Debian dsa-6238 : ata-modules-6.12.74+deb13+1-armmp-di - security update

high Nessus Plugin ID 311299

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6238 advisory.

- ------------------------------------------------------------------------- Debian Security Advisory DSA-6238-1 [email protected] https://www.debian.org/security/ Salvatore Bonaccorso April 30, 2026 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : linux CVE ID : CVE-2024-14027 CVE-2025-21709 CVE-2025-22116 CVE-2025-22117 CVE-2025-38426 CVE-2025-38627 CVE-2025-39764 CVE-2025-40005 CVE-2025-40135 CVE-2025-40147 CVE-2025-40150 CVE-2025-40219 CVE-2025-68175 CVE-2025-68239 CVE-2025-68334 CVE-2025-68736 CVE-2025-71152 CVE-2025-71161 CVE-2025-71221 CVE-2025-71239 CVE-2025-71265 CVE-2025-71266 CVE-2025-71267 CVE-2025-71269 CVE-2026-22981 CVE-2026-22985 CVE-2026-22986 CVE-2026-22993 CVE-2026-23004 CVE-2026-23066 CVE-2026-23070 CVE-2026-23104 CVE-2026-23138 CVE-2026-23157 CVE-2026-23207 CVE-2026-23210 CVE-2026-23226 CVE-2026-23227 CVE-2026-23231 CVE-2026-23239 CVE-2026-23240 CVE-2026-23242 CVE-2026-23243 CVE-2026-23244 CVE-2026-23245 CVE-2026-23246 CVE-2026-23249 CVE-2026-23250 CVE-2026-23251 CVE-2026-23252 CVE-2026-23253 CVE-2026-23255 CVE-2026-23270 CVE-2026-23271 CVE-2026-23273 CVE-2026-23274 CVE-2026-23276 CVE-2026-23277 CVE-2026-23278 CVE-2026-23279 CVE-2026-23281 CVE-2026-23284 CVE-2026-23285 CVE-2026-23286 CVE-2026-23287 CVE-2026-23289 CVE-2026-23290 CVE-2026-23291 CVE-2026-23292 CVE-2026-23293 CVE-2026-23296 CVE-2026-23297 CVE-2026-23298 CVE-2026-23300 CVE-2026-23302 CVE-2026-23303 CVE-2026-23304 CVE-2026-23306 CVE-2026-23307 CVE-2026-23308 CVE-2026-23310 CVE-2026-23312 CVE-2026-23313 CVE-2026-23315 CVE-2026-23316 CVE-2026-23317 CVE-2026-23318 CVE-2026-23319 CVE-2026-23321 CVE-2026-23324 CVE-2026-23325 CVE-2026-23330 CVE-2026-23334 CVE-2026-23335 CVE-2026-23336 CVE-2026-23339 CVE-2026-23340 CVE-2026-23343 CVE-2026-23347 CVE-2026-23351 CVE-2026-23352 CVE-2026-23354 CVE-2026-23356 CVE-2026-23357 CVE-2026-23359 CVE-2026-23360 CVE-2026-23361 CVE-2026-23362 CVE-2026-23363 CVE-2026-23364 CVE-2026-23365 CVE-2026-23367 CVE-2026-23368 CVE-2026-23369 CVE-2026-23370 CVE-2026-23372 CVE-2026-23373 CVE-2026-23374 CVE-2026-23375 CVE-2026-23378 CVE-2026-23379 CVE-2026-23380 CVE-2026-23381 CVE-2026-23382 CVE-2026-23383 CVE-2026-23386 CVE-2026-23387 CVE-2026-23388 CVE-2026-23389 CVE-2026-23391 CVE-2026-23392 CVE-2026-23393 CVE-2026-23395 CVE-2026-23396 CVE-2026-23397 CVE-2026-23398 CVE-2026-23399 CVE-2026-23401 CVE-2026-23412 CVE-2026-23413 CVE-2026-23414 CVE-2026-23417 CVE-2026-23419 CVE-2026-23420 CVE-2026-23422 CVE-2026-23426 CVE-2026-23427 CVE-2026-23428 CVE-2026-23434 CVE-2026-23438 CVE-2026-23439 CVE-2026-23440 CVE-2026-23441 CVE-2026-23442 CVE-2026-23444 CVE-2026-23445 CVE-2026-23446 CVE-2026-23447 CVE-2026-23448 CVE-2026-23449 CVE-2026-23450 CVE-2026-23452 CVE-2026-23454 CVE-2026-23455 CVE-2026-23456 CVE-2026-23457 CVE-2026-23458 CVE-2026-23460 CVE-2026-23461 CVE-2026-23462 CVE-2026-23463 CVE-2026-23464 CVE-2026-23465 CVE-2026-23466 CVE-2026-23470 CVE-2026-23474 CVE-2026-23475 CVE-2026-31389 CVE-2026-31391 CVE-2026-31392 CVE-2026-31393 CVE-2026-31394 CVE-2026-31396 