Debian dla-4499 : linux-config-6.1 - security update

high Nessus Plugin ID 302188

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4499 advisory.

------------------------------------------------------------------------- Debian LTS Advisory DLA-4499-1 [email protected] https://www.debian.org/lts/security/ Ben Hutchings March 13, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : linux-6.1 Version : 6.1.164-1~deb11u1 CVE ID : CVE-2023-53424 CVE-2024-26822 CVE-2024-57895 CVE-2025-22026 CVE-2025-23155 CVE-2025-37786 CVE-2025-37822 CVE-2025-37920 CVE-2025-38201 CVE-2025-38643 CVE-2025-39763 CVE-2025-40082 CVE-2025-40251 CVE-2025-68358 CVE-2025-71089 CVE-2025-71144 CVE-2025-71220 CVE-2025-71222 CVE-2025-71224 CVE-2025-71232 CVE-2025-71233 CVE-2025-71235 CVE-2025-71236 CVE-2025-71237 CVE-2025-71238 CVE-2026-23111 CVE-2026-23112 CVE-2026-23169 CVE-2026-23176 CVE-2026-23178 CVE-2026-23180 CVE-2026-23182 CVE-2026-23187 CVE-2026-23190 CVE-2026-23193 CVE-2026-23198 CVE-2026-23202 CVE-2026-23205 CVE-2026-23206 CVE-2026-23209 CVE-2026-23216 CVE-2026-23220 CVE-2026-23221 CVE-2026-23222 CVE-2026-23228 CVE-2026-23229 CVE-2026-23230 CVE-2026-23234 CVE-2026-23235 CVE-2026-23236 CVE-2026-23237 CVE-2026-23238 Debian Bug : 1127597

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

The Qualys Threat Research Unit (TRU) discovered several vulnerabilities in Apparmor. Details can be found in the Qualys advisory at https://www.qualys.com/2026/03/10/crack-armor.txt

For Debian 11 bullseye, these problems have been fixed in version 6.1.164-1~deb11u1. This version also fixes a regression in the previous update. It additionally includes many more bug fixes from stable updates 6.1.163 and 6.1.164.

We recommend that you upgrade your linux-6.1 packages.

For the detailed security status of linux-6.1 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/linux-6.1

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS Attachment:
signature.asc Description: PGP signature

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the linux-config-6.1 packages.

