語言:
https://alas.aws.amazon.com//AL2023/ALAS2023-2025-864.html
https://alas.aws.amazon.com/faqs.html
https://explore.alas.aws.amazon.com/CVE-2024-39472.html
https://explore.alas.aws.amazon.com/CVE-2024-41042.html
https://explore.alas.aws.amazon.com/CVE-2024-42159.html
https://explore.alas.aws.amazon.com/CVE-2024-42258.html
https://explore.alas.aws.amazon.com/CVE-2024-42259.html
https://explore.alas.aws.amazon.com/CVE-2024-42268.html
https://explore.alas.aws.amazon.com/CVE-2024-42269.html
https://explore.alas.aws.amazon.com/CVE-2024-42270.html
https://explore.alas.aws.amazon.com/CVE-2024-42276.html
https://explore.alas.aws.amazon.com/CVE-2024-42281.html
https://explore.alas.aws.amazon.com/CVE-2024-42283.html
https://explore.alas.aws.amazon.com/CVE-2024-42285.html
https://explore.alas.aws.amazon.com/CVE-2024-42292.html
https://explore.alas.aws.amazon.com/CVE-2024-42299.html
https://explore.alas.aws.amazon.com/CVE-2024-42302.html
https://explore.alas.aws.amazon.com/CVE-2024-42304.html
https://explore.alas.aws.amazon.com/CVE-2024-42305.html
https://explore.alas.aws.amazon.com/CVE-2024-42306.html
https://explore.alas.aws.amazon.com/CVE-2024-42307.html
https://explore.alas.aws.amazon.com/CVE-2024-42312.html
https://explore.alas.aws.amazon.com/CVE-2024-42316.html
https://explore.alas.aws.amazon.com/CVE-2024-42321.html
https://explore.alas.aws.amazon.com/CVE-2024-43817.html
https://explore.alas.aws.amazon.com/CVE-2024-43823.html
https://explore.alas.aws.amazon.com/CVE-2024-43828.html
https://explore.alas.aws.amazon.com/CVE-2024-43830.html
https://explore.alas.aws.amazon.com/CVE-2024-43834.html
https://explore.alas.aws.amazon.com/CVE-2024-43837.html
https://explore.alas.aws.amazon.com/CVE-2024-43853.html
https://explore.alas.aws.amazon.com/CVE-2024-43854.html
https://explore.alas.aws.amazon.com/CVE-2024-43855.html
https://explore.alas.aws.amazon.com/CVE-2024-43856.html
https://explore.alas.aws.amazon.com/CVE-2024-43869.html
https://explore.alas.aws.amazon.com/CVE-2024-43870.html
https://explore.alas.aws.amazon.com/CVE-2024-43871.html
https://explore.alas.aws.amazon.com/CVE-2024-43873.html
https://explore.alas.aws.amazon.com/CVE-2024-43882.html
https://explore.alas.aws.amazon.com/CVE-2024-43883.html
https://explore.alas.aws.amazon.com/CVE-2024-43889.html
https://explore.alas.aws.amazon.com/CVE-2024-43893.html
https://explore.alas.aws.amazon.com/CVE-2024-43894.html
https://explore.alas.aws.amazon.com/CVE-2024-43914.html
https://explore.alas.aws.amazon.com/CVE-2024-44934.html
https://explore.alas.aws.amazon.com/CVE-2024-44935.html
https://explore.alas.aws.amazon.com/CVE-2024-44944.html
https://explore.alas.aws.amazon.com/CVE-2024-44948.html
https://explore.alas.aws.amazon.com/CVE-2024-44958.html
https://explore.alas.aws.amazon.com/CVE-2024-44965.html
嚴重性: High
ID: 232713
檔案名稱: al2023_ALAS2023-2025-864.nasl
版本: 1.5
類型: local
代理程式: unix
已發布: 2025/3/14
已更新: 2025/10/6
支援的感應器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
風險因素: High
分數: 7.4
風險因素: Medium
基本分數: 6.8
時間性分數: 5.3
媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2024-44934
風險因素: High
基本分數: 7.8
時間性分數: 7
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-libbpf-static, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.106-116.188
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2025/2/26
弱點發布日期: 2024/7/29
CVE: CVE-2024-39472, CVE-2024-41042, CVE-2024-42159, CVE-2024-42258, CVE-2024-42259, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42276, CVE-2024-42281, CVE-2024-42283, CVE-2024-42285, CVE-2024-42292, CVE-2024-42299, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-42307, CVE-2024-42312, CVE-2024-42316, CVE-2024-42321, CVE-2024-43817, CVE-2024-43823, CVE-2024-43828, CVE-2024-43830, CVE-2024-43834, CVE-2024-43837, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43882, CVE-2024-43883, CVE-2024-43889, CVE-2024-43893, CVE-2024-43894, CVE-2024-43914, CVE-2024-44934, CVE-2024-44935, CVE-2024-44944, CVE-2024-44948, CVE-2024-44958, CVE-2024-44965, CVE-2024-44970, CVE-2024-57947