CVE-2026-31399 CVE-2026-31400 CVE-2026-31401 CVE-2026-31402 CVE-2026-31403 CVE-2026-31405 CVE-2026-31406 CVE-2026-31407 CVE-2026-31408 CVE-2026-31409 CVE-2026-31410 CVE-2026-31411 CVE-2026-31412 CVE-2026-31414 CVE-2026-31415 CVE-2026-31416 CVE-2026-31417 CVE-2026-31418 CVE-2026-31421 CVE-2026-31422 CVE-2026-31423 CVE-2026-31424 CVE-2026-31425 CVE-2026-31426 CVE-2026-31427 CVE-2026-31428 CVE-2026-31429 CVE-2026-31430 CVE-2026-31431 CVE-2026-31432 CVE-2026-31433 CVE-2026-31434 CVE-2026-31436 CVE-2026-31438 CVE-2026-31439 CVE-2026-31440 CVE-2026-31441 CVE-2026-31446 CVE-2026-31447 CVE-2026-31448 CVE-2026-31449 CVE-2026-31450 CVE-2026-31451 CVE-2026-31452 CVE-2026-31453 CVE-2026-31454 CVE-2026-31455 CVE-2026-31458 CVE-2026-31462 CVE-2026-31464 CVE-2026-31466 CVE-2026-31467 CVE-2026-31469 CVE-2026-31470 CVE-2026-31473 CVE-2026-31474 CVE-2026-31476 CVE-2026-31477 CVE-2026-31478 CVE-2026-31479 CVE-2026-31480 CVE-2026-31482 CVE-2026-31483 CVE-2026-31485 CVE-2026-31487 CVE-2026-31488 CVE-2026-31489 CVE-2026-31492 CVE-2026-31494 CVE-2026-31495 CVE-2026-31496 CVE-2026-31497 CVE-2026-31498 CVE-2026-31500 CVE-2026-31502 CVE-2026-31503 CVE-2026-31504 CVE-2026-31505 CVE-2026-31506 CVE-2026-31507 CVE-2026-31508 CVE-2026-31509 CVE-2026-31510 CVE-2026-31511 CVE-2026-31512 CVE-2026-31515 CVE-2026-31516 CVE-2026-31518 CVE-2026-31519 CVE-2026-31520 CVE-2026-31521 CVE-2026-31522 CVE-2026-31523 CVE-2026-31524 CVE-2026-31525 CVE-2026-31527 CVE-2026-31528 CVE-2026-31530 CVE-2026-31531 CVE-2026-31532 CVE-2026-31533 CVE-2026-31540 CVE-2026-31542 CVE-2026-31545 CVE-2026-31546 CVE-2026-31548 CVE-2026-31549 CVE-2026-31550 CVE-2026-31551 CVE-2026-31552 CVE-2026-31554 CVE-2026-31555 CVE-2026-31556 CVE-2026-31557 CVE-2026-31558 CVE-2026-31559 CVE-2026-31561 CVE-2026-31563 CVE-2026-31565 CVE-2026-31566 CVE-2026-31570 CVE-2026-31575 CVE-2026-31576 CVE-2026-31577 CVE-2026-31578 CVE-2026-31580 CVE-2026-31581 CVE-2026-31582 CVE-2026-31583 CVE-2026-31584 CVE-2026-31585 CVE-2026-31586 CVE-2026-31587 CVE-2026-31588 CVE-2026-31590 CVE-2026-31593 CVE-2026-31594 CVE-2026-31595 CVE-2026-31596 CVE-2026-31597 CVE-2026-31598 CVE-2026-31599 CVE-2026-31602 CVE-2026-31603 CVE-2026-31604 CVE-2026-31605 CVE-2026-31606 CVE-2026-31607 CVE-2026-31610 CVE-2026-31611 CVE-2026-31612 CVE-2026-31614 CVE-2026-31615 CVE-2026-31616 CVE-2026-31617 CVE-2026-31618 CVE-2026-31619 CVE-2026-31622 CVE-2026-31623 CVE-2026-31624 CVE-2026-31625 CVE-2026-31626 CVE-2026-31627 CVE-2026-31628 CVE-2026-31629 CVE-2026-31634 CVE-2026-31637 CVE-2026-31638 CVE-2026-31639 CVE-2026-31642 CVE-2026-31644 CVE-2026-31645 CVE-2026-31646 CVE-2026-31647 CVE-2026-31648 CVE-2026-31649 CVE-2026-31651 CVE-2026-31655 CVE-2026-31656 CVE-2026-31657 CVE-2026-31658 CVE-2026-31659 CVE-2026-31660 CVE-2026-31661 CVE-2026-31662 CVE-2026-31664 CVE-2026-31665 CVE-2026-31666 CVE-2026-31667 CVE-2026-31668 CVE-2026-31669 CVE-2026-31670 CVE-2026-31671 CVE-2026-31672 CVE-2026-31673 CVE-2026-31674 CVE-2026-31675 CVE-2026-31676 CVE-2026-31677 CVE-2026-31678 CVE-2026-31679 CVE-2026-31680 CVE-2026-31681 CVE-2026-31682 CVE-2026-31683 CVE-2026-31684 CVE-2026-31685 CVE-2026-31686 CVE-2026-31689 CVE-2026-31693 CVE-2026-31786 CVE-2026-31787 CVE-2026-31788

