Debian dla-4475 : ata-modules-5.10.0-35-armmp-di - security update

high Nessus Plugin ID 298680

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4475 advisory.

------------------------------------------------------------------------- Debian LTS Advisory DLA-4475-1 [email protected] https://www.debian.org/lts/security/ Ben Hutchings February 10, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : linux Version : 5.10.249-1 CVE ID : CVE-2022-48744 CVE-2022-49168 CVE-2022-49465 CVE-2022-49711 CVE-2022-49743 CVE-2023-52975 CVE-2023-54207 CVE-2023-54321 CVE-2024-36903 CVE-2024-36927 CVE-2025-22022 CVE-2025-22121 CVE-2025-37830 CVE-2025-38022 CVE-2025-38119 CVE-2025-38556 CVE-2025-38591 CVE-2025-39702 CVE-2025-40110 CVE-2025-40215 CVE-2025-68211 CVE-2025-68255 CVE-2025-68257 CVE-2025-68258 CVE-2025-68261 CVE-2025-68264 CVE-2025-68266 CVE-2025-68282 CVE-2025-68325 CVE-2025-68332 CVE-2025-68336 CVE-2025-68337 CVE-2025-68344 CVE-2025-68346 CVE-2025-68349 CVE-2025-68354 CVE-2025-68362 CVE-2025-68364 CVE-2025-68366 CVE-2025-68367 CVE-2025-68372 CVE-2025-68724 CVE-2025-68725 CVE-2025-68733 CVE-2025-68740 CVE-2025-68757 CVE-2025-68758 CVE-2025-68759 CVE-2025-68764 CVE-2025-68767 CVE-2025-68769 CVE-2025-68771 CVE-2025-68773 CVE-2025-68774 CVE-2025-68776 CVE-2025-68777 CVE-2025-68782 CVE-2025-68783 CVE-2025-68785 CVE-2025-68787 CVE-2025-68788 CVE-2025-68795 CVE-2025-68796 CVE-2025-68797 CVE-2025-68799 CVE-2025-68800 CVE-2025-68801 CVE-2025-68803 CVE-2025-68804 CVE-2025-68808 CVE-2025-68813 CVE-2025-68815 CVE-2025-68816 CVE-2025-68818 CVE-2025-68819 CVE-2025-68820 CVE-2025-71064 CVE-2025-71066 CVE-2025-71069 CVE-2025-71075 CVE-2025-71077 CVE-2025-71079 CVE-2025-71084 CVE-2025-71085 CVE-2025-71086 CVE-2025-71087 CVE-2025-71091 CVE-2025-71093 CVE-2025-71096 CVE-2025-71097 CVE-2025-71098 CVE-2025-71102 CVE-2025-71104 CVE-2025-71105 CVE-2025-71108 CVE-2025-71111 CVE-2025-71112 CVE-2025-71113 CVE-2025-71114 CVE-2025-71116 CVE-2025-71118 CVE-2025-71120 CVE-2025-71123 CVE-2025-71125 CVE-2025-71127 CVE-2025-71131 CVE-2025-71136 CVE-2025-71137 CVE-2025-71154 CVE-2025-71162 CVE-2025-71182 CVE-2025-71185 CVE-2025-71186 CVE-2025-71190 CVE-2025-71191 CVE-2025-71194 CVE-2025-71196 CVE-2025-71197 CVE-2025-71199 CVE-2026-22976 CVE-2026-22977 CVE-2026-22978 CVE-2026-22980 CVE-2026-22990 CVE-2026-22991 CVE-2026-22997 CVE-2026-22998 CVE-2026-22999 CVE-2026-23001 CVE-2026-23003 CVE-2026-23011 CVE-2026-23020 CVE-2026-23021 CVE-2026-23033 CVE-2026-23038 CVE-2026-23047 CVE-2026-23049 CVE-2026-23056 CVE-2026-23058 CVE-2026-23060 CVE-2026-23061 CVE-2026-23063 CVE-2026-23064 CVE-2026-23071 CVE-2026-23073 CVE-2026-23074 CVE-2026-23075 CVE-2026-23076 CVE-2026-23080 CVE-2026-23083 CVE-2026-23084 CVE-2026-23085 CVE-2026-23087 CVE-2026-23089 CVE-2026-23090 CVE-2026-23091 CVE-2026-23095 CVE-2026-23096 CVE-2026-23097 CVE-2026-23098 CVE-2026-23101 CVE-2026-23103 CVE-2026-23105 CVE-2026-23108 CVE-2026-23110 Debian Bug : 1122193 1123750

