语言:
https://errata.rockylinux.org/RLSA-2026:13577
https://bugzilla.redhat.com/show_bug.cgi?id=2301637
https://bugzilla.redhat.com/show_bug.cgi?id=2418875
https://bugzilla.redhat.com/show_bug.cgi?id=2424886
https://bugzilla.redhat.com/show_bug.cgi?id=2453803
严重性: High
ID: 312380
文件名: rocky_linux_RLSA-2026-13577.nasl
版本: 1.2
类型: Local
发布时间: 2026/5/6
最近更新时间: 2026/5/7
支持的传感器: Nessus Agent, Continuous Assessment, Nessus
风险因素: Critical
分数: 9.4
风险因素: Medium
基本分数: 6.8
时间分数: 5.9
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2024-41073
风险因素: High
基本分数: 7.8
时间分数: 7.5
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:rocky:linux:8, p-cpe:/a:rocky:linux:bpftool, p-cpe:/a:rocky:linux:bpftool-debuginfo, p-cpe:/a:rocky:linux:kernel, p-cpe:/a:rocky:linux:kernel-abi-stablelists, p-cpe:/a:rocky:linux:kernel-core, p-cpe:/a:rocky:linux:kernel-debug, p-cpe:/a:rocky:linux:kernel-debug-core, p-cpe:/a:rocky:linux:kernel-debug-debuginfo, p-cpe:/a:rocky:linux:kernel-debug-devel, p-cpe:/a:rocky:linux:kernel-debug-modules, p-cpe:/a:rocky:linux:kernel-debug-modules-extra, p-cpe:/a:rocky:linux:kernel-debuginfo, p-cpe:/a:rocky:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:rocky:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:rocky:linux:kernel-devel, p-cpe:/a:rocky:linux:kernel-modules, p-cpe:/a:rocky:linux:kernel-modules-extra, p-cpe:/a:rocky:linux:kernel-tools, p-cpe:/a:rocky:linux:kernel-tools-debuginfo, p-cpe:/a:rocky:linux:kernel-tools-libs, p-cpe:/a:rocky:linux:kernel-tools-libs-devel, p-cpe:/a:rocky:linux:perf, p-cpe:/a:rocky:linux:perf-debuginfo, p-cpe:/a:rocky:linux:python3-perf, p-cpe:/a:rocky:linux:python3-perf-debuginfo
必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list
可利用: true
易利用性: Exploits are available
补丁发布日期: 2026/5/6
漏洞发布日期: 2024/7/29
CISA 已知可遭利用的漏洞到期日期: 2026/5/15
Core Impact
Metasploit (Copy Fail AF_ALG + authencesn Page-Cache Write)
CVE: CVE-2024-41073, CVE-2025-40252, CVE-2025-68724, CVE-2026-23401, CVE-2026-31402, CVE-2026-31431