語系:
https://alas.aws.amazon.com/AL2023/ALAS-2024-613.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26921.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26923.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26925.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26928.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27393.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35861.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35864.html
嚴重性: High
ID: 196918
檔案名稱: al2023_ALAS2023-2024-613.nasl
版本: 1.4
類型: local
代理程式: unix
已發布: 2024/5/13
已更新: 2024/9/13
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: High
分數: 7.4
風險因素: Medium
基本分數: 6.8
時間分數: 5
媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2024-35864
風險因素: High
基本分數: 7
時間分數: 6.1
媒介: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:U/RL:O/RC:C
CVSS 評分資料來源: CVE-2024-26925
CPE: p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.87-99.174, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2024/5/9
弱點發布日期: 2024/4/25
CVE: CVE-2024-26921, CVE-2024-26923, CVE-2024-26925, CVE-2024-26928, CVE-2024-27393, CVE-2024-35861, CVE-2024-35864, CVE-2024-35888, CVE-2024-35925