語言:
https://alas.aws.amazon.com//AL2023/ALAS2023-2025-1254.html
https://alas.aws.amazon.com/faqs.html
https://explore.alas.aws.amazon.com/CVE-2025-39816.html
https://explore.alas.aws.amazon.com/CVE-2025-39931.html
https://explore.alas.aws.amazon.com/CVE-2025-39940.html
https://explore.alas.aws.amazon.com/CVE-2025-39946.html
https://explore.alas.aws.amazon.com/CVE-2025-39947.html
https://explore.alas.aws.amazon.com/CVE-2025-39953.html
https://explore.alas.aws.amazon.com/CVE-2025-39955.html
https://explore.alas.aws.amazon.com/CVE-2025-39956.html
https://explore.alas.aws.amazon.com/CVE-2025-39961.html
https://explore.alas.aws.amazon.com/CVE-2025-39963.html
https://explore.alas.aws.amazon.com/CVE-2025-39964.html
https://explore.alas.aws.amazon.com/CVE-2025-39965.html
https://explore.alas.aws.amazon.com/CVE-2025-39967.html
https://explore.alas.aws.amazon.com/CVE-2025-39975.html
https://explore.alas.aws.amazon.com/CVE-2025-39977.html
https://explore.alas.aws.amazon.com/CVE-2025-39980.html
https://explore.alas.aws.amazon.com/CVE-2025-39984.html
https://explore.alas.aws.amazon.com/CVE-2025-39990.html
https://explore.alas.aws.amazon.com/CVE-2025-39992.html
https://explore.alas.aws.amazon.com/CVE-2025-39998.html
https://explore.alas.aws.amazon.com/CVE-2025-40006.html
https://explore.alas.aws.amazon.com/CVE-2025-40009.html
https://explore.alas.aws.amazon.com/CVE-2025-40018.html
https://explore.alas.aws.amazon.com/CVE-2025-40021.html
https://explore.alas.aws.amazon.com/CVE-2025-40024.html
https://explore.alas.aws.amazon.com/CVE-2025-40030.html
https://explore.alas.aws.amazon.com/CVE-2025-40035.html
https://explore.alas.aws.amazon.com/CVE-2025-40044.html
https://explore.alas.aws.amazon.com/CVE-2025-40047.html
https://explore.alas.aws.amazon.com/CVE-2025-40048.html
https://explore.alas.aws.amazon.com/CVE-2025-40049.html
https://explore.alas.aws.amazon.com/CVE-2025-40052.html
https://explore.alas.aws.amazon.com/CVE-2025-40057.html
https://explore.alas.aws.amazon.com/CVE-2025-40058.html
https://explore.alas.aws.amazon.com/CVE-2025-40067.html
https://explore.alas.aws.amazon.com/CVE-2025-40068.html
https://explore.alas.aws.amazon.com/CVE-2025-40070.html
https://explore.alas.aws.amazon.com/CVE-2025-40078.html
https://explore.alas.aws.amazon.com/CVE-2025-40080.html
https://explore.alas.aws.amazon.com/CVE-2025-40081.html
https://explore.alas.aws.amazon.com/CVE-2025-40109.html
https://explore.alas.aws.amazon.com/CVE-2025-40115.html
https://explore.alas.aws.amazon.com/CVE-2025-40123.html
https://explore.alas.aws.amazon.com/CVE-2025-40125.html
https://explore.alas.aws.amazon.com/CVE-2025-40129.html
https://explore.alas.aws.amazon.com/CVE-2025-40134.html
嚴重性: Medium
ID: 271737
檔案名稱: al2023_ALAS2023-2025-1254.nasl
版本: 1.3
類型: local
代理程式: unix
已發布: 2025/10/28
已更新: 2025/12/8
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: High
分數: 7.1
風險因素: Medium
基本分數: 4.6
時間性分數: 3.6
媒介: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C
CVSS 評分資料來源: CVE-2025-39816
風險因素: Medium
基本分數: 5.5
時間性分數: 5
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:kernel6.12-devel, p-cpe:/a:amazon:linux:kernel6.12-modules-extra, p-cpe:/a:amazon:linux:bpftool6.12, p-cpe:/a:amazon:linux:kernel6.12-libbpf-static, p-cpe:/a:amazon:linux:kernel6.12-libbpf-debuginfo, p-cpe:/a:amazon:linux:perf6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-headers, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf6.12, p-cpe:/a:amazon:linux:kernel-livepatch-6.12.53-69.119, p-cpe:/a:amazon:linux:kernel6.12-tools-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-tools, p-cpe:/a:amazon:linux:python3-perf6.12, p-cpe:/a:amazon:linux:python3-perf6.12-debuginfo, p-cpe:/a:amazon:linux:bpftool6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12-debuginfo, p-cpe:/a:amazon:linux:kernel6.12, p-cpe:/a:amazon:linux:kernel6.12-tools-devel, p-cpe:/a:amazon:linux:kernel6.12-libbpf-devel, p-cpe:/a:amazon:linux:kernel6.12-libbpf, p-cpe:/a:amazon:linux:kernel6.12-modules-extra-common, p-cpe:/a:amazon:linux:kernel6.12-debuginfo-common-aarch64
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2025/10/27
弱點發布日期: 2025/9/16
CVE: CVE-2025-39816, CVE-2025-39931, CVE-2025-39940, CVE-2025-39946, CVE-2025-39947, CVE-2025-39953, CVE-2025-39955, CVE-2025-39956, CVE-2025-39961, CVE-2025-39963, CVE-2025-39964, CVE-2025-39965, CVE-2025-39967, CVE-2025-39975, CVE-2025-39977, CVE-2025-39980, CVE-2025-39984, CVE-2025-39990, CVE-2025-39992, CVE-2025-39998, CVE-2025-40006, CVE-2025-40009, CVE-2025-40018, CVE-2025-40021, CVE-2025-40024, CVE-2025-40030, CVE-2025-40035, CVE-2025-40044, CVE-2025-40047, CVE-2025-40048, CVE-2025-40049, CVE-2025-40052, CVE-2025-40057, CVE-2025-40058, CVE-2025-40067, CVE-2025-40068, CVE-2025-40070, CVE-2025-40078, CVE-2025-40080, CVE-2025-40081, CVE-2025-40109, CVE-2025-40115, CVE-2025-40123, CVE-2025-40125, CVE-2025-40129, CVE-2025-40134, CVE-2025-40153, CVE-2025-40169