语言:
https://alas.aws.amazon.com/AL2023/ALAS-2024-784.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52620.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52640.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52641.html
https://alas.aws.amazon.com/cve/html/CVE-2024-1627.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26621.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26659.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26686.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26687.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26731.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26733.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26735.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26737.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26741.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26742.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26754.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26759.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26760.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26763.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26764.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26772.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26773.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26774.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26780.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26782.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26789.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26791.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26792.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26793.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26798.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26803.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26804.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26805.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26832.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26835.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26837.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26840.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26843.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26844.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26845.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26849.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26851.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26852.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26857.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27023.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27024.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27403.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27404.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27413.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27414.html
https://alas.aws.amazon.com/cve/html/CVE-2024-27415.html
严重性: High
ID: 212350
文件名: al2023_ALAS2023-2024-784.nasl
版本: 1.2
类型: local
代理: unix
发布时间: 2024/12/11
最近更新时间: 2025/1/6
支持的传感器: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
风险因素: High
分数: 7.4
风险因素: Medium
基本分数: 6.8
时间分数: 5
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2024-27024
风险因素: High
基本分数: 7.8
时间分数: 6.8
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel-libbpf, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.82-99.168, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
易利用性: No known exploits are available
补丁发布日期: 2024/12/5
漏洞发布日期: 2024/4/3
CVE: CVE-2023-52620, CVE-2023-52640, CVE-2023-52641, CVE-2024-1627, CVE-2024-26621, CVE-2024-26659, CVE-2024-26686, CVE-2024-26687, CVE-2024-26731, CVE-2024-26733, CVE-2024-26735, CVE-2024-26737, CVE-2024-26741, CVE-2024-26742, CVE-2024-26754, CVE-2024-26759, CVE-2024-26760, CVE-2024-26763, CVE-2024-26764, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26780, CVE-2024-26782, CVE-2024-26789, CVE-2024-26791, CVE-2024-26792, CVE-2024-26793, CVE-2024-26798, CVE-2024-26803, CVE-2024-26804, CVE-2024-26805, CVE-2024-26832, CVE-2024-26835, CVE-2024-26837, CVE-2024-26840, CVE-2024-26843, CVE-2024-26844, CVE-2024-26845, CVE-2024-26849, CVE-2024-26851, CVE-2024-26852, CVE-2024-26857, CVE-2024-27023, CVE-2024-27024, CVE-2024-27403, CVE-2024-27404, CVE-2024-27413, CVE-2024-27414, CVE-2024-27415, CVE-2024-27417, CVE-2024-27431