語系:
https://alas.aws.amazon.com/AL2/ALAS-2024-2549.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2023-46838.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52464.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52470.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52486.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52583.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52587.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52612.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52615.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52619.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52623.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52675.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52691.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52698.html
https://alas.aws.amazon.com/cve/html/CVE-2024-0340.html
https://alas.aws.amazon.com/cve/html/CVE-2024-0607.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26625.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26633.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26635.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26663.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26675.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26679.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26720.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26735.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26744.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26752.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26763.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26764.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26772.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26773.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26791.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26793.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26805.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26816.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26840.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26845.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26851.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26859.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26863.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26878.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26880.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26898.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26901.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26917.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26920.html
嚴重性: High
ID: 198252
檔案名稱: al2_ALAS-2024-2549.nasl
版本: 1.6
類型: local
代理程式: unix
已發布: 2024/5/31
已更新: 2024/9/13
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: High
分數: 7.4
風險因素: Medium
基本分數: 6.8
時間分數: 5
媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2024-26898
風險因素: High
基本分數: 7.8
時間分數: 6.8
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:kernel-livepatch-4.14.343-259.562, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2024/5/23
弱點發布日期: 2024/3/6
CVE: CVE-2023-46838, CVE-2023-52464, CVE-2023-52470, CVE-2023-52486, CVE-2023-52583, CVE-2023-52587, CVE-2023-52612, CVE-2023-52615, CVE-2023-52619, CVE-2023-52623, CVE-2023-52675, CVE-2023-52691, CVE-2023-52698, CVE-2024-0340, CVE-2024-0607, CVE-2024-26625, CVE-2024-26633, CVE-2024-26635, CVE-2024-26663, CVE-2024-26675, CVE-2024-26679, CVE-2024-26720, CVE-2024-26735, CVE-2024-26744, CVE-2024-26752, CVE-2024-26763, CVE-2024-26764, CVE-2024-26772, CVE-2024-26773, CVE-2024-26791, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26840, CVE-2024-26845, CVE-2024-26851, CVE-2024-26857, CVE-2024-26859, CVE-2024-26863, CVE-2024-26878, CVE-2024-26880, CVE-2024-26898, CVE-2024-26901, CVE-2024-26917, CVE-2024-26920, CVE-2024-27388, CVE-2024-27413