语言:
https://errata.rockylinux.org/RLSA-2019:0975
https://bugzilla.redhat.com/show_bug.cgi?id=1664908
https://bugzilla.redhat.com/show_bug.cgi?id=1693675
严重性: High
ID: 185070
文件名: rocky_linux_RLSA-2019-0975.nasl
版本: 1.1
类型: local
发布时间: 2023/11/7
最近更新时间: 2023/11/8
支持的传感器: Nessus Agent, Continuous Assessment, Nessus
风险因素: Critical
分数: 9.9
风险因素: High
基本分数: 9.3
时间分数: 8.1
矢量: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2019-5736
风险因素: High
基本分数: 8.6
时间分数: 8.2
矢量: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:oci-umount, p-cpe:/a:rocky:linux:oci-umount-debugsource, p-cpe:/a:rocky:linux:oci-umount-debuginfo, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:oci-systemd-hook-debuginfo, p-cpe:/a:rocky:linux:oci-systemd-hook, p-cpe:/a:rocky:linux:oci-systemd-hook-debugsource
必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2019/5/7
漏洞发布日期: 2019/2/8
Metasploit (Docker Container Escape Via runC Overwrite)
CVE: CVE-2019-5736