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

For the stable distribution (trixie), these problems have been fixed in version 6.12.85-1.

We recommend that you upgrade your linux packages.

For the detailed security status of linux please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/linux

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: [email protected]

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the ata-modules-6.12.74+deb13+1-armmp-di packages.

See Also

https://security-tracker.debian.org/tracker/source-package/linux

https://security-tracker.debian.org/tracker/CVE-2024-14027

https://security-tracker.debian.org/tracker/CVE-2025-21709

https://security-tracker.debian.org/tracker/CVE-2025-22116

https://security-tracker.debian.org/tracker/CVE-2025-22117

https://security-tracker.debian.org/tracker/CVE-2025-38426

https://security-tracker.debian.org/tracker/CVE-2025-38627

https://security-tracker.debian.org/tracker/CVE-2025-39764

https://security-tracker.debian.org/tracker/CVE-2025-40005

https://security-tracker.debian.org/tracker/CVE-2025-40135

https://security-tracker.debian.org/tracker/CVE-2025-40147

https://security-tracker.debian.org/tracker/CVE-2025-40150

https://security-tracker.debian.org/tracker/CVE-2025-40219

https://security-tracker.debian.org/tracker/CVE-2025-68175

https://security-tracker.debian.org/tracker/CVE-2025-68239

https://security-tracker.debian.org/tracker/CVE-2025-68334

https://security-tracker.debian.org/tracker/CVE-2025-68736

https://security-tracker.debian.org/tracker/CVE-2025-71152

https://security-tracker.debian.org/tracker/CVE-2025-71161

https://security-tracker.debian.org/tracker/CVE-2025-71221

https://security-tracker.debian.org/tracker/CVE-2025-71239

https://security-tracker.debian.org/tracker/CVE-2025-71265

https://security-tracker.debian.org/tracker/CVE-2025-71266

https://security-tracker.debian.org/tracker/CVE-2025-71267

https://security-tracker.debian.org/tracker/CVE-2025-71269

https://security-tracker.debian.org/tracker/CVE-2026-22981

https://security-tracker.debian.org/tracker/CVE-2026-22985

https://security-tracker.debian.org/tracker/CVE-2026-22986

https://security-tracker.debian.org/tracker/CVE-2026-22993

https://security-tracker.debian.org/tracker/CVE-2026-23004

https://security-tracker.debian.org/tracker/CVE-2026-23066

https://security-tracker.debian.org/tracker/CVE-2026-23070

https://security-tracker.debian.org/tracker/CVE-2026-23104

https://security-tracker.debian.org/tracker/CVE-2026-23138

https://security-tracker.debian.org/tracker/CVE-2026-23157

https://security-tracker.debian.org/tracker/CVE-2026-23207

https://security-tracker.debian.org/tracker/CVE-2026-23210

https://security-tracker.debian.org/tracker/CVE-2026-23226

https://security-tracker.debian.org/tracker/CVE-2026-23347

https://security-tracker.debian.org/tracker/CVE-2026-23351

https://security-tracker.debian.org/tracker/CVE-2026-23352

https://security-tracker.debian.org/tracker/CVE-2026-23354

https://security-tracker.debian.org/tracker/CVE-2026-23356

https://security-tracker.debian.org/tracker/CVE-2026-23357

https://security-tracker.debian.org/tracker/CVE-2026-23359

https://security-tracker.debian.org/tracker/CVE-2026-23360

https://security-tracker.debian.org/tracker/CVE-2026-23361

https://security-tracker.debian.org/tracker/CVE-2026-23362

https://security-tracker.debian.org/tracker/CVE-2026-23363

https://security-tracker.debian.org/tracker/CVE-2026-23364

https://security-tracker.debian.org/tracker/CVE-2026-23365

https://security-tracker.debian.org/tracker/CVE-2026-23367

https://security-tracker.debian.org/tracker/CVE-2026-23368

https://security-tracker.debian.org/tracker/CVE-2026-23369

https://security-tracker.debian.org/tracker/CVE-2026-23370

https://security-tracker.debian.org/tracker/CVE-2026-23372

https://security-tracker.debian.org/tracker/CVE-2026-23373

https://security-tracker.debian.org/tracker/CVE-2026-23374

https://security-tracker.debian.org/tracker/CVE-2026-23375

https://security-tracker.debian.org/tracker/CVE-2026-23378

https://security-tracker.debian.org/tracker/CVE-2026-23379

https://security-tracker.debian.org/tracker/CVE-2026-23380

https://security-tracker.debian.org/tracker/CVE-2026-23381

https://security-tracker.debian.org/tracker/CVE-2026-23382

https://security-tracker.debian.org/tracker/CVE-2026-23383

https://security-tracker.debian.org/tracker/CVE-2026-23386

https://security-tracker.debian.org/tracker/CVE-2026-23387

https://security-tracker.debian.org/tracker/CVE-2026-23388

https://security-tracker.debian.org/tracker/CVE-2026-23389

https://security-tracker.debian.org/tracker/CVE-2026-23391

https://security-tracker.debian.org/tracker/CVE-2026-23392

https://security-tracker.debian.org/tracker/CVE-2026-23393

https://security-tracker.debian.org/tracker/CVE-2026-23395

https://security-tracker.debian.org/tracker/CVE-2026-23396

https://security-tracker.debian.org/tracker/CVE-2026-23397

https://security-tracker.debian.org/tracker/CVE-2026-23398

https://security-tracker.debian.org/tracker/CVE-2026-23399

https://security-tracker.debian.org/tracker/CVE-2026-23401

https://security-tracker.debian.org/tracker/CVE-2026-23438

https://security-tracker.debian.org/tracker/CVE-2026-23439

https://security-tracker.debian.org/tracker/CVE-2026-23440

https://security-tracker.debian.org/tracker/CVE-2026-23441

https://security-tracker.debian.org/tracker/CVE-2026-23442

https://security-tracker.debian.org/tracker/CVE-2026-23444

https://security-tracker.debian.org/tracker/CVE-2026-23445

https://security-tracker.debian.org/tracker/CVE-2026-23446

https://security-tracker.debian.org/tracker/CVE-2026-23447

https://security-tracker.debian.org/tracker/CVE-2026-23448

https://security-tracker.debian.org/tracker/CVE-2026-23449

https://security-tracker.debian.org/tracker/CVE-2026-23227

https://security-tracker.debian.org/tracker/CVE-2026-23231

https://security-tracker.debian.org/tracker/CVE-2026-23239

https://security-tracker.debian.org/tracker/CVE-2026-23240

https://security-tracker.debian.org/tracker/CVE-2026-23242

https://security-tracker.debian.org/tracker/CVE-2026-23243

https://security-tracker.debian.org/tracker/CVE-2026-23244

https://security-tracker.debian.org/tracker/CVE-2026-23245

https://security-tracker.debian.org/tracker/CVE-2026-23246

https://security-tracker.debian.org/tracker/CVE-2026-23249

https://security-tracker.debian.org/tracker/CVE-2026-23250

https://security-tracker.debian.org/tracker/CVE-2026-23251

https://security-tracker.debian.org/tracker/CVE-2026-23252

https://security-tracker.debian.org/tracker/CVE-2026-23253

https://security-tracker.debian.org/tracker/CVE-2026-23255

https://security-tracker.debian.org/tracker/CVE-2026-23270

https://security-tracker.debian.org/tracker/CVE-2026-23271

https://security-tracker.debian.org/tracker/CVE-2026-23273

https://security-tracker.debian.org/tracker/CVE-2026-23274

https://security-tracker.debian.org/tracker/CVE-2026-23276

https://security-tracker.debian.org/tracker/CVE-2026-23277

https://security-tracker.debian.org/tracker/CVE-2026-23278

https://security-tracker.debian.org/tracker/CVE-2026-23279

https://security-tracker.debian.org/tracker/CVE-2026-23281

https://security-tracker.debian.org/tracker/CVE-2026-23284

https://security-tracker.debian.org/tracker/CVE-2026-23285

https://security-tracker.debian.org/tracker/CVE-2026-23286

https://security-tracker.debian.org/tracker/CVE-2026-23287

https://security-tracker.debian.org/tracker/CVE-2026-23289

https://security-tracker.debian.org/tracker/CVE-2026-23290

https://security-tracker.debian.org/tracker/CVE-2026-23291

https://security-tracker.debian.org/tracker/CVE-2026-23292

https://security-tracker.debian.org/tracker/CVE-2026-23293

https://security-tracker.debian.org/tracker/CVE-2026-23296

https://security-tracker.debian.org/tracker/CVE-2026-23297

https://security-tracker.debian.org/tracker/CVE-2026-23298

https://security-tracker.debian.org/tracker/CVE-2026-23300

https://security-tracker.debian.org/tracker/CVE-2026-23302

https://security-tracker.debian.org/tracker/CVE-2026-23303

https://security-tracker.debian.org/tracker/CVE-2026-23304

https://security-tracker.debian.org/tracker/CVE-2026-23306

https://security-tracker.debian.org/tracker/CVE-2026-23307

https://security-tracker.debian.org/tracker/CVE-2026-23308

https://security-tracker.debian.org/tracker/CVE-2026-23310

https://security-tracker.debian.org/tracker/CVE-2026-23312

