https://security-tracker.debian.org/tracker/source-package/linux-6.1
https://security-tracker.debian.org/tracker/CVE-2023-53424
https://security-tracker.debian.org/tracker/CVE-2024-26822
https://security-tracker.debian.org/tracker/CVE-2024-57895
https://security-tracker.debian.org/tracker/CVE-2025-22026
https://security-tracker.debian.org/tracker/CVE-2025-23155
https://security-tracker.debian.org/tracker/CVE-2025-37786
https://security-tracker.debian.org/tracker/CVE-2025-37822
https://security-tracker.debian.org/tracker/CVE-2025-37920
https://security-tracker.debian.org/tracker/CVE-2025-38201
https://security-tracker.debian.org/tracker/CVE-2025-38643
https://security-tracker.debian.org/tracker/CVE-2025-39763
https://security-tracker.debian.org/tracker/CVE-2025-40082
https://security-tracker.debian.org/tracker/CVE-2025-40251
https://security-tracker.debian.org/tracker/CVE-2025-68358
https://security-tracker.debian.org/tracker/CVE-2025-71089
https://security-tracker.debian.org/tracker/CVE-2025-71144
https://security-tracker.debian.org/tracker/CVE-2025-71220
https://security-tracker.debian.org/tracker/CVE-2025-71222
https://security-tracker.debian.org/tracker/CVE-2025-71224
https://security-tracker.debian.org/tracker/CVE-2025-71232
https://security-tracker.debian.org/tracker/CVE-2025-71233
https://security-tracker.debian.org/tracker/CVE-2025-71235
https://security-tracker.debian.org/tracker/CVE-2025-71236
https://security-tracker.debian.org/tracker/CVE-2025-71237
https://security-tracker.debian.org/tracker/CVE-2025-71238
https://security-tracker.debian.org/tracker/CVE-2026-23111
https://security-tracker.debian.org/tracker/CVE-2026-23112
https://security-tracker.debian.org/tracker/CVE-2026-23169
https://security-tracker.debian.org/tracker/CVE-2026-23176
https://security-tracker.debian.org/tracker/CVE-2026-23178
https://security-tracker.debian.org/tracker/CVE-2026-23180
https://security-tracker.debian.org/tracker/CVE-2026-23182
https://security-tracker.debian.org/tracker/CVE-2026-23187
https://security-tracker.debian.org/tracker/CVE-2026-23190
https://security-tracker.debian.org/tracker/CVE-2026-23193
https://security-tracker.debian.org/tracker/CVE-2026-23198
https://security-tracker.debian.org/tracker/CVE-2026-23202
https://security-tracker.debian.org/tracker/CVE-2026-23205
https://security-tracker.debian.org/tracker/CVE-2026-23206
https://security-tracker.debian.org/tracker/CVE-2026-23209
https://security-tracker.debian.org/tracker/CVE-2026-23216
https://security-tracker.debian.org/tracker/CVE-2026-23220
https://security-tracker.debian.org/tracker/CVE-2026-23221
https://security-tracker.debian.org/tracker/CVE-2026-23222
https://security-tracker.debian.org/tracker/CVE-2026-23228
https://security-tracker.debian.org/tracker/CVE-2026-23229
https://security-tracker.debian.org/tracker/CVE-2026-23230
https://security-tracker.debian.org/tracker/CVE-2026-23234
https://security-tracker.debian.org/tracker/CVE-2026-23235
https://security-tracker.debian.org/tracker/CVE-2026-23236
https://security-tracker.debian.org/tracker/CVE-2026-23237
Severity: High
ID: 302188
File Name: debian_DLA-4499.nasl
Version: 1.2
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 3/13/2026
Updated: 3/13/2026
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2025-71089
Risk Factor: High
Base Score: 7.8
Temporal Score: 6.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-686, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.43, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-dbg, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-common, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.44, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-armmp, p-cpe:/a:debian:debian_linux:linux-config-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-686, p-cpe:/a:debian:debian_linux:linux-source-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-doc-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-kbuild-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-arm64-dbg
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Ease: No known exploits are available
Patch Publication Date: 3/13/2026
Vulnerability Publication Date: 4/17/2024
CVE: CVE-2023-53424, CVE-2024-26822, CVE-2024-57895, CVE-2025-22026, CVE-2025-23155, CVE-2025-37786, CVE-2025-37822, CVE-2025-37920, CVE-2025-38201, CVE-2025-38643, CVE-2025-39763, CVE-2025-40082, CVE-2025-40251, CVE-2025-68358, CVE-2025-71089, CVE-2025-71144, CVE-2025-71220, CVE-2025-71222, CVE-2025-71224, CVE-2025-71232, CVE-2025-71233, CVE-2025-71235, CVE-2025-71236, CVE-2025-71237, CVE-2025-71238, CVE-2026-23111, CVE-2026-23112, CVE-2026-23169, CVE-2026-23176, CVE-2026-23178, CVE-2026-23180, CVE-2026-23182, CVE-2026-23187, CVE-2026-23190, CVE-2026-23193, CVE-2026-23198, CVE-2026-23202, CVE-2026-23205, CVE-2026-23206, CVE-2026-23209, CVE-2026-23216, CVE-2026-23220, CVE-2026-23221, CVE-2026-23222, CVE-2026-23228, CVE-2026-23229, CVE-2026-23230, CVE-2026-23234, CVE-2026-23235, CVE-2026-23236, CVE-2026-23237, CVE-2026-23238