语言:
https://errata.rockylinux.org/RLSA-2024:1607
https://bugzilla.redhat.com/show_bug.cgi?id=2133452
https://bugzilla.redhat.com/show_bug.cgi?id=2252731
https://bugzilla.redhat.com/show_bug.cgi?id=2255498
https://bugzilla.redhat.com/show_bug.cgi?id=2258518
https://bugzilla.redhat.com/show_bug.cgi?id=2259866
严重性: High
ID: 192953
文件名: rocky_linux_RLSA-2024-1607.nasl
版本: 1.2
类型: local
发布时间: 2024/4/5
最近更新时间: 2024/5/30
支持的传感器: Continuous Assessment, Nessus Agent, Nessus
风险因素: Critical
分数: 9.6
风险因素: High
基本分数: 7.7
时间分数: 6.7
矢量: CVSS2#AV:A/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2024-0565
风险因素: High
基本分数: 7.8
时间分数: 7.5
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2024-1086
CPE: p-cpe:/a:rocky:linux:bpftool-debuginfo, p-cpe:/a:rocky:linux:kernel-modules-extra, p-cpe:/a:rocky:linux:bpftool, p-cpe:/a:rocky:linux:kernel-tools-libs, p-cpe:/a:rocky:linux:kernel-core, p-cpe:/a:rocky:linux:kernel-tools, p-cpe:/a:rocky:linux:kernel-debug-debuginfo, p-cpe:/a:rocky:linux:kernel, p-cpe:/a:rocky:linux:kernel-tools-libs-devel, p-cpe:/a:rocky:linux:perf-debuginfo, p-cpe:/a:rocky:linux:kernel-debug-core, p-cpe:/a:rocky:linux:python3-perf, p-cpe:/a:rocky:linux:kernel-devel, p-cpe:/a:rocky:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:rocky:linux:python3-perf-debuginfo, p-cpe:/a:rocky:linux:perf, p-cpe:/a:rocky:linux:kernel-debug-devel, p-cpe:/a:rocky:linux:kernel-debug-modules-extra, p-cpe:/a:rocky:linux:kernel-debug-modules, p-cpe:/a:rocky:linux:kernel-debug, p-cpe:/a:rocky:linux:kernel-cross-headers, p-cpe:/a:rocky:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:rocky:linux:kernel-abi-stablelists, p-cpe:/a:rocky:linux:kernel-modules, p-cpe:/a:rocky:linux:kernel-debuginfo, cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:kernel-headers, p-cpe:/a:rocky:linux:kernel-tools-debuginfo
必需的 KB 项: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2024/4/5
漏洞发布日期: 2022/9/9
CISA 已知可遭利用的漏洞到期日期: 2024/6/20
Core Impact
CVE: CVE-2021-33631, CVE-2022-38096, CVE-2023-51042, CVE-2023-6546, CVE-2023-6931, CVE-2024-0565, CVE-2024-1086