https://security-tracker.debian.org/tracker/CVE-2026-23313

https://security-tracker.debian.org/tracker/CVE-2026-23315

https://security-tracker.debian.org/tracker/CVE-2026-23316

https://security-tracker.debian.org/tracker/CVE-2026-23317

https://security-tracker.debian.org/tracker/CVE-2026-23318

https://security-tracker.debian.org/tracker/CVE-2026-23319

https://security-tracker.debian.org/tracker/CVE-2026-23321

https://security-tracker.debian.org/tracker/CVE-2026-23324

https://security-tracker.debian.org/tracker/CVE-2026-23325

https://security-tracker.debian.org/tracker/CVE-2026-23330

https://security-tracker.debian.org/tracker/CVE-2026-23334

https://security-tracker.debian.org/tracker/CVE-2026-23335

https://security-tracker.debian.org/tracker/CVE-2026-23336

https://security-tracker.debian.org/tracker/CVE-2026-23339

https://security-tracker.debian.org/tracker/CVE-2026-23340

https://security-tracker.debian.org/tracker/CVE-2026-23343

https://security-tracker.debian.org/tracker/CVE-2026-23412

https://security-tracker.debian.org/tracker/CVE-2026-23413

https://security-tracker.debian.org/tracker/CVE-2026-23414

https://security-tracker.debian.org/tracker/CVE-2026-23417

https://security-tracker.debian.org/tracker/CVE-2026-23419

https://security-tracker.debian.org/tracker/CVE-2026-23420

https://security-tracker.debian.org/tracker/CVE-2026-23422

https://security-tracker.debian.org/tracker/CVE-2026-23426

https://security-tracker.debian.org/tracker/CVE-2026-23427

https://security-tracker.debian.org/tracker/CVE-2026-23428

https://security-tracker.debian.org/tracker/CVE-2026-23434

https://security-tracker.debian.org/tracker/CVE-2026-23457

https://security-tracker.debian.org/tracker/CVE-2026-23458

https://security-tracker.debian.org/tracker/CVE-2026-23460

https://security-tracker.debian.org/tracker/CVE-2026-23461

https://security-tracker.debian.org/tracker/CVE-2026-23462

https://security-tracker.debian.org/tracker/CVE-2026-23463

https://security-tracker.debian.org/tracker/CVE-2026-23464

https://security-tracker.debian.org/tracker/CVE-2026-23465

https://security-tracker.debian.org/tracker/CVE-2026-23466

https://security-tracker.debian.org/tracker/CVE-2026-23450

https://security-tracker.debian.org/tracker/CVE-2026-23452

https://security-tracker.debian.org/tracker/CVE-2026-23454

https://security-tracker.debian.org/tracker/CVE-2026-23455

https://security-tracker.debian.org/tracker/CVE-2026-23456

https://security-tracker.debian.org/tracker/CVE-2026-31431

https://security-tracker.debian.org/tracker/CVE-2026-31432

https://security-tracker.debian.org/tracker/CVE-2026-31433

https://security-tracker.debian.org/tracker/CVE-2026-31434

https://security-tracker.debian.org/tracker/CVE-2026-31436

https://security-tracker.debian.org/tracker/CVE-2026-31438

https://security-tracker.debian.org/tracker/CVE-2026-31439

https://security-tracker.debian.org/tracker/CVE-2026-31440

https://security-tracker.debian.org/tracker/CVE-2026-31441

https://security-tracker.debian.org/tracker/CVE-2026-31446

https://security-tracker.debian.org/tracker/CVE-2026-31447

https://security-tracker.debian.org/tracker/CVE-2026-31448

https://security-tracker.debian.org/tracker/CVE-2026-31449

https://security-tracker.debian.org/tracker/CVE-2026-31466

https://security-tracker.debian.org/tracker/CVE-2026-31467

https://security-tracker.debian.org/tracker/CVE-2026-31469

https://security-tracker.debian.org/tracker/CVE-2026-31470

https://security-tracker.debian.org/tracker/CVE-2026-31473

https://security-tracker.debian.org/tracker/CVE-2026-31531

https://security-tracker.debian.org/tracker/CVE-2026-31532

https://security-tracker.debian.org/tracker/CVE-2026-31533

https://security-tracker.debian.org/tracker/CVE-2026-31540

https://security-tracker.debian.org/tracker/CVE-2026-31542

https://security-tracker.debian.org/tracker/CVE-2026-31545

https://security-tracker.debian.org/tracker/CVE-2026-31546

https://security-tracker.debian.org/tracker/CVE-2026-31548

https://security-tracker.debian.org/tracker/CVE-2026-31549

https://security-tracker.debian.org/tracker/CVE-2026-31550

https://security-tracker.debian.org/tracker/CVE-2026-31551

https://security-tracker.debian.org/tracker/CVE-2026-31552

https://security-tracker.debian.org/tracker/CVE-2026-31554

https://security-tracker.debian.org/tracker/CVE-2026-31555

https://security-tracker.debian.org/tracker/CVE-2026-31556

https://security-tracker.debian.org/tracker/CVE-2026-31557

https://security-tracker.debian.org/tracker/CVE-2026-31558

https://security-tracker.debian.org/tracker/CVE-2026-31559

https://security-tracker.debian.org/tracker/CVE-2026-31561

https://security-tracker.debian.org/tracker/CVE-2026-31563

https://security-tracker.debian.org/tracker/CVE-2026-31565

https://security-tracker.debian.org/tracker/CVE-2026-31566

https://security-tracker.debian.org/tracker/CVE-2026-31570

https://security-tracker.debian.org/tracker/CVE-2026-31575

https://security-tracker.debian.org/tracker/CVE-2026-31576

https://security-tracker.debian.org/tracker/CVE-2026-31577

https://security-tracker.debian.org/tracker/CVE-2026-31578

https://security-tracker.debian.org/tracker/CVE-2026-31580

https://security-tracker.debian.org/tracker/CVE-2026-31581

https://security-tracker.debian.org/tracker/CVE-2026-31582

https://security-tracker.debian.org/tracker/CVE-2026-31583

https://security-tracker.debian.org/tracker/CVE-2026-31584

https://security-tracker.debian.org/tracker/CVE-2026-31585

https://security-tracker.debian.org/tracker/CVE-2026-31586

https://security-tracker.debian.org/tracker/CVE-2026-31587

https://security-tracker.debian.org/tracker/CVE-2026-31588

https://security-tracker.debian.org/tracker/CVE-2026-31590

https://security-tracker.debian.org/tracker/CVE-2026-31593

https://security-tracker.debian.org/tracker/CVE-2026-31594

https://security-tracker.debian.org/tracker/CVE-2026-31595

https://security-tracker.debian.org/tracker/CVE-2026-31596

https://security-tracker.debian.org/tracker/CVE-2026-31597

https://security-tracker.debian.org/tracker/CVE-2026-31598

https://security-tracker.debian.org/tracker/CVE-2026-31599

https://security-tracker.debian.org/tracker/CVE-2026-31602

https://security-tracker.debian.org/tracker/CVE-2026-31603

https://security-tracker.debian.org/tracker/CVE-2026-31604

https://security-tracker.debian.org/tracker/CVE-2026-31605

https://security-tracker.debian.org/tracker/CVE-2026-31606

https://security-tracker.debian.org/tracker/CVE-2026-31607

https://security-tracker.debian.org/tracker/CVE-2026-31610

https://security-tracker.debian.org/tracker/CVE-2026-31677

https://security-tracker.debian.org/tracker/CVE-2026-31678

https://security-tracker.debian.org/tracker/CVE-2026-31679

https://security-tracker.debian.org/tracker/CVE-2026-31680

https://security-tracker.debian.org/tracker/CVE-2026-31681

https://security-tracker.debian.org/tracker/CVE-2026-31682

https://security-tracker.debian.org/tracker/CVE-2026-31683

https://security-tracker.debian.org/tracker/CVE-2026-31684

https://security-tracker.debian.org/tracker/CVE-2026-31685

https://security-tracker.debian.org/tracker/CVE-2026-31686

https://security-tracker.debian.org/tracker/CVE-2026-31689

https://security-tracker.debian.org/tracker/CVE-2026-31693

https://security-tracker.debian.org/tracker/CVE-2026-31786

https://security-tracker.debian.org/tracker/CVE-2026-31787

https://security-tracker.debian.org/tracker/CVE-2026-31611

https://security-tracker.debian.org/tracker/CVE-2026-31612

https://security-tracker.debian.org/tracker/CVE-2026-31614

https://security-tracker.debian.org/tracker/CVE-2026-31615

https://security-tracker.debian.org/tracker/CVE-2026-31616

https://security-tracker.debian.org/tracker/CVE-2026-31617

https://security-tracker.debian.org/tracker/CVE-2026-31618

https://security-tracker.debian.org/tracker/CVE-2026-31619

https://security-tracker.debian.org/tracker/CVE-2026-31622

https://security-tracker.debian.org/tracker/CVE-2026-31623

https://security-tracker.debian.org/tracker/CVE-2026-31624

https://security-tracker.debian.org/tracker/CVE-2026-31625

https://security-tracker.debian.org/tracker/CVE-2026-31626

https://security-tracker.debian.org/tracker/CVE-2026-31627

https://security-tracker.debian.org/tracker/CVE-2026-31628

https://security-tracker.debian.org/tracker/CVE-2026-31629

https://security-tracker.debian.org/tracker/CVE-2026-31634

https://security-tracker.debian.org/tracker/CVE-2026-31637

https://security-tracker.debian.org/tracker/CVE-2026-31638

