語言:
https://errata.rockylinux.org/RLSA-2022:1860
嚴重性: Medium
ID: 184735
檔案名稱: rocky_linux_RLSA-2022-1860.nasl
版本: 1.1
類型: local
已發布: 2023/11/6
已更新: 2023/11/7
支援的感應器: Nessus Agent, Continuous Assessment, Nessus
風險因素: Low
分數: 2.2
風險因素: Medium
基本分數: 5
時間性分數: 4.1
媒介: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS 評分資料來源: CVE-2020-13956
風險因素: Medium
基本分數: 5.3
時間性分數: 4.9
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
時間媒介: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:jansi, p-cpe:/a:rocky:linux:plexus-sec-dispatcher, p-cpe:/a:rocky:linux:atinject, p-cpe:/a:rocky:linux:apache-commons-cli, p-cpe:/a:rocky:linux:google-guice, p-cpe:/a:rocky:linux:httpcomponents-client, p-cpe:/a:rocky:linux:maven-shared-utils, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:maven, p-cpe:/a:rocky:linux:plexus-cipher, p-cpe:/a:rocky:linux:httpcomponents-core, p-cpe:/a:rocky:linux:maven-wagon, p-cpe:/a:rocky:linux:maven-openjdk8, p-cpe:/a:rocky:linux:plexus-containers-component-annotations, p-cpe:/a:rocky:linux:maven-openjdk11, p-cpe:/a:rocky:linux:cdi-api, p-cpe:/a:rocky:linux:aopalliance, p-cpe:/a:rocky:linux:jcl-over-slf4j, p-cpe:/a:rocky:linux:plexus-classworlds, p-cpe:/a:rocky:linux:jsoup, p-cpe:/a:rocky:linux:jsr-305, p-cpe:/a:rocky:linux:apache-commons-lang3, p-cpe:/a:rocky:linux:plexus-utils, p-cpe:/a:rocky:linux:maven-lib, p-cpe:/a:rocky:linux:apache-commons-io, p-cpe:/a:rocky:linux:maven-openjdk17, p-cpe:/a:rocky:linux:sisu, p-cpe:/a:rocky:linux:slf4j, p-cpe:/a:rocky:linux:geronimo-annotation, p-cpe:/a:rocky:linux:guava, p-cpe:/a:rocky:linux:maven-resolver, p-cpe:/a:rocky:linux:plexus-interpolation, p-cpe:/a:rocky:linux:apache-commons-codec
必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/5/10
弱點發布日期: 2020/12/2
CVE: CVE-2020-13956