语言:
https://security-tracker.debian.org/tracker/CVE-2022-3028
https://security-tracker.debian.org/tracker/CVE-2022-3061
https://security-tracker.debian.org/tracker/CVE-2022-3176
https://security-tracker.debian.org/tracker/CVE-2022-3303
https://security-tracker.debian.org/tracker/CVE-2022-3586
https://security-tracker.debian.org/tracker/CVE-2022-3621
https://security-tracker.debian.org/tracker/CVE-2022-3625
https://security-tracker.debian.org/tracker/CVE-2022-3629
https://security-tracker.debian.org/tracker/CVE-2022-3633
https://security-tracker.debian.org/tracker/CVE-2022-3635
https://security-tracker.debian.org/tracker/CVE-2022-3646
https://security-tracker.debian.org/tracker/CVE-2022-3649
https://security-tracker.debian.org/tracker/CVE-2022-39188
https://security-tracker.debian.org/tracker/CVE-2022-3919
https://security-tracker.debian.org/tracker/CVE-2022-39190
https://security-tracker.debian.org/tracker/CVE-2022-39842
https://security-tracker.debian.org/tracker/CVE-2022-40307
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017425
https://security-tracker.debian.org/tracker/source-package/linux-5.10
https://www.debian.org/lts/security/2022/dla-3173
https://security-tracker.debian.org/tracker/CVE-2021-4037
https://security-tracker.debian.org/tracker/CVE-2022-0171
https://security-tracker.debian.org/tracker/CVE-2022-1184
https://security-tracker.debian.org/tracker/CVE-2022-1679
https://security-tracker.debian.org/tracker/CVE-2022-20421
https://security-tracker.debian.org/tracker/CVE-2022-20422
https://security-tracker.debian.org/tracker/CVE-2022-2153
https://security-tracker.debian.org/tracker/CVE-2022-2602
https://security-tracker.debian.org/tracker/CVE-2022-2663
https://security-tracker.debian.org/tracker/CVE-2022-2905
https://security-tracker.debian.org/tracker/CVE-2022-41222
https://security-tracker.debian.org/tracker/CVE-2022-4167
https://security-tracker.debian.org/tracker/CVE-2022-41674
https://security-tracker.debian.org/tracker/CVE-2022-42719
https://security-tracker.debian.org/tracker/CVE-2022-4272
https://security-tracker.debian.org/tracker/CVE-2022-42720
https://security-tracker.debian.org/tracker/CVE-2022-42721
https://security-tracker.debian.org/tracker/CVE-2022-42722
严重性: Critical
ID: 166822
文件名: debian_DLA-3173.nasl
版本: 1.5
类型: local
代理: unix
发布时间: 2022/11/2
最近更新时间: 2024/3/27
支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
风险因素: High
分数: 7.4
风险因素: High
基本分数: 7.2
时间分数: 5.6
矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2022-1679
风险因素: Critical
基本分数: 9.8
时间分数: 8.8
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:P/RL:O/RC:C
CVSS 分数来源: CVE-2022-4272
CPE: p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:linux-headers-5.10-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-common, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.17-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-common, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-0.deb10.19-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-686, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.17-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-686, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-0.deb10.19-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.17, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-0.deb10.19, cpe:/o:debian:debian_linux:10.0
必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
可利用: true
易利用性: Exploits are available
补丁发布日期: 2022/11/1
漏洞发布日期: 2022/11/1
CVE: CVE-2021-4037, CVE-2022-0171, CVE-2022-1184, CVE-2022-1679, CVE-2022-20421, CVE-2022-20422, CVE-2022-2153, CVE-2022-2602, CVE-2022-2663, CVE-2022-2905, CVE-2022-3028, CVE-2022-3061, CVE-2022-3176, CVE-2022-3303, CVE-2022-3586, CVE-2022-3621, CVE-2022-3625, CVE-2022-3629, CVE-2022-3633, CVE-2022-3635, CVE-2022-3646, CVE-2022-3649, CVE-2022-39188, CVE-2022-3919, CVE-2022-39190, CVE-2022-39842, CVE-2022-40307, CVE-2022-41222, CVE-2022-4167, CVE-2022-41674, CVE-2022-42719, CVE-2022-4272, CVE-2022-42720, CVE-2022-42721, CVE-2022-42722, CVE-2022-43750