語言:
https://alas.aws.amazon.com//AL2023/ALAS2023-2025-994.html
https://alas.aws.amazon.com/faqs.html
https://explore.alas.aws.amazon.com/CVE-2024-57976.html
https://explore.alas.aws.amazon.com/CVE-2025-21709.html
https://explore.alas.aws.amazon.com/CVE-2025-21807.html
https://explore.alas.aws.amazon.com/CVE-2025-21817.html
https://explore.alas.aws.amazon.com/CVE-2025-21833.html
https://explore.alas.aws.amazon.com/CVE-2025-21884.html
https://explore.alas.aws.amazon.com/CVE-2025-22108.html
https://explore.alas.aws.amazon.com/CVE-2025-22120.html
https://explore.alas.aws.amazon.com/CVE-2025-37797.html
https://explore.alas.aws.amazon.com/CVE-2025-37799.html
https://explore.alas.aws.amazon.com/CVE-2025-37800.html
https://explore.alas.aws.amazon.com/CVE-2025-37806.html
https://explore.alas.aws.amazon.com/CVE-2025-37808.html
https://explore.alas.aws.amazon.com/CVE-2025-37809.html
https://explore.alas.aws.amazon.com/CVE-2025-37813.html
https://explore.alas.aws.amazon.com/CVE-2025-37814.html
https://explore.alas.aws.amazon.com/CVE-2025-37819.html
https://explore.alas.aws.amazon.com/CVE-2025-37820.html
https://explore.alas.aws.amazon.com/CVE-2025-37821.html
https://explore.alas.aws.amazon.com/CVE-2025-37823.html
https://explore.alas.aws.amazon.com/CVE-2025-37827.html
https://explore.alas.aws.amazon.com/CVE-2025-37876.html
https://explore.alas.aws.amazon.com/CVE-2025-37877.html
https://explore.alas.aws.amazon.com/CVE-2025-37878.html
https://explore.alas.aws.amazon.com/CVE-2025-37882.html
https://explore.alas.aws.amazon.com/CVE-2025-37884.html
https://explore.alas.aws.amazon.com/CVE-2025-37885.html
https://explore.alas.aws.amazon.com/CVE-2025-37888.html
https://explore.alas.aws.amazon.com/CVE-2025-37900.html
https://explore.alas.aws.amazon.com/CVE-2025-37913.html
https://explore.alas.aws.amazon.com/CVE-2025-37914.html
https://explore.alas.aws.amazon.com/CVE-2025-37915.html
https://explore.alas.aws.amazon.com/CVE-2025-37920.html
https://explore.alas.aws.amazon.com/CVE-2025-37923.html
https://explore.alas.aws.amazon.com/CVE-2025-37927.html
https://explore.alas.aws.amazon.com/CVE-2025-37928.html
https://explore.alas.aws.amazon.com/CVE-2025-37929.html
https://explore.alas.aws.amazon.com/CVE-2025-37931.html
https://explore.alas.aws.amazon.com/CVE-2025-37948.html
https://explore.alas.aws.amazon.com/CVE-2025-37949.html
https://explore.alas.aws.amazon.com/CVE-2025-37957.html
https://explore.alas.aws.amazon.com/CVE-2025-37958.html
https://explore.alas.aws.amazon.com/CVE-2025-37959.html
https://explore.alas.aws.amazon.com/CVE-2025-37960.html
https://explore.alas.aws.amazon.com/CVE-2025-37961.html
https://explore.alas.aws.amazon.com/CVE-2025-37963.html
https://explore.alas.aws.amazon.com/CVE-2025-37964.html
https://explore.alas.aws.amazon.com/CVE-2025-37989.html
嚴重性: Medium
ID: 238280
檔案名稱: al2023_ALAS2023-2025-994.nasl
版本: 1.4
類型: local
代理程式: unix
已發布: 2025/6/12
已更新: 2025/8/4
支援的感應器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
風險因素: High
分數: 7.3
風險因素: Medium
基本分數: 4.6
時間性分數: 3.6
媒介: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C
CVSS 評分資料來源: CVE-2025-37800
風險因素: Medium
基本分數: 5.5
時間性分數: 5
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:python3-perf6.12, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel6.12, p-cpe:/a:amazon:linux:kernel-livepatch-6.12.29-33.102, p-cpe:/a:amazon:linux:kernel6.12-modules-extra, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-libbpf-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf6.12, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:perf6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python3-perf6.12-debuginfo
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: No known exploits are available
修補程式發佈日期: 2025/6/10
弱點發布日期: 2025/2/27
CVE: CVE-2024-57976, CVE-2025-21709, CVE-2025-21807, CVE-2025-21817, CVE-2025-21833, CVE-2025-21884, CVE-2025-22108, CVE-2025-22120, CVE-2025-37797, CVE-2025-37799, CVE-2025-37800, CVE-2025-37806, CVE-2025-37808, CVE-2025-37809, CVE-2025-37813, CVE-2025-37814, CVE-2025-37819, CVE-2025-37820, CVE-2025-37821, CVE-2025-37823, CVE-2025-37827, CVE-2025-37876, CVE-2025-37877, CVE-2025-37878, CVE-2025-37882, CVE-2025-37884, CVE-2025-37885, CVE-2025-37888, CVE-2025-37900, CVE-2025-37913, CVE-2025-37914, CVE-2025-37915, CVE-2025-37920, CVE-2025-37923, CVE-2025-37927, CVE-2025-37928, CVE-2025-37929, CVE-2025-37931, CVE-2025-37948, CVE-2025-37949, CVE-2025-37957, CVE-2025-37958, CVE-2025-37959, CVE-2025-37960, CVE-2025-37961, CVE-2025-37963, CVE-2025-37964, CVE-2025-37989, CVE-2025-37997, CVE-2025-37998