语言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-066.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3566.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3567.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48666.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36484.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36901.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36938.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36978.html
https://alas.aws.amazon.com/cve/html/CVE-2024-37078.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38586.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38619.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39468.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39469.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39482.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39487.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39503.html
https://alas.aws.amazon.com/cve/html/CVE-2024-39509.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40901.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40947.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40958.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40960.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40961.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40978.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40980.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40983.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40984.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40988.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40995.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41000.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41005.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41009.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41020.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41022.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41034.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41035.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41041.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41049.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41055.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41059.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41077.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41087.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41090.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41091.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41092.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41097.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42070.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42084.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42090.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42096.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42104.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42148.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42152.html
严重性: High
ID: 205750
文件名: al2_ALASKERNEL-5_10-2024-066.nasl
版本: 1.20
类型: local
代理: unix
发布时间: 2024/8/17
最近更新时间: 2025/5/23
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: High
分数: 7.4
风险因素: Medium
基本分数: 6.8
时间分数: 5.3
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2024-42148
风险因素: High
基本分数: 7.8
时间分数: 7
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:python-perf, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.223-211.872, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2024/8/1
漏洞发布日期: 2022/10/17
CVE: CVE-2022-3566, CVE-2022-3567, CVE-2022-48666, CVE-2024-36484, CVE-2024-36901, CVE-2024-36938, CVE-2024-36978, CVE-2024-37078, CVE-2024-38586, CVE-2024-38619, CVE-2024-39468, CVE-2024-39469, CVE-2024-39482, CVE-2024-39487, CVE-2024-39503, CVE-2024-39509, CVE-2024-40901, CVE-2024-40947, CVE-2024-40958, CVE-2024-40960, CVE-2024-40961, CVE-2024-40978, CVE-2024-40980, CVE-2024-40983, CVE-2024-40984, CVE-2024-40988, CVE-2024-40995, CVE-2024-41000, CVE-2024-41005, CVE-2024-41009, CVE-2024-41020, CVE-2024-41022, CVE-2024-41034, CVE-2024-41035, CVE-2024-41041, CVE-2024-41049, CVE-2024-41055, CVE-2024-41059, CVE-2024-41077, CVE-2024-41087, CVE-2024-41090, CVE-2024-41091, CVE-2024-41092, CVE-2024-41097, CVE-2024-42070, CVE-2024-42084, CVE-2024-42090, CVE-2024-42096, CVE-2024-42104, CVE-2024-42148, CVE-2024-42152, CVE-2024-42154, CVE-2024-42229