语言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-049.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48808.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26629.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26642.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26643.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26687.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26810.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26812.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26923.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26925.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26934.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26935.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26937.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26950.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26951.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26958.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26960.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26961.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26964.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26973.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26976.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26977.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27393.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27437.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35791.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35804.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35805.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35809.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35815.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35823.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35872.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35884.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35888.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35890.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35895.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35896.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35897.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35899.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35900.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35902.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35910.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35925.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35935.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35936.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35944.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35950.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35960.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35969.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35970.html
https://alas.aws.amazon.com/cve/html/CVE-2024-35973.html
严重性: High
ID: 205715
文件名: al2_ALASKERNEL-5_15-2024-049.nasl
版本: 1.5
类型: local
代理: unix
发布时间: 2024/8/17
最近更新时间: 2025/5/22
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: Medium
分数: 6.7
风险因素: Medium
基本分数: 6.8
时间分数: 5
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2024-26961
风险因素: High
基本分数: 7.8
时间分数: 6.8
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.156-102.160, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
易利用性: No known exploits are available
补丁发布日期: 2024/8/1
漏洞发布日期: 2024/5/1
CVE: CVE-2022-48808, CVE-2024-26629, CVE-2024-26642, CVE-2024-26643, CVE-2024-26687, CVE-2024-26810, CVE-2024-26812, CVE-2024-26923, CVE-2024-26925, CVE-2024-26934, CVE-2024-26935, CVE-2024-26937, CVE-2024-26950, CVE-2024-26951, CVE-2024-26958, CVE-2024-26960, CVE-2024-26961, CVE-2024-26964, CVE-2024-26973, CVE-2024-26976, CVE-2024-26977, CVE-2024-27393, CVE-2024-27437, CVE-2024-35791, CVE-2024-35804, CVE-2024-35805, CVE-2024-35809, CVE-2024-35815, CVE-2024-35823, CVE-2024-35872, CVE-2024-35884, CVE-2024-35888, CVE-2024-35890, CVE-2024-35895, CVE-2024-35896, CVE-2024-35897, CVE-2024-35899, CVE-2024-35900, CVE-2024-35902, CVE-2024-35910, CVE-2024-35925, CVE-2024-35935, CVE-2024-35936, CVE-2024-35944, CVE-2024-35950, CVE-2024-35960, CVE-2024-35969, CVE-2024-35970, CVE-2024-35973, CVE-2024-35976, CVE-2024-35995