https://security-tracker.debian.org/tracker/CVE-2026-31639

https://security-tracker.debian.org/tracker/CVE-2026-31642

https://security-tracker.debian.org/tracker/CVE-2026-31644

https://security-tracker.debian.org/tracker/CVE-2026-31645

https://security-tracker.debian.org/tracker/CVE-2026-31646

https://security-tracker.debian.org/tracker/CVE-2026-31647

https://security-tracker.debian.org/tracker/CVE-2026-31648

https://security-tracker.debian.org/tracker/CVE-2026-31649

https://security-tracker.debian.org/tracker/CVE-2026-31651

https://security-tracker.debian.org/tracker/CVE-2026-31655

https://security-tracker.debian.org/tracker/CVE-2026-31656

https://security-tracker.debian.org/tracker/CVE-2026-31657

https://security-tracker.debian.org/tracker/CVE-2026-31658

https://security-tracker.debian.org/tracker/CVE-2026-31659

https://security-tracker.debian.org/tracker/CVE-2026-31660

https://security-tracker.debian.org/tracker/CVE-2026-31661

https://security-tracker.debian.org/tracker/CVE-2026-31662

https://security-tracker.debian.org/tracker/CVE-2026-31664

https://security-tracker.debian.org/tracker/CVE-2026-31665

https://security-tracker.debian.org/tracker/CVE-2026-31666

https://security-tracker.debian.org/tracker/CVE-2026-31667

https://security-tracker.debian.org/tracker/CVE-2026-31668

https://security-tracker.debian.org/tracker/CVE-2026-31669

https://security-tracker.debian.org/tracker/CVE-2026-31670

https://security-tracker.debian.org/tracker/CVE-2026-31671

https://security-tracker.debian.org/tracker/CVE-2026-31672

https://security-tracker.debian.org/tracker/CVE-2026-31673

https://security-tracker.debian.org/tracker/CVE-2026-31674

https://security-tracker.debian.org/tracker/CVE-2026-31675

https://security-tracker.debian.org/tracker/CVE-2026-31676

https://security-tracker.debian.org/tracker/CVE-2026-31788

https://packages.debian.org/source/trixie/linux

https://security-tracker.debian.org/tracker/CVE-2026-23470

https://security-tracker.debian.org/tracker/CVE-2026-23474

https://security-tracker.debian.org/tracker/CVE-2026-23475

https://security-tracker.debian.org/tracker/CVE-2026-31389

https://security-tracker.debian.org/tracker/CVE-2026-31391

https://security-tracker.debian.org/tracker/CVE-2026-31392

https://security-tracker.debian.org/tracker/CVE-2026-31393

https://security-tracker.debian.org/tracker/CVE-2026-31394

https://security-tracker.debian.org/tracker/CVE-2026-31396

https://security-tracker.debian.org/tracker/CVE-2026-31399

https://security-tracker.debian.org/tracker/CVE-2026-31400

https://security-tracker.debian.org/tracker/CVE-2026-31401

https://security-tracker.debian.org/tracker/CVE-2026-31402

https://security-tracker.debian.org/tracker/CVE-2026-31403

https://security-tracker.debian.org/tracker/CVE-2026-31405

https://security-tracker.debian.org/tracker/CVE-2026-31406

https://security-tracker.debian.org/tracker/CVE-2026-31407

https://security-tracker.debian.org/tracker/CVE-2026-31408

https://security-tracker.debian.org/tracker/CVE-2026-31409

https://security-tracker.debian.org/tracker/CVE-2026-31410

https://security-tracker.debian.org/tracker/CVE-2026-31411

https://security-tracker.debian.org/tracker/CVE-2026-31412

https://security-tracker.debian.org/tracker/CVE-2026-31414

https://security-tracker.debian.org/tracker/CVE-2026-31415

https://security-tracker.debian.org/tracker/CVE-2026-31416

https://security-tracker.debian.org/tracker/CVE-2026-31417

https://security-tracker.debian.org/tracker/CVE-2026-31418

https://security-tracker.debian.org/tracker/CVE-2026-31421

https://security-tracker.debian.org/tracker/CVE-2026-31422

https://security-tracker.debian.org/tracker/CVE-2026-31423

https://security-tracker.debian.org/tracker/CVE-2026-31424

https://security-tracker.debian.org/tracker/CVE-2026-31425

https://security-tracker.debian.org/tracker/CVE-2026-31426

https://security-tracker.debian.org/tracker/CVE-2026-31427

https://security-tracker.debian.org/tracker/CVE-2026-31428

https://security-tracker.debian.org/tracker/CVE-2026-31429

https://security-tracker.debian.org/tracker/CVE-2026-31430

https://security-tracker.debian.org/tracker/CVE-2026-31450

https://security-tracker.debian.org/tracker/CVE-2026-31451

https://security-tracker.debian.org/tracker/CVE-2026-31452

https://security-tracker.debian.org/tracker/CVE-2026-31453

https://security-tracker.debian.org/tracker/CVE-2026-31454

https://security-tracker.debian.org/tracker/CVE-2026-31455

https://security-tracker.debian.org/tracker/CVE-2026-31458

https://security-tracker.debian.org/tracker/CVE-2026-31462

https://security-tracker.debian.org/tracker/CVE-2026-31464

https://security-tracker.debian.org/tracker/CVE-2026-31474

https://security-tracker.debian.org/tracker/CVE-2026-31476

https://security-tracker.debian.org/tracker/CVE-2026-31477

https://security-tracker.debian.org/tracker/CVE-2026-31478

https://security-tracker.debian.org/tracker/CVE-2026-31479

https://security-tracker.debian.org/tracker/CVE-2026-31480

https://security-tracker.debian.org/tracker/CVE-2026-31482

https://security-tracker.debian.org/tracker/CVE-2026-31483

https://security-tracker.debian.org/tracker/CVE-2026-31485

https://security-tracker.debian.org/tracker/CVE-2026-31487

https://security-tracker.debian.org/tracker/CVE-2026-31488

https://security-tracker.debian.org/tracker/CVE-2026-31489

https://security-tracker.debian.org/tracker/CVE-2026-31492

https://security-tracker.debian.org/tracker/CVE-2026-31494

https://security-tracker.debian.org/tracker/CVE-2026-31495

https://security-tracker.debian.org/tracker/CVE-2026-31496

https://security-tracker.debian.org/tracker/CVE-2026-31497

https://security-tracker.debian.org/tracker/CVE-2026-31498

https://security-tracker.debian.org/tracker/CVE-2026-31500

https://security-tracker.debian.org/tracker/CVE-2026-31502

https://security-tracker.debian.org/tracker/CVE-2026-31503

https://security-tracker.debian.org/tracker/CVE-2026-31504

https://security-tracker.debian.org/tracker/CVE-2026-31505

https://security-tracker.debian.org/tracker/CVE-2026-31506

https://security-tracker.debian.org/tracker/CVE-2026-31507

https://security-tracker.debian.org/tracker/CVE-2026-31508

https://security-tracker.debian.org/tracker/CVE-2026-31509

https://security-tracker.debian.org/tracker/CVE-2026-31510

https://security-tracker.debian.org/tracker/CVE-2026-31511

https://security-tracker.debian.org/tracker/CVE-2026-31512

https://security-tracker.debian.org/tracker/CVE-2026-31515

https://security-tracker.debian.org/tracker/CVE-2026-31516

https://security-tracker.debian.org/tracker/CVE-2026-31518

https://security-tracker.debian.org/tracker/CVE-2026-31519

https://security-tracker.debian.org/tracker/CVE-2026-31520

https://security-tracker.debian.org/tracker/CVE-2026-31521

https://security-tracker.debian.org/tracker/CVE-2026-31522

https://security-tracker.debian.org/tracker/CVE-2026-31523

https://security-tracker.debian.org/tracker/CVE-2026-31524

https://security-tracker.debian.org/tracker/CVE-2026-31525

https://security-tracker.debian.org/tracker/CVE-2026-31527

https://security-tracker.debian.org/tracker/CVE-2026-31528

https://security-tracker.debian.org/tracker/CVE-2026-31530

Plugin Details

Severity: High

ID: 311299

File Name: debian_DSA-6238.nasl

Version: 1.2

Type: Local

Agent: unix

Published: 4/30/2026

Updated: 5/1/2026

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-23395