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

For Debian 11 bullseye, these problems have been fixed in version 5.10.249-1. This update also fixes several bugs reported to Debian.
It additionally includes many more bug fixes from stable updates 5.10.248 and 5.10.249.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: PGP signature

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the ata-modules-5.10.0-35-armmp-di packages.

See Also

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2022-48744

https://security-tracker.debian.org/tracker/CVE-2022-49168

https://security-tracker.debian.org/tracker/CVE-2022-49465

https://security-tracker.debian.org/tracker/CVE-2022-49711

https://security-tracker.debian.org/tracker/CVE-2022-49743

https://security-tracker.debian.org/tracker/CVE-2023-52975

https://security-tracker.debian.org/tracker/CVE-2023-54207

https://security-tracker.debian.org/tracker/CVE-2023-54321

https://security-tracker.debian.org/tracker/CVE-2024-36903

https://security-tracker.debian.org/tracker/CVE-2024-36927

https://security-tracker.debian.org/tracker/CVE-2025-22022

https://security-tracker.debian.org/tracker/CVE-2025-22121

https://security-tracker.debian.org/tracker/CVE-2025-37830

https://security-tracker.debian.org/tracker/CVE-2025-38022

https://security-tracker.debian.org/tracker/CVE-2025-38119

https://security-tracker.debian.org/tracker/CVE-2025-38556

https://security-tracker.debian.org/tracker/CVE-2025-38591

https://security-tracker.debian.org/tracker/CVE-2025-39702

https://security-tracker.debian.org/tracker/CVE-2025-40110

https://security-tracker.debian.org/tracker/CVE-2025-40215

https://security-tracker.debian.org/tracker/CVE-2025-68211

https://security-tracker.debian.org/tracker/CVE-2025-68255

https://security-tracker.debian.org/tracker/CVE-2025-68257

https://security-tracker.debian.org/tracker/CVE-2025-68258

https://security-tracker.debian.org/tracker/CVE-2025-68261

https://security-tracker.debian.org/tracker/CVE-2025-68264

https://security-tracker.debian.org/tracker/CVE-2025-68266

https://security-tracker.debian.org/tracker/CVE-2025-68282

https://security-tracker.debian.org/tracker/CVE-2025-68325

https://security-tracker.debian.org/tracker/CVE-2025-68332

https://security-tracker.debian.org/tracker/CVE-2025-68336

https://security-tracker.debian.org/tracker/CVE-2025-68337

https://security-tracker.debian.org/tracker/CVE-2025-68344

https://security-tracker.debian.org/tracker/CVE-2025-68346

https://security-tracker.debian.org/tracker/CVE-2025-68349

https://security-tracker.debian.org/tracker/CVE-2025-68354

https://security-tracker.debian.org/tracker/CVE-2025-68362

https://security-tracker.debian.org/tracker/CVE-2025-68364

https://security-tracker.debian.org/tracker/CVE-2025-68366

https://security-tracker.debian.org/tracker/CVE-2025-68367

https://security-tracker.debian.org/tracker/CVE-2025-68372

https://security-tracker.debian.org/tracker/CVE-2025-68724

https://security-tracker.debian.org/tracker/CVE-2025-68725

https://security-tracker.debian.org/tracker/CVE-2025-68733

https://security-tracker.debian.org/tracker/CVE-2025-68740

https://security-tracker.debian.org/tracker/CVE-2025-68757

https://security-tracker.debian.org/tracker/CVE-2025-68758

https://security-tracker.debian.org/tracker/CVE-2025-68759

https://security-tracker.debian.org/tracker/CVE-2025-68764

https://security-tracker.debian.org/tracker/CVE-2025-68767

https://security-tracker.debian.org/tracker/CVE-2025-68769

