语言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-090.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2024-26921.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38538.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38544.html
https://alas.aws.amazon.com/cve/html/CVE-2024-38588.html
https://alas.aws.amazon.com/cve/html/CVE-2024-40953.html
https://alas.aws.amazon.com/cve/html/CVE-2024-42229.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47671.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47674.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47679.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47684.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47685.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47692.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47696.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47699.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47701.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47706.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47709.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47710.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47737.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47742.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47749.html
https://alas.aws.amazon.com/cve/html/CVE-2024-47757.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49851.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49860.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49867.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49868.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49878.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49882.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49883.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49944.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49948.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49949.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49952.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49955.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49957.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49959.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49973.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49975.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49995.html
https://alas.aws.amazon.com/cve/html/CVE-2024-49996.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50006.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50024.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50033.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50035.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50039.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50040.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50044.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50045.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50082.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50099.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50116.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50127.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50131.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50134.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50142.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50143.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50150.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50151.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50179.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50194.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50195.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50199.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50202.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50229.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50230.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50251.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50262.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50264.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50267.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50273.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50278.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50279.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50299.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50301.html
https://alas.aws.amazon.com/cve/html/CVE-2024-50302.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53057.html
https://alas.aws.amazon.com/cve/html/CVE-2024-53066.html
严重性: Critical
ID: 214613
文件名: al2_ALASKERNEL-5_4-2025-090.nasl
版本: 1.8
类型: local
代理: unix
发布时间: 2025/1/24
最近更新时间: 2025/5/23
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: Medium
分数: 6.7
风险因素: High
基本分数: 9.4
时间分数: 7.8
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C
CVSS 分数来源: CVE-2024-47685
风险因素: Critical
基本分数: 9.1
时间分数: 8.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
时间矢量: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必需的 KB 项: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2025/1/21
漏洞发布日期: 2024/10/21
CISA 已知可遭利用的漏洞到期日期: 2025/3/25
CVE: CVE-2024-26921, CVE-2024-38538, CVE-2024-38544, CVE-2024-38588, CVE-2024-40953, CVE-2024-42229, CVE-2024-47671, CVE-2024-47674, CVE-2024-47679, CVE-2024-47684, CVE-2024-47685, CVE-2024-47692, CVE-2024-47696, CVE-2024-47699, CVE-2024-47701, CVE-2024-47706, CVE-2024-47709, CVE-2024-47710, CVE-2024-47737, CVE-2024-47742, CVE-2024-47749, CVE-2024-47757, CVE-2024-49851, CVE-2024-49860, CVE-2024-49867, CVE-2024-49868, CVE-2024-49878, CVE-2024-49882, CVE-2024-49883, CVE-2024-49944, CVE-2024-49948, CVE-2024-49949, CVE-2024-49952, CVE-2024-49955, CVE-2024-49957, CVE-2024-49959, CVE-2024-49973, CVE-2024-49975, CVE-2024-49995, CVE-2024-49996, CVE-2024-50006, CVE-2024-50024, CVE-2024-50033, CVE-2024-50035, CVE-2024-50039, CVE-2024-50040, CVE-2024-50044, CVE-2024-50045, CVE-2024-50082, CVE-2024-50099, CVE-2024-50116, CVE-2024-50127, CVE-2024-50131, CVE-2024-50134, CVE-2024-50142, CVE-2024-50143, CVE-2024-50150, CVE-2024-50151, CVE-2024-50179, CVE-2024-50194, CVE-2024-50195, CVE-2024-50199, CVE-2024-50202, CVE-2024-50229, CVE-2024-50230, CVE-2024-50251, CVE-2024-50262, CVE-2024-50264, CVE-2024-50267, CVE-2024-50273, CVE-2024-50278, CVE-2024-50279, CVE-2024-50299, CVE-2024-50301, CVE-2024-50302, CVE-2024-53057, CVE-2024-53066, CVE-2024-53095, CVE-2024-53103