语言:
严重性: High
ID: 301901
文件名: oraclelinux_ELSA-2026-50145.nasl
版本: 1.3
类型: local
代理: unix
发布时间: 2026/3/11
最近更新时间: 2026/3/12
支持的传感器: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus
风险因素: High
分数: 7.4
风险因素: Medium
基本分数: 6.8
时间分数: 5
矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 分数来源: CVE-2026-22980
风险因素: High
基本分数: 7.8
时间分数: 6.8
矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:U/RL:O/RC:C
CPE: p-cpe:/a:oracle:linux:kernel-uek-container, cpe:/o:oracle:linux:8, p-cpe:/a:oracle:linux:kernel-uek-doc, p-cpe:/a:oracle:linux:kernel-uek64k-modules-extra, p-cpe:/a:oracle:linux:kernel-uek-modules-extra, p-cpe:/a:oracle:linux:kernel-uek-modules, p-cpe:/a:oracle:linux:kernel-uek64k, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:kernel-uek-debug, p-cpe:/a:oracle:linux:kernel-uek, p-cpe:/a:oracle:linux:kernel-uek64k-modules, p-cpe:/a:oracle:linux:kernel-uek-debug-devel, p-cpe:/a:oracle:linux:kernel-uek-devel, cpe:/o:oracle:linux:9:7:baseos_patch, p-cpe:/a:oracle:linux:bpftool, p-cpe:/a:oracle:linux:kernel-uek-debug-core, p-cpe:/a:oracle:linux:kernel-uek-debug-modules, p-cpe:/a:oracle:linux:kernel-uek64k-devel, p-cpe:/a:oracle:linux:kernel-uek-container-debug, p-cpe:/a:oracle:linux:kernel-uek-debug-modules-extra, p-cpe:/a:oracle:linux:kernel-uek64k-core, p-cpe:/a:oracle:linux:kernel-uek-core
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux
易利用性: No known exploits are available
补丁发布日期: 2026/3/10
漏洞发布日期: 2024/4/1
CVE: CVE-2024-26655, CVE-2024-36903, CVE-2024-36927, CVE-2024-40928, CVE-2024-46830, CVE-2024-49968, CVE-2025-21979, CVE-2025-22022, CVE-2025-22111, CVE-2025-22119, CVE-2025-22121, CVE-2025-37860, CVE-2025-38007, CVE-2025-38022, CVE-2025-38057, CVE-2025-38129, CVE-2025-38232, CVE-2025-38556, CVE-2025-38591, CVE-2025-40110, CVE-2025-40149, CVE-2025-40164, CVE-2025-40256, CVE-2025-68211, CVE-2025-68254, CVE-2025-68255, CVE-2025-68261, CVE-2025-68264, CVE-2025-68282, CVE-2025-68337, CVE-2025-68346, CVE-2025-68349, CVE-2025-68354, CVE-2025-68362, CVE-2025-68364, CVE-2025-68366, CVE-2025-68367, CVE-2025-68372, CVE-2025-68724, CVE-2025-68725, CVE-2025-68732, CVE-2025-68740, CVE-2025-68746, CVE-2025-68757, CVE-2025-68759, CVE-2025-68764, CVE-2025-68771, CVE-2025-68776, CVE-2025-68780, CVE-2025-68782, CVE-2025-68783, CVE-2025-68785, CVE-2025-68788, CVE-2025-68795, CVE-2025-68803, CVE-2025-68813, CVE-2025-68815, CVE-2025-68816, CVE-2025-68818, CVE-2025-68819, CVE-2025-68820, CVE-2025-71066, CVE-2025-71068, CVE-2025-71075, CVE-2025-71077, CVE-2025-71082, CVE-2025-71083, CVE-2025-71084, CVE-2025-71085, CVE-2025-71087, CVE-2025-71091, CVE-2025-71093, CVE-2025-71094, CVE-2025-71096, CVE-2025-71097, CVE-2025-71098, CVE-2025-71104, CVE-2025-71108, CVE-2025-71111, CVE-2025-71113, CVE-2025-71114, CVE-2025-71116, CVE-2025-71118, CVE-2025-71120, CVE-2025-71125, CVE-2025-71127, CVE-2025-71131, CVE-2025-71132, CVE-2025-71133, CVE-2025-71146, CVE-2025-71147, CVE-2025-71154, CVE-2025-71182, CVE-2025-71190, CVE-2025-71194, CVE-2025-71197, CVE-2026-22976, CVE-2026-22977, CVE-2026-22978, CVE-2026-22980, CVE-2026-22984, CVE-2026-22988, CVE-2026-22990, CVE-2026-22991, CVE-2026-22992, CVE-2026-22997, CVE-2026-22998, CVE-2026-22999, CVE-2026-23001, CVE-2026-23003, CVE-2026-23011, CVE-2026-23020, CVE-2026-23021, CVE-2026-23038, CVE-2026-23047, CVE-2026-23049, CVE-2026-23058, CVE-2026-23060, CVE-2026-23061, CVE-2026-23071, CVE-2026-23073, CVE-2026-23074, CVE-2026-23076, CVE-2026-23084, CVE-2026-23085, CVE-2026-23087, CVE-2026-23089, CVE-2026-23091, CVE-2026-23097, CVE-2026-23099, CVE-2026-23101, CVE-2026-23103, CVE-2026-23105, CVE-2026-23108, CVE-2026-23111, CVE-2026-23119, CVE-2026-23120, CVE-2026-23121, CVE-2026-23124, CVE-2026-23125, CVE-2026-23133, CVE-2026-23139, CVE-2026-23145, CVE-2026-23146, CVE-2026-23164, CVE-2026-23202, CVE-2026-23209