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rpi, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-arm64-16k, p-cpe:/a:debian:debian_linux:usb-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:usb-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:udf-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:mtd-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:ata-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:ppp-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:xfs-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:squashfs-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-s390x, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:usb-serial-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-powerpc64le-64k, p-cpe:/a:debian:debian_linux:md-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rt-arm64, p-cpe:/a:debian:debian_linux:nic-shared-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:scsi-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:xfs-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:nbd-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:firewire-core-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:ext4-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-arm64, p-cpe:/a:debian:debian_linux:sound-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:kernel-image-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-armmp, p-cpe:/a:debian:debian_linux:crypto-dm-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-powerpc64le, p-cpe:/a:debian:debian_linux:squashfs-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-arm64-16k, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-amd64, p-cpe:/a:debian:debian_linux:ext4-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:fat-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-powerpc64le-64k-dbg, p-cpe:/a:debian:debian_linux:fat-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-rpi, p-cpe:/a:debian:debian_linux:linux-support-6.12.74%2bdeb13%2b1, p-cpe:/a:debian:debian_linux:speakup-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-cloud-arm64, p-cpe:/a:debian:debian_linux:mmc-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-rt-armmp, p-cpe:/a:debian:debian_linux:linux-kbuild-6.12.85%2bdeb13, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rpi-dbg, p-cpe:/a:debian:debian_linux:ata-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:xfs-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rpi, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-riscv64-dbg, p-cpe:/a:debian:debian_linux:drm-core-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:f2fs-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:crypto-dm-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-armmp-lpae, p-cpe:/a:debian:debian_linux:usb-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:fb-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-kbuild-6.12.74%2bdeb13%2b1, p-cpe:/a:debian:debian_linux:kernel-image-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:btrfs-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:scsi-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-riscv64, p-cpe:/a:debian:debian_linux:nic-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:usb-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-armmp-lpae, p-cpe:/a:debian:debian_linux:cdrom-core-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-powerpc64le-64k-dbg, p-cpe:/a:debian:debian_linux:linux-image-arm64-16k-dbg, p-cpe:/a:debian:debian_linux:multipath-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-s390x-dbg, p-cpe:/a:debian:debian_linux:crypto-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-common, p-cpe:/a:debian:debian_linux:multipath-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:fat-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:jfs-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:firewire-core-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:f2fs-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:sound-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:uinput-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:linux-doc-6.12, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-cloud-arm64, p-cpe:/a:debian:debian_linux:crypto-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:nic-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rpi-dbg, p-cpe:/a:debian:debian_linux:scsi-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-arm64-dbg, p-cpe:/a:debian:debian_linux:linux-image-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:ppp-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-arm64-16k, p-cpe:/a:debian:debian_linux:fat-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-riscv64, p-cpe:/a:debian:debian_linux:cdrom-core-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:udf-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:loop-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:jfs-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-dbg, p-cpe:/a:debian:debian_linux:nic-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:md-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-powerpc64le, p-cpe:/a:debian:debian_linux:kernel-image-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-powerpc64le, p-cpe:/a:debian:debian_linux:ata-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-arm64-16k-dbg, p-cpe:/a:debian:debian_linux:usb-storage-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:nbd-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:nbd-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:pata-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:crypto-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:isofs-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:ext4-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-powerpc64le, p-cpe:/a:debian:debian_linux:linux-image-s390x, p-cpe:/a:debian:debian_linux:loop-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-s390x, p-cpe:/a:debian:debian_linux:mmc-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:ppp-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:usb-storage-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:crypto-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:dasd-extra-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-armmp, p-cpe:/a:debian:debian_linux:nbd-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:intel-sdsi, p-cpe:/a:debian:debian_linux:pata-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-powerpc64le, p-cpe:/a:debian:debian_linux:crypto-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:sata-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:bpftool, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-cloud-amd64, p-cpe:/a:debian:debian_linux:linux-image-powerpc64le-dbg, p-cpe:/a:debian:debian_linux:dasd-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:kernel-image-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:scsi-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:btrfs-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-cpupower, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp-dbg, p-cpe:/a:debian:debian_linux:nic-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:ext4-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:mmc-core-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:isofs-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:ata-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:kernel-image-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:squashfs-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-source, p-cpe:/a:debian:debian_linux:crypto-dm-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:f2fs-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:fb-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:sata-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-arm64-16k-dbg, p-cpe:/a:debian:debian_linux:nic-usb-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-riscv64-dbg, p-cpe:/a:debian:debian_linux:linux-image-arm64-dbg, p-cpe:/a:debian:debian_linux:xfs-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:input-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-signed-template, p-cpe:/a:debian:debian_linux:linux-support-6.12.85%2bdeb13, p-cpe:/a:debian:debian_linux:scsi-core-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:md-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:fb-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-image-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-rt-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-amd64, p-cpe:/a:debian:debian_linux:rtla, p-cpe:/a:debian:debian_linux:loop-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:btrfs-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:jfs-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:multipath-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:ppp-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:udf-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-s390x, p-cpe:/a:debian:debian_linux:nbd-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-arm64, p-cpe:/a:debian:debian_linux:hyperv-daemons, p-cpe:/a:debian:debian_linux:linux-headers-armmp-lpae, p-cpe:/a:debian:debian_linux:md-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-riscv64, p-cpe:/a:debian:debian_linux:input-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:loop-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:isofs-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:linux-headers-riscv64, p-cpe:/a:debian:debian_linux:nbd-