https://security-tracker.debian.org/tracker/CVE-2025-68771

https://security-tracker.debian.org/tracker/CVE-2025-68773

https://security-tracker.debian.org/tracker/CVE-2025-68774

https://security-tracker.debian.org/tracker/CVE-2025-68776

https://security-tracker.debian.org/tracker/CVE-2025-68777

https://security-tracker.debian.org/tracker/CVE-2025-68782

https://security-tracker.debian.org/tracker/CVE-2025-68783

https://security-tracker.debian.org/tracker/CVE-2025-68785

https://security-tracker.debian.org/tracker/CVE-2025-68787

https://security-tracker.debian.org/tracker/CVE-2025-68788

https://security-tracker.debian.org/tracker/CVE-2025-68795

https://security-tracker.debian.org/tracker/CVE-2025-68796

https://security-tracker.debian.org/tracker/CVE-2025-68797

https://security-tracker.debian.org/tracker/CVE-2025-68799

https://security-tracker.debian.org/tracker/CVE-2025-68800

https://security-tracker.debian.org/tracker/CVE-2025-68801

https://security-tracker.debian.org/tracker/CVE-2025-68803

https://security-tracker.debian.org/tracker/CVE-2025-68804

https://security-tracker.debian.org/tracker/CVE-2025-68808

https://security-tracker.debian.org/tracker/CVE-2025-68813

https://security-tracker.debian.org/tracker/CVE-2025-68815

https://security-tracker.debian.org/tracker/CVE-2025-68816

https://security-tracker.debian.org/tracker/CVE-2025-68818

https://security-tracker.debian.org/tracker/CVE-2025-68819

https://security-tracker.debian.org/tracker/CVE-2025-68820

https://security-tracker.debian.org/tracker/CVE-2025-71064

https://security-tracker.debian.org/tracker/CVE-2025-71066

https://security-tracker.debian.org/tracker/CVE-2025-71069

https://security-tracker.debian.org/tracker/CVE-2025-71075

https://security-tracker.debian.org/tracker/CVE-2025-71077

https://security-tracker.debian.org/tracker/CVE-2025-71079

https://security-tracker.debian.org/tracker/CVE-2025-71084

https://security-tracker.debian.org/tracker/CVE-2025-71085

https://security-tracker.debian.org/tracker/CVE-2025-71086

https://security-tracker.debian.org/tracker/CVE-2025-71087

https://security-tracker.debian.org/tracker/CVE-2025-71091

https://security-tracker.debian.org/tracker/CVE-2025-71093

https://security-tracker.debian.org/tracker/CVE-2025-71096

https://security-tracker.debian.org/tracker/CVE-2025-71097

https://security-tracker.debian.org/tracker/CVE-2025-71098

https://security-tracker.debian.org/tracker/CVE-2025-71102

https://security-tracker.debian.org/tracker/CVE-2025-71104

https://security-tracker.debian.org/tracker/CVE-2025-71105

https://security-tracker.debian.org/tracker/CVE-2025-71108

https://security-tracker.debian.org/tracker/CVE-2025-71111

https://security-tracker.debian.org/tracker/CVE-2025-71112

https://security-tracker.debian.org/tracker/CVE-2025-71113

https://security-tracker.debian.org/tracker/CVE-2025-71114

https://security-tracker.debian.org/tracker/CVE-2025-71116

https://security-tracker.debian.org/tracker/CVE-2025-71118

https://security-tracker.debian.org/tracker/CVE-2025-71120

https://security-tracker.debian.org/tracker/CVE-2025-71123

https://security-tracker.debian.org/tracker/CVE-2025-71125

https://security-tracker.debian.org/tracker/CVE-2025-71127

https://security-tracker.debian.org/tracker/CVE-2025-71131

https://security-tracker.debian.org/tracker/CVE-2025-71136

https://security-tracker.debian.org/tracker/CVE-2025-71137

https://security-tracker.debian.org/tracker/CVE-2025-71154

