語言:
https://alas.aws.amazon.com/AL2023/ALAS-2025-802.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36478.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41080.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49960.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49974.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49996.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50012.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50036.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50067.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50072.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50229.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50242.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50243.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50244.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50245.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50247.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50249.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50251.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50256.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50257.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50259.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50262.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50264.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50271.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50272.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50273.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50278.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50279.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50280.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50299.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50301.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50302.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53042.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53052.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53057.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53066.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53082.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53093.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53095.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53096.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53097.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53100.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53103.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53106.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53113.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53119.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53121.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53122.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53123.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53129.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53130.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53131.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53135.html
嚴重性: High
ID: 216951
檔案名稱: al2023_ALAS2023-2025-802.nasl
版本: 1.4
類型: local
代理程式: unix
已發布: 2025/3/1
已更新: 2025/6/9
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: Medium
分數: 6.7
風險因素: Medium
基本分數: 6.8
時間性分數: 5.6
媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2024-53103
風險因素: High
基本分數: 7.8
時間性分數: 7.2
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.119-129.201, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2025/1/16
弱點發布日期: 2024/10/21
CISA 已知遭惡意利用弱點到期日: 2025/3/25
CVE: CVE-2024-36478, CVE-2024-41080, CVE-2024-49960, CVE-2024-49974, CVE-2024-49996, CVE-2024-50012, CVE-2024-50036, CVE-2024-50067, CVE-2024-50072, CVE-2024-50229, CVE-2024-50242, CVE-2024-50243, CVE-2024-50244, CVE-2024-50245, CVE-2024-50247, CVE-2024-50249, CVE-2024-50251, CVE-2024-50256, CVE-2024-50257, CVE-2024-50259, CVE-2024-50262, CVE-2024-50264, CVE-2024-50271, CVE-2024-50272, CVE-2024-50273, CVE-2024-50278, CVE-2024-50279, CVE-2024-50280, CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-53042, CVE-2024-53052, CVE-2024-53057, CVE-2024-53066, CVE-2024-53082, CVE-2024-53093, CVE-2024-53095, CVE-2024-53096, CVE-2024-53097, CVE-2024-53100, CVE-2024-53103, CVE-2024-53106, CVE-2024-53113, CVE-2024-53119, CVE-2024-53121, CVE-2024-53122, CVE-2024-53123, CVE-2024-53129, CVE-2024-53130, CVE-2024-53131, CVE-2024-53135, CVE-2024-53138, CVE-2024-53140