語系:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-068.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26931.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26935.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26950.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26951.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26955.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26956.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26958.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26960.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26961.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26976.html
嚴重性: High
ID: 205698
檔案名稱: al2_ALASKERNEL-5_10-2024-068.nasl
版本: 1.1
類型: local
代理程式: unix
已發布: 2024/8/17
已更新: 2024/8/17
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: Medium
分數: 6.7
風險因素: Medium
基本分數: 4.6
時間分數: 3.4
媒介: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C
CVSS 評分資料來源: CVE-2024-27059
風險因素: High
基本分數: 7
時間分數: 6.1
媒介: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:U/RL:O/RC:C
CVSS 評分資料來源: CVE-2024-26976
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.215-203.850, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2024/8/1
弱點發布日期: 2024/5/1
CVE: CVE-2024-26931, CVE-2024-26935, CVE-2024-26950, CVE-2024-26951, CVE-2024-26955, CVE-2024-26956, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26976, CVE-2024-27059