語言:
嚴重性: High
ID: 314332
檔案名稱: oraclelinux_ELSA-2026-50261.nasl
版本: 1.2
類型: Local
代理程式: unix
已發布: 2026/5/12
已更新: 2026/5/13
支援的感應器: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus
風險因素: Critical
分數: 10.0
風險因素: Medium
基本分數: 6.8
時間性分數: 5.9
媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2025-38385
風險因素: High
基本分數: 7.8
時間性分數: 7.5
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:H/RL:O/RC:C
風險因素: High
Base Score: 8.6
Threat Score: 8.6
Threat Vector: CVSS:4.0/E:A
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS 評分資料來源: CVE-2026-31431
CPE: p-cpe:/a:oracle:linux:kernel-uek-container, cpe:/o:oracle:linux:8, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek64k-modules-extra, p-cpe:/a:oracle:linux:kernel-uek-modules-extra, p-cpe:/a:oracle:linux:kernel-uek-modules, p-cpe:/a:oracle:linux:kernel-uek64k, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek64k-modules, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, cpe:/o:oracle:linux:9:7:baseos_patch, p-cpe:/a:oracle:linux:bpftool, p-cpe:/a:oracle:linux:kernel-uek-debug-core, p-cpe:/a:oracle:linux:kernel-uek-debug-modules, p-cpe:/a:oracle:linux:kernel-uek64k-devel, p-cpe:/a:oracle:linux:kernel-uek-container-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-extra, p-cpe:/a:oracle:linux:kernel-uek64k-core, p-cpe:/a:oracle:linux:kernel-uek-core
必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2026/5/10
弱點發布日期: 2023/10/10
CISA 已知遭惡意利用弱點到期日: 2026/5/15
Core Impact
Metasploit (Copy Fail AF_ALG + authencesn Page-Cache Write)
CVE: CVE-2024-50043, CVE-2024-53230, CVE-2024-53231, CVE-2024-58078, CVE-2025-21720, CVE-2025-21723, CVE-2025-21724, CVE-2025-21783, CVE-2025-21808, CVE-2025-21857, CVE-2025-21867, CVE-2025-21892, CVE-2025-21997, CVE-2025-22017, CVE-2025-37873, CVE-2025-37888, CVE-2025-38015, CVE-2025-38020, CVE-2025-38109, CVE-2025-38113, CVE-2025-38246, CVE-2025-38385, CVE-2025-38455, CVE-2025-38551, CVE-2025-38735, CVE-2025-39721, CVE-2025-40051, CVE-2025-40056, CVE-2025-40129, CVE-2025-40135, CVE-2025-40157, CVE-2025-40292, CVE-2025-54518, CVE-2025-68171, CVE-2025-68259, CVE-2025-68371, CVE-2025-68741, CVE-2025-68770, CVE-2025-68775, CVE-2025-68798, CVE-2025-71148, CVE-2026-22989, CVE-2026-22994, CVE-2026-23059, CVE-2026-23173, CVE-2026-23243, CVE-2026-23296, CVE-2026-23401, CVE-2026-31411, CVE-2026-31431, CVE-2026-31628, CVE-2026-43284
IAVA: 2026-A-0428