-26840, CVE-2024-26843, CVE-2024-26845, CVE-2024-26846, CVE-2024-26848, CVE-2024-26851, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26870, CVE-2024-26872, CVE-2024-26874, CVE-2024-26875, CVE-2024-26877, CVE-2024-26878, CVE-2024-26880, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26889, CVE-2024-26891, CVE-2024-26894, CVE-2024-26895, CVE-2024-26897, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26906, CVE-2024-26907, CVE-2024-26910, CVE-2024-26917, CVE-2024-26922, CVE-2024-26923, CVE-2024-26924, CVE-2024-26925, CVE-2024-26926, CVE-2024-26931, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26957, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26965, CVE-2024-26966, CVE-2024-26969, CVE-2024-26970, CVE-2024-26973, CVE-2024-26974, CVE-2024-26976, CVE-2024-26978, CVE-2024-26981, CVE-2024-26984, CVE-2024-26988, CVE-2024-26993, CVE-2024-26994, CVE-2024-26997, CVE-2024-26999, CVE-2024-27000, CVE-2024-27001, CVE-2024-27004, CVE-2024-27008, CVE-2024-27013, CVE-2024-27020, CVE-2024-27024, CVE-2024-27025, CVE-2024-27028, CVE-2024-27030, CVE-2024-27038, CVE-2024-27043, CVE-2024-27044, CVE-2024-27045, CVE-2024-27046, CVE-2024-27047, CVE-2024-27051, CVE-2024-27052, CVE-2024-27053, CVE-2024-27059, CVE-2024-27065, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27076, CVE-2024-27077, CVE-2024-27078, CVE-2024-27388, CVE-2024-27395, CVE-2024-27396, CVE-2024-27405, CVE-2024-27410, CVE-2024-27412, CVE-2024-27413, CVE-2024-27414, CVE-2024-27416, CVE-2024-27417, CVE-2024-27419, CVE-2024-27431, CVE-2024-27436, CVE-2024-27437, CVE-2024-35785, CVE-2024-35789, CVE-2024-35791, CVE-2024-35796, CVE-2024-35805, CVE-2024-35806, CVE-2024-35807, CVE-2024-35809, CVE-2024-35811, CVE-2024-35813, CVE-2024-35815, CVE-2024-35819, CVE-2024-35821, CVE-2024-35822, CVE-2024-35823, CVE-2024-35825, CVE-2024-35828, CVE-2024-35829, CVE-2024-35830, CVE-2024-35833, CVE-2024-35835, CVE-2024-35837, CVE-2024-35845, CVE-2024-35847, CVE-2024-35849, CVE-2024-35852, CVE-2024-35853, CVE-2024-35854, CVE-2024-35855, CVE-2024-35871, CVE-2024-35877, CVE-2024-35879, CVE-2024-35884, CVE-2024-35886, CVE-2024-35888, CVE-2024-35893, CVE-2024-35895, CVE-2024-35896, CVE-2024-35897, CVE-2024-35898, CVE-2024-35899, CVE-2024-35900, CVE-2024-35902, CVE-2024-35905, CVE-2024-35910, CVE-2024-35915, CVE-2024-35922, CVE-2024-35925, CVE-2024-35930, CVE-2024-35933, CVE-2024-35934, CVE-2024-35935, CVE-2024-35936, CVE-2024-35940, CVE-2024-35944, CVE-2024-35950, CVE-2024-35955, CVE-2024-35958, CVE-2024-35960, CVE-2024-35962, CVE-2024-35967, CVE-2024-35969, CVE-2024-35973, CVE-2024-35976, CVE-2024-35978, CVE-2024-35982, CVE-2024-35983, CVE-2024-35984, CVE-2024-35988, CVE-2024-35990, CVE-2024-35996, CVE-2024-35997, CVE-2024-36004, CVE-2024-36005, CVE-2024-36006, CVE-2024-36007, CVE-2024-36008, CVE-2024-36020