語系:
https://alas.aws.amazon.com/AL2023/ALAS-2024-696.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52656.html
https://alas.aws.amazon.com/cve/html/CVE-2024-23307.html
https://alas.aws.amazon.com/cve/html/CVE-2024-25742.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26584.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26585.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26642.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26643.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26809.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26810.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26812.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26815.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26816.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26861.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26862.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26863.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26865.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26868.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26878.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26880.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26883.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26898.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26901.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26933.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26935.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26938.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26946.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26950.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26951.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26958.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26960.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26964.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26976.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26977.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27025.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27038.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27065.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27388.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27389.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27390.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27437.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35800.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35801.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35804.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35805.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35809.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35815.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35823.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35826.html
嚴重性: High
ID: 205093
檔案名稱: al2023_ALAS2023-2024-696.nasl
版本: 1.4
類型: local
代理程式: unix
已發布: 2024/8/6
已更新: 2024/9/13
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: High
分數: 7.4
風險因素: Medium
基本分數: 6.8
時間分數: 5
媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2024-26933
風險因素: High
基本分數: 7.8
時間分數: 6.8
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.84-99.169, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2024/8/1
弱點發布日期: 2024/5/1
CVE: CVE-2023-52656, CVE-2024-23307, CVE-2024-25742, CVE-2024-26584, CVE-2024-26585, CVE-2024-26642, CVE-2024-26643, CVE-2024-26809, CVE-2024-26810, CVE-2024-26812, CVE-2024-26815, CVE-2024-26816, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26865, CVE-2024-26868, CVE-2024-26878, CVE-2024-26880, CVE-2024-26883, CVE-2024-26898, CVE-2024-26901, CVE-2024-26933, CVE-2024-26935, CVE-2024-26938, CVE-2024-26946, CVE-2024-26950, CVE-2024-26951, CVE-2024-26958, CVE-2024-26960, CVE-2024-26964, CVE-2024-26976, CVE-2024-26977, CVE-2024-27025, CVE-2024-27038, CVE-2024-27065, CVE-2024-27388, CVE-2024-27389, CVE-2024-27390, CVE-2024-27437, CVE-2024-35800, CVE-2024-35801, CVE-2024-35804, CVE-2024-35805, CVE-2024-35809, CVE-2024-35815, CVE-2024-35823, CVE-2024-35826, CVE-2024-35827, CVE-2024-36031