語言:
https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2023-34324.html
https://alas.aws.amazon.com/cve/html/CVE-2023-39191.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52476.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52477.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52481.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52522.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52523.html
嚴重性: High
ID: 184420
檔案名稱: al2023_ALAS2023-2023-422.nasl
版本: 1.4
類型: local
代理程式: unix
已發布: 2023/11/4
已更新: 2024/12/11
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: High
分數: 7.3
風險因素: Medium
基本分數: 6.5
時間性分數: 4.8
媒介: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2023-39191
風險因素: High
基本分數: 8.2
時間性分數: 7.1
媒介: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.59-84.139, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2023/10/30
弱點發布日期: 2023/10/4
CVE: CVE-2023-34324, CVE-2023-39191, CVE-2023-52476, CVE-2023-52477, CVE-2023-52481, CVE-2023-52522, CVE-2023-52523, CVE-2023-52559, CVE-2024-0641