语言:
https://alas.aws.amazon.com/AL2023/ALAS-2024-683.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52884.html
https://alas.aws.amazon.com/cve/html/CVE-2024-31076.html
https://alas.aws.amazon.com/cve/html/CVE-2024-33619.html
https://alas.aws.amazon.com/cve/html/CVE-2024-33621.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35927.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36014.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36016.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36270.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36286.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36484.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36489.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36891.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36971.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36972.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36979.html
https://alas.aws.amazon.com/cve/html/CVE-2024-37353.html
https://alas.aws.amazon.com/cve/html/CVE-2024-37354.html
https://alas.aws.amazon.com/cve/html/CVE-2024-37356.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38538.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38554.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38556.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38558.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38568.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38569.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38573.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38576.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38577.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38580.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38586.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38588.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38596.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38598.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38601.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38602.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38603.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38612.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38615.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38623.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38624.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38662.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39276.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39468.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39476.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39482.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39488.html
严重性: High
ID: 205104
文件名: al2023_ALAS2023-2024-683.nasl
版本: 1.14
类型: local
代理: unix
发布时间: 2024/8/6
最近更新时间: 2025/6/12
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: High
分数: 7.4
风险因素: Medium
基本分数: 6.8
时间分数: 5.6
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2024-38588
风险因素: High
基本分数: 7.8
时间分数: 7.2
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.94-99.176, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2024/8/1
漏洞发布日期: 2024/6/21
CISA 已知可遭利用的漏洞到期日期: 2024/8/28
CVE: CVE-2023-52884, CVE-2024-31076, CVE-2024-33619, CVE-2024-33621, CVE-2024-35927, CVE-2024-36014, CVE-2024-36016, CVE-2024-36270, CVE-2024-36286, CVE-2024-36484, CVE-2024-36489, CVE-2024-36891, CVE-2024-36971, CVE-2024-36972, CVE-2024-36979, CVE-2024-37353, CVE-2024-37354, CVE-2024-37356, CVE-2024-38538, CVE-2024-38554, CVE-2024-38556, CVE-2024-38558, CVE-2024-38568, CVE-2024-38569, CVE-2024-38573, CVE-2024-38576, CVE-2024-38577, CVE-2024-38580, CVE-2024-38586, CVE-2024-38588, CVE-2024-38596, CVE-2024-38598, CVE-2024-38601, CVE-2024-38602, CVE-2024-38603, CVE-2024-38612, CVE-2024-38615, CVE-2024-38623, CVE-2024-38624, CVE-2024-38662, CVE-2024-39276, CVE-2024-39468, CVE-2024-39476, CVE-2024-39482, CVE-2024-39488, CVE-2024-39489, CVE-2024-39490