https://security-tracker.debian.org/tracker/CVE-2025-71162

https://security-tracker.debian.org/tracker/CVE-2025-71182

https://security-tracker.debian.org/tracker/CVE-2025-71185

https://security-tracker.debian.org/tracker/CVE-2025-71186

https://security-tracker.debian.org/tracker/CVE-2025-71190

https://security-tracker.debian.org/tracker/CVE-2025-71191

https://security-tracker.debian.org/tracker/CVE-2025-71194

https://security-tracker.debian.org/tracker/CVE-2025-71196

https://security-tracker.debian.org/tracker/CVE-2025-71197

https://security-tracker.debian.org/tracker/CVE-2025-71199

https://security-tracker.debian.org/tracker/CVE-2026-22976

https://security-tracker.debian.org/tracker/CVE-2026-22977

https://security-tracker.debian.org/tracker/CVE-2026-22978

https://security-tracker.debian.org/tracker/CVE-2026-22980

https://security-tracker.debian.org/tracker/CVE-2026-22990

https://security-tracker.debian.org/tracker/CVE-2026-22991

https://security-tracker.debian.org/tracker/CVE-2026-22997

https://security-tracker.debian.org/tracker/CVE-2026-22998

https://security-tracker.debian.org/tracker/CVE-2026-22999

https://security-tracker.debian.org/tracker/CVE-2026-23001

https://security-tracker.debian.org/tracker/CVE-2026-23003

https://security-tracker.debian.org/tracker/CVE-2026-23011

https://security-tracker.debian.org/tracker/CVE-2026-23020

https://security-tracker.debian.org/tracker/CVE-2026-23021

https://security-tracker.debian.org/tracker/CVE-2026-23033

https://security-tracker.debian.org/tracker/CVE-2026-23038

https://security-tracker.debian.org/tracker/CVE-2026-23047

https://security-tracker.debian.org/tracker/CVE-2026-23049

https://security-tracker.debian.org/tracker/CVE-2026-23056

https://security-tracker.debian.org/tracker/CVE-2026-23058

https://security-tracker.debian.org/tracker/CVE-2026-23060

https://security-tracker.debian.org/tracker/CVE-2026-23061

https://security-tracker.debian.org/tracker/CVE-2026-23063

https://security-tracker.debian.org/tracker/CVE-2026-23064

https://security-tracker.debian.org/tracker/CVE-2026-23071

https://security-tracker.debian.org/tracker/CVE-2026-23073

https://security-tracker.debian.org/tracker/CVE-2026-23074

https://security-tracker.debian.org/tracker/CVE-2026-23075

https://security-tracker.debian.org/tracker/CVE-2026-23076

https://security-tracker.debian.org/tracker/CVE-2026-23080

https://security-tracker.debian.org/tracker/CVE-2026-23083

https://security-tracker.debian.org/tracker/CVE-2026-23084

https://security-tracker.debian.org/tracker/CVE-2026-23085

https://security-tracker.debian.org/tracker/CVE-2026-23087

https://security-tracker.debian.org/tracker/CVE-2026-23089

https://security-tracker.debian.org/tracker/CVE-2026-23090

https://security-tracker.debian.org/tracker/CVE-2026-23091

https://security-tracker.debian.org/tracker/CVE-2026-23095

https://security-tracker.debian.org/tracker/CVE-2026-23096

https://security-tracker.debian.org/tracker/CVE-2026-23097

https://security-tracker.debian.org/tracker/CVE-2026-23098

https://security-tracker.debian.org/tracker/CVE-2026-23101

https://security-tracker.debian.org/tracker/CVE-2026-23103

https://security-tracker.debian.org/tracker/CVE-2026-23105

https://security-tracker.debian.org/tracker/CVE-2026-23108

https://security-tracker.debian.org/tracker/CVE-2026-23110

https://packages.debian.org/source/bullseye/linux

Plugin Details

Severity: High

ID: 298680

File Name: debian_DLA-4475.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/11/2026