See Also

https://security-tracker.debian.org/tracker/source-package/linux-6.1

https://security-tracker.debian.org/tracker/CVE-2023-53424

https://security-tracker.debian.org/tracker/CVE-2024-26822

https://security-tracker.debian.org/tracker/CVE-2024-57895

https://security-tracker.debian.org/tracker/CVE-2025-22026

https://security-tracker.debian.org/tracker/CVE-2025-23155

https://security-tracker.debian.org/tracker/CVE-2025-37786

https://security-tracker.debian.org/tracker/CVE-2025-37822

https://security-tracker.debian.org/tracker/CVE-2025-37920

https://security-tracker.debian.org/tracker/CVE-2025-38201

https://security-tracker.debian.org/tracker/CVE-2025-38643

https://security-tracker.debian.org/tracker/CVE-2025-39763

https://security-tracker.debian.org/tracker/CVE-2025-40082

https://security-tracker.debian.org/tracker/CVE-2025-40251

https://security-tracker.debian.org/tracker/CVE-2025-68358

https://security-tracker.debian.org/tracker/CVE-2025-71089

https://security-tracker.debian.org/tracker/CVE-2025-71144

https://security-tracker.debian.org/tracker/CVE-2025-71220

https://security-tracker.debian.org/tracker/CVE-2025-71222

https://security-tracker.debian.org/tracker/CVE-2025-71224

https://security-tracker.debian.org/tracker/CVE-2025-71232

https://security-tracker.debian.org/tracker/CVE-2025-71233

https://security-tracker.debian.org/tracker/CVE-2025-71235

https://security-tracker.debian.org/tracker/CVE-2025-71236

https://security-tracker.debian.org/tracker/CVE-2025-71237

https://security-tracker.debian.org/tracker/CVE-2025-71238

https://security-tracker.debian.org/tracker/CVE-2026-23111

https://security-tracker.debian.org/tracker/CVE-2026-23112

https://security-tracker.debian.org/tracker/CVE-2026-23169

https://security-tracker.debian.org/tracker/CVE-2026-23176

https://security-tracker.debian.org/tracker/CVE-2026-23178

https://security-tracker.debian.org/tracker/CVE-2026-23180

https://security-tracker.debian.org/tracker/CVE-2026-23182

https://security-tracker.debian.org/tracker/CVE-2026-23187

https://security-tracker.debian.org/tracker/CVE-2026-23190

https://security-tracker.debian.org/tracker/CVE-2026-23193

https://security-tracker.debian.org/tracker/CVE-2026-23198

https://security-tracker.debian.org/tracker/CVE-2026-23202

https://security-tracker.debian.org/tracker/CVE-2026-23205

https://security-tracker.debian.org/tracker/CVE-2026-23206

https://security-tracker.debian.org/tracker/CVE-2026-23209

https://security-tracker.debian.org/tracker/CVE-2026-23216

https://security-tracker.debian.org/tracker/CVE-2026-23220

https://security-tracker.debian.org/tracker/CVE-2026-23221

https://security-tracker.debian.org/tracker/CVE-2026-23222

https://security-tracker.debian.org/tracker/CVE-2026-23228

https://security-tracker.debian.org/tracker/CVE-2026-23229

https://security-tracker.debian.org/tracker/CVE-2026-23230

https://security-tracker.debian.org/tracker/CVE-2026-23234

https://security-tracker.debian.org/tracker/CVE-2026-23235

https://security-tracker.debian.org/tracker/CVE-2026-23236

https://security-tracker.debian.org/tracker/CVE-2026-23237

https://security-tracker.debian.org/tracker/CVE-2026-23238

https://packages.debian.org/source/bullseye/linux-6.1

Plugin Details

Severity: High

ID: 302188

File Name: debian_DLA-4499.nasl

Version: 1.2

Type: local

Agent: unix

Published: 3/13/2026

Updated: 3/13/2026

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2025-71089

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-686, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-686-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.43, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-686-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-dbg, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-common, p-cpe:/a:debian:debian_linux:linux-headers-6.1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-common, p-cpe:/a:debian:debian_linux:linux-support-6.1.0-0.deb11.44, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-armmp, p-cpe:/a:debian:debian_linux:linux-config-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-6.1-i386-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-686, p-cpe:/a:debian:debian_linux:linux-source-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.44-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-doc-6.1, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-headers-6.1.0-0.deb11.43-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-kbuild-6.1, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.43-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.1-armmp-lpae, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1.0-0.deb11.44-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.1-cloud-arm64-dbg

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 3/13/2026

Vulnerability Publication Date: 4/17/2024

Reference Information

CVE: CVE-2023-53424, CVE-2024-26822, CVE-2024-57895, CVE-2025-22026, CVE-2025-23155, CVE-2025-37786, CVE-2025-37822, CVE-2025-37920, CVE-2025-38201, CVE-2025-38643, CVE-2025-39763, CVE-2025-40082, CVE-2025-40251, CVE-2025-68358, CVE-2025-71089, CVE-2025-71144, CVE-2025-71220, CVE-2025-71222, CVE-2025-71224, CVE-2025-71232, CVE-2025-71233, CVE-2025-71235, CVE-2025-71236, CVE-2025-71237, CVE-2025-71238, CVE-2026-23111, CVE-2026-23112, CVE-2026-23169, CVE-2026-23176, CVE-2026-23178, CVE-2026-23180, CVE-2026-23182, CVE-2026-23187, CVE-2026-23190, CVE-2026-23193, CVE-2026-23198, CVE-2026-23202, CVE-2026-23205, CVE-2026-23206, CVE-2026-23209, CVE-2026-23216, CVE-2026-23220, CVE-2026-23221, CVE-2026-23222, CVE-2026-23228, CVE-2026-23229, CVE-2026-23230, CVE-2026-23234, CVE-2026-23235, CVE-2026-23236, CVE-2026-23237, CVE-2026-23238