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:udf-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:nic-shared-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:ata-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-powerpc64le-64k, p-cpe:/a:debian:debian_linux:drm-core-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:f2fs-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:mtd-core-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-arm64-signed-template, p-cpe:/a:debian:debian_linux:linux-image-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:input-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:cdrom-core-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-amd64, p-cpe:/a:debian:debian_linux:jfs-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-armmp, p-cpe:/a:debian:debian_linux:linux-image-rpi-dbg, p-cpe:/a:debian:debian_linux:nic-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:fb-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:usbip, p-cpe:/a:debian:debian_linux:nic-shared-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-image-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:ppp-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-armmp-lpae, p-cpe:/a:debian:debian_linux:dasd-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-rpi, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-cloud-amd64, p-cpe:/a:debian:debian_linux:sata-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-powerpc64le-64k-dbg, p-cpe:/a:debian:debian_linux:serial-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-s390x-dbg, p-cpe:/a:debian:debian_linux:jfs-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:crypto-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:uinput-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:mtd-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:input-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:f2fs-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:multipath-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:squashfs-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:uinput-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:kernel-image-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:udf-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:fat-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:udf-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-s390x-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-cloud-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-cloud-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rt-arm64, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rt-armmp, p-cpe:/a:debian:debian_linux:scsi-core-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:speakup-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-rt-amd64, p-cpe:/a:debian:debian_linux:scsi-core-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-config-6.12, p-cpe:/a:debian:debian_linux:linux-headers-powerpc64le, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:crypto-dm-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:sata-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:md-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-powerpc64le-dbg, p-cpe:/a:debian:debian_linux:nbd-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-doc, p-cpe:/a:debian:debian_linux:ext4-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:ext4-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-armmp-lpae-dbg, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-rt-armmp, p-cpe:/a:debian:debian_linux:f2fs-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-armmp-lpae, p-cpe:/a:debian:debian_linux:nic-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:input-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-bpf-dev, p-cpe:/a:debian:debian_linux:fat-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:mtd-core-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:scsi-nic-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-common, p-cpe:/a:debian:debian_linux:drm-core-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:fb-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-s390x, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-armmp, p-cpe:/a:debian:debian_linux:hypervisor-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:pata-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-s390x, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-rt-arm64, p-cpe:/a:debian:debian_linux:nic-wireless-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:squashfs-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:nic-usb-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-rpi, p-cpe:/a:debian:debian_linux:linux-perf, p-cpe:/a:debian:debian_linux:nic-usb-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rt-arm64-dbg, p-cpe:/a:debian:debian_linux:drm-core-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:btrfs-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-rt-armmp, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-arm64, p-cpe:/a:debian:debian_linux:mtd-core-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:sata-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:usb-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:multipath-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-powerpc64le-64k, p-cpe:/a:debian:debian_linux:linux-source-6.12, p-cpe:/a:debian:debian_linux:mtd-core-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-amd64-dbg, p-cpe:/a:debian:debian_linux:crypto-dm-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:dasd-extra-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:fat-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rt-armmp, p-cpe:/a:debian:debian_linux:serial-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-cloud-amd64, p-cpe:/a:debian:debian_linux:scsi-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-arm64-16k, p-cpe:/a:debian:debian_linux:scsi-core-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-amd64-dbg, p-cpe:/a:debian:debian_linux:xfs-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:loop-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:libcpupower1, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-headers-powerpc64le-64k, p-cpe:/a:debian:debian_linux:drm-core-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:isofs-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:crypto-dm-modules-6.12.74%2bdeb13%2b1-s390x-di, cpe:/o:debian:debian_linux:13.0, p-cpe:/a:debian:debian_linux:uinput-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:udf-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-common-rt, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-arm64-dbg, p-cpe:/a:debian:debian_linux:multipath-modules-6.12.74%2bdeb13%2b1-s390x-di, p-cpe:/a:debian:debian_linux:isofs-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:nic-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-armmp-lpae, p-cpe:/a:debian:debian_linux:hypervisor-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:ext4-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:multipath-modules-6.12.85%2bdeb13-s390x-di, p-cpe:/a:debian:debian_linux:usb-storage-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:md-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:nic-wireless-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:usb-serial-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:scsi-core-modules-6.12.85%2bdeb13-powerpc64le-di, p-cpe:/a:debian:debian_linux:isofs-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:mtd-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:btrfs-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-cloud-amd64, p-cpe:/a:debian:debian_linux:libcpupower-dev, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-powerpc64le-64k, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-rpi, p-cpe:/a:debian:debian_linux:linux-headers-6.12.85%2bdeb13-rt-arm64, p-cpe:/a:debian:debian_linux:cdrom-core-modules-6.12.85%2bdeb13-armmp-di, p-cpe:/a:debian:debian_linux:mmc-modules-6.12.74%2bdeb13%2b1-riscv64-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-powerpc64le-64k, p-cpe:/a:debian:debian_linux:linux-image-6.12.85%2bdeb13-cloud-arm64-dbg, p-cpe:/a:debian:debian_linux:crypto-modules-6.12.74%2bdeb13%2b1-powerpc64le-di, p-cpe:/a:debian:debian_linux:isofs-modules-6.12.74%2bdeb13%2b1-armmp-di, p-cpe:/a:debian:debian_linux:linux-headers-6.12.74%2bdeb13%2b1-armmp, p-cpe:/a:debian:debian_linux:linux-image-6.12.74%2bdeb13%2b1-powerpc64le-dbg