Updated: 2/11/2026

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-38022

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-arm, p-cpe:/a:debian:debian_linux:linux-compiler-gcc-10-x86, p-cpe:/a:debian:debian_linux:linux-config-5.10, p-cpe:/a:debian:debian_linux:linux-doc, p-cpe:/a:debian:debian_linux:linux-headers-armmp, p-cpe:/a:debian:debian_linux:linux-headers-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-armmp, p-cpe:/a:debian:debian_linux:linux-image-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-kbuild-5.10, p-cpe:/a:debian:debian_linux:linux-perf-5.10, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:nic-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:bpftool, p-cpe:/a:debian:debian_linux:linux-doc-5.10, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp, p-cpe:/a:debian:debian_linux:linux-perf, p-cpe:/a:debian:debian_linux:linux-source, p-cpe:/a:debian:debian_linux:linux-source-5.10, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-35-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ext4-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:fuse-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-arm64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-5.10.0-35-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-5.10.0-35-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-support-5.10.0-35, p-cpe:/a:debian:debian_linux:loop-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-36-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:fat-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:isofs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:jfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-5.10.0-37-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:efi-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:event-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:i2c-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:leds-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:multipath-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:nbd-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:pata-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:ppp-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:sata-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-5.10.0-38-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-5.10.0-38-armmp-di

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/10/2026

Vulnerability Publication Date: 11/15/2022

Reference Information

CVE: CVE-2022-48744, CVE-2022-49168, CVE-2022-49465, CVE-2022-49711, CVE-2022-49743, CVE-2023-52975, CVE-2023-54207, CVE-2023-54321, CVE-2024-36903, CVE-2024-36927, CVE-2025-22022, CVE-2025-22121, CVE-2025-37830, CVE-2025-38022, CVE-2025-38119, CVE-2025-38556, CVE-2025-38591, CVE-2025-39702, CVE-2025-40110, CVE-2025-40215, CVE-2025-68211, CVE-2025-68255, CVE-2025-68257, CVE-2025-68258, CVE-2025-68261, CVE-2025-68264, CVE-2025-68266, CVE-2025-68282, CVE-2025-68325, CVE-2025-68332, CVE-2025-68336, CVE-2025-68337, CVE-2025-68344, CVE-2025-68346, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68364, CVE-2025-68366, CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68725, CVE-2025-68733, CVE-2025-68740, CVE-2025-68757, CVE-2025-68758, CVE-2025-68759, CVE-2025-68764, CVE-2025-68767, CVE-2025-68769, CVE-2025-68771, CVE-2025-68773, CVE-2025-68774, CVE-2025-68776, CVE-2025-68777, CVE-2025-68782, CVE-2025-68783, CVE-2025-68785, CVE-2025-68787, CVE-2025-68788, CVE-2025-68795, CVE-2025-68796, CVE-2025-68797, CVE-2025-68799, CVE-2025-68800, CVE-2025-68801, CVE-2025-68803, CVE-2025-68804, CVE-2025-68808, CVE-2025-68813, CVE-2025-68815, CVE-2025-68816, CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-71064, CVE-2025-71066, CVE-2025-71069, CVE-2025-71075, CVE-2025-71077, CVE-2025-71079, CVE-2025-71084, CVE-2025-71085, CVE-2025-71086, CVE-2025-71087, CVE-2025-71091, CVE-2025-71093, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098, CVE-2025-71102, CVE-2025-71104, CVE-2025-71105, CVE-2025-71108, CVE-2025-71111, CVE-2025-71112, CVE-2025-71113, CVE-2025-71114, CVE-2025-71116, CVE-2025-71118, CVE-2025-71120, CVE-2025-71123, CVE-2025-71125, CVE-2025-71127, CVE-2025-71131, CVE-2025-71136, CVE-2025-71137, CVE-2025-71154, CVE-2025-71162, CVE-2025-71182, CVE-2025-71185, CVE-2025-71186, CVE-2025-71190, CVE-2025-71191, CVE-2025-71194, CVE-2025-71196, CVE-2025-71197, CVE-2025-71199, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22980, CVE-2026-22990, CVE-2026-22991, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23020, CVE-2026-23021, CVE-2026-23033, CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23056, CVE-2026-23058, CVE-2026-23060, CVE-2026-23061, CVE-2026-23063, CVE-2026-23064, CVE-2026-23071, CVE-2026-23073, CVE-2026-23074, CVE-2026-23075, CVE-2026-23076, CVE-2026-23080, CVE-2026-23083, CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23090, CVE-2026-23091, CVE-2026-23095, CVE-2026-23096, CVE-2026-23097, CVE-2026-23098, CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23110