語言:
https://errata.rockylinux.org/RLSA-2026:10950
https://bugzilla.redhat.com/show_bug.cgi?id=2395108
https://bugzilla.redhat.com/show_bug.cgi?id=2408891
https://bugzilla.redhat.com/show_bug.cgi?id=2418084
https://bugzilla.redhat.com/show_bug.cgi?id=2431366
https://bugzilla.redhat.com/show_bug.cgi?id=2431374
https://bugzilla.redhat.com/show_bug.cgi?id=2444691
https://bugzilla.redhat.com/show_bug.cgi?id=2448168
https://bugzilla.redhat.com/show_bug.cgi?id=2448181
https://bugzilla.redhat.com/show_bug.cgi?id=2457409
嚴重性: Critical
ID: 310642
檔案名稱: rocky_linux_RLSA-2026-10950.nasl
版本: 1.1
類型: Local
已發布: 2026/4/28
已更新: 2026/4/28
支援的感應器: Nessus Agent, Continuous Assessment, Nessus
風險因素: High
分數: 7.0
風險因素: Medium
基本分數: 4.9
時間性分數: 3.8
媒介: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSS 評分資料來源: CVE-2025-13837
風險因素: Medium
基本分數: 5.5
時間性分數: 5
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CVSS 評分資料來源: CVE-2025-6075
風險因素: Critical
Base Score: 9.1
Threat Score: 8.1
Threat Vector: CVSS:4.0/E:P
Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS 評分資料來源: CVE-2026-6100
CPE: p-cpe:/a:rocky:linux:python3.12-tkinter, p-cpe:/a:rocky:linux:python3.12-libs, p-cpe:/a:rocky:linux:python3.12, p-cpe:/a:rocky:linux:python3.12-idle, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:python3.12-debugsource, p-cpe:/a:rocky:linux:python3.12-test, p-cpe:/a:rocky:linux:python3.12-debuginfo, p-cpe:/a:rocky:linux:python3.12-debug, p-cpe:/a:rocky:linux:python3.12-devel, p-cpe:/a:rocky:linux:python3.12-rpm-macros
必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2026/4/28
弱點發布日期: 2025/6/10
CVE: CVE-2025-13837, CVE-2025-15282, CVE-2025-59375, CVE-2025-6075, CVE-2026-0672, CVE-2026-1502, CVE-2026-2297, CVE-2026-3644, CVE-2026-4224, CVE-2026-4786, CVE-2026-6100
IAVA: 2025-A-0444-S, 2026-A-0142-S, 2026-A-0360