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/30/2026

Vulnerability Publication Date: 2/27/2025

Exploitable With

Metasploit (Copy Fail AF_ALG + authencesn Page-Cache Write)

Reference Information

CVE: CVE-2024-14027, CVE-2025-21709, CVE-2025-22116, CVE-2025-22117, CVE-2025-38426, CVE-2025-38627, CVE-2025-39764, CVE-2025-40005, CVE-2025-40135, CVE-2025-40147, CVE-2025-40150, CVE-2025-40219, CVE-2025-68175, CVE-2025-68239, CVE-2025-68334, CVE-2025-68736, CVE-2025-71152, CVE-2025-71161, CVE-2025-71221, CVE-2025-71239, CVE-2025-71265, CVE-2025-71266, CVE-2025-71267, CVE-2025-71269, CVE-2026-22981, CVE-2026-22985, CVE-2026-22986, CVE-2026-22993, CVE-2026-23004, CVE-2026-23066, CVE-2026-23070, CVE-2026-23104, CVE-2026-23138, CVE-2026-23157, CVE-2026-23207, CVE-2026-23210, CVE-2026-23226, CVE-2026-23227, CVE-2026-23231, CVE-2026-23239, CVE-2026-23240, CVE-2026-23242, CVE-2026-23243, CVE-2026-23244, CVE-2026-23245, CVE-2026-23246, CVE-2026-23249, CVE-2026-23250, CVE-2026-23251, CVE-2026-23252, CVE-2026-23253, CVE-2026-23255, CVE-2026-23270, CVE-2026-23271, CVE-2026-23273, CVE-2026-23274, CVE-2026-23276, CVE-2026-23277, CVE-2026-23278, CVE-2026-23279, CVE-2026-23281, CVE-2026-23284, CVE-2026-23285, CVE-2026-23286, CVE-2026-23287, CVE-2026-23289, CVE-2026-23290, CVE-2026-23291, CVE-2026-23292, CVE-2026-23293, CVE-2026-23296, CVE-2026-23297, CVE-2026-23298, CVE-2026-23300, CVE-2026-23302, CVE-2026-23303, CVE-2026-23304, CVE-2026-23306, CVE-2026-23307, CVE-2026-23308, CVE-2026-23310, CVE-2026-23312, CVE-2026-23313, CVE-2026-23315, CVE-2026-23316, CVE-2026-23317, CVE-2026-23318, CVE-2026-23319, CVE-2026-23321, CVE-2026-23324, CVE-2026-23325, CVE-2026-23330, CVE-2026-23334, CVE-2026-23335, CVE-2026-23336, CVE-2026-23339, CVE-2026-23340, CVE-2026-23343, CVE-2026-23347, CVE-2026-23351, CVE-2026-23352, CVE-2026-23354, CVE-2026-23356, CVE-2026-23357, CVE-2026-23359, CVE-2026-23360, CVE-2026-23361, CVE-2026-23362, CVE-2026-23363, CVE-2026-23364, CVE-2026-23365, CVE-2026-23367, CVE-2026-23368, CVE-2026-23369, CVE-2026-23370, CVE-2026-23372, CVE-2026-23373, CVE-2026-23374, CVE-2026-23375, CVE-2026-23378, CVE-2026-23379, CVE-2026-23380, CVE-2026-23381, CVE-2026-23382, CVE-2026-23383, CVE-2026-23386, CVE-2026-23387, CVE-2026-23388, CVE-2026-23389, CVE-2026-23391, CVE-2026-23392, CVE-2026-23393, CVE-2026-23395, CVE-2026-23396, CVE-2026-23397, CVE-2026-23398, CVE-2026-23399, CVE-2026-23401, CVE-2026-23412, CVE-2026-23413, CVE-2026-23414, CVE-2026-23417, CVE-2026-23419, CVE-2026-23420, CVE-2026-23422, CVE-2026-23426, CVE-2026-23427, CVE-2026-23428, CVE-2026-23434, CVE-2026-23438, CVE-2026-23439, CVE-2026-23440, CVE-2026-23441, CVE-2026-23442, CVE-2026-23444, CVE-2026-23445, CVE-2026-23446, CVE-2026-23447, CVE-2026-23448, CVE-2026-23449, CVE-2026-23450, CVE-2026-23452, CVE-2026-23454, CVE-2026-23455, CVE-2026-23456, CVE-2026-23457, CVE-2026-23458, CVE-2026-23460, CVE-2026-23461, CVE-2026-23462, CVE-2026-23463, CVE-2026-23464, CVE-2026-23465, CVE-2026-23466, CVE-2026-23470, CVE-2026-23474, CVE-2026-23475, CVE-2026-31389, CVE-2026-31391, CVE-2026-31392, CVE-2026-31393, CVE-2026-31394, CVE-2026-31396, CVE-2026-31399, CVE-2026-31400, CVE-2026-31401, CVE-2026-31402, CVE-2026-31403, CVE-2026-31405, CVE-2026-31406, CVE-2026-31407, CVE-2026-31408, CVE-2026-31409, CVE-2026-31410, CVE-2026-31411, CVE-2026-31412, CVE-2026-31414, CVE-2026-31415, CVE-2026-31416, CVE-2026-31417, CVE-2026-31418, CVE-2026-31421, CVE-2026-31422, CVE-2026-31423, CVE-2026-31424, CVE-2026-31425, CVE-2026-31426, CVE-2026-31427, CVE-2026-31428, CVE-2026-31429, CVE-2026-31430, CVE-2026-31431, CVE-2026-31432, CVE-2026-31433, CVE-2026-31434, CVE-2026-31436, CVE-2026-31438, CVE-2026-31439, CVE-2026-31440, CVE-2026-31441, CVE-2026-31446, CVE-2026-31447, CVE-2026-31448, CVE-2026-31449, CVE-2026-31450, CVE-2026-31451, CVE-2026-31452, CVE-2026-31453, CVE-2026-31454, CVE-2026-31455, CVE-2026-31458, CVE-2026-31462, CVE-2026-31464, CVE-2026-31466, CVE-2026-31467, CVE-2026-31469, CVE-2026-31470, CVE-2026-31473, CVE-2026-31474, CVE-2026-31476, CVE-2026-31477, CVE-2026-31478, CVE-2026-31479, CVE-2026-31480, CVE-2026-31482, CVE-2026-31483, CVE-2026-31485, CVE-2026-31487, CVE-2026-31488, CVE-2026-31489, CVE-2026-31492, CVE-2026-31494, CVE-2026-31495, CVE-2026-31496, CVE-2026-31497, CVE-2026-31498, CVE-2026-31500, CVE-2026-31502, CVE-2026-31503, CVE-2026-31504, CVE-2026-31505, CVE-2026-31506, CVE-2026-31507, CVE-2026-31508, CVE-2026-31509, CVE-2026-31510, CVE-2026-31511, CVE-2026-31512, CVE-2026-31515, CVE-2026-31516, CVE-2026-31518, CVE-2026-31519, CVE-2026-31520, CVE-2026-31521, CVE-2026-31522, CVE-2026-31523, CVE-2026-31524, CVE-2026-31525, CVE-2026-31527, CVE-2026-31528, CVE-2026-31530, CVE-2026-31531, CVE-2026-31532, CVE-2026-31533, CVE-2026-31540, CVE-2026-31542, CVE-2026-31545, CVE-2026-31546, CVE-2026-31548, CVE-2026-31549, CVE-2026-31550, CVE-2026-31551, CVE-2026-31552, CVE-2026-31554, CVE-2026-31555, CVE-2026-31556, CVE-2026-31557, CVE-2026-31558, CVE-2026-31559, CVE-2026-31561, CVE-2026-31563, CVE-2026-31565, CVE-2026-31566, CVE-2026-31570, CVE-2026-31575, CVE-2026-31576, CVE-2026-31577, CVE-2026-31578, CVE-2026-31580, CVE-2026-31581, CVE-2026-31582, CVE-2026-31583, CVE-2026-31584, CVE-2026-31585, CVE-2026-31586, CVE-2026-31587, CVE-2026-31588, CVE-2026-31590, CVE-2026-31593, CVE-2026-31594, CVE-2026-31595, CVE-2026-31596, CVE-2026-31597, CVE-2026-31598, CVE-2026-31599, CVE-2026-31602, CVE-2026-31603, CVE-2026-31604, CVE-2026-31605, CVE-2026-31606, CVE-2026-31607, CVE-2026-31610, CVE-2026-31611, CVE-2026-31612, CVE-2026-31614, CVE-2026-31615, CVE-2026-31616, CVE-2026-31617, CVE-2026-31618, CVE-2026-31619, CVE-2026-31622, CVE-2026-31623, CVE-2026-31624, CVE-2026-31625, CVE-2026-31626, CVE-2026-31627, CVE-2026-31628, CVE-2026-31629, CVE-2026-31634, CVE-2026-31637, CVE-2026-31638, CVE-2026-31639, CVE-2026-31642, CVE-2026-31644, CVE-2026-31645, CVE-2026-31646, CVE-2026-31647, CVE-2026-31648, CVE-2026-31649, CVE-2026-31651, CVE-2026-31655, CVE-2026-31656, CVE-2026-31657, CVE-2026-31658, CVE-2026-31659, CVE-2026-31660, CVE-2026-31661, CVE-2026-31662, CVE-2026-31664, CVE-2026-31665, CVE-2026-31666, CVE-2026-31667, CVE-2026-31668, CVE-2026-31669, CVE-2026-31670, CVE-2026-31671, CVE-2026-31672, CVE-2026-31673, CVE-2026-31674, CVE-2026-31675, CVE-2026-31676, CVE-2026-31677, CVE-2026-31678, CVE-2026-31679, CVE-2026-31680, CVE-2026-31681, CVE-2026-31682, CVE-2026-31683, CVE-2026-31684, CVE-2026-31685, CVE-2026-31686, CVE-2026-31689, CVE-2026-31693, CVE-2026-31786, CVE-2026-31787, CVE-2026-31788