语言:
严重性: High
ID: 306091
文件名: ubuntu_USN-8161-1.nasl
版本: 1.1
类型: Local
代理: unix
发布时间: 2026/4/13
最近更新时间: 2026/4/13
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
风险因素: Medium
分数: 6.5
风险因素: Low
基本分数: 3.6
时间分数: 2.7
矢量: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:P
CVSS 分数来源: CVE-2026-2243
风险因素: High
基本分数: 8.2
时间分数: 7.1
矢量: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:U/RL:O/RC:C
CVSS 分数来源: CVE-2024-6519
CPE: p-cpe:/a:canonical:ubuntu_linux:qemu-system-riscv, p-cpe:/a:canonical:ubuntu_linux:qemu-system-mips, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:qemu-system-common, p-cpe:/a:canonical:ubuntu_linux:qemu-system-modules-opengl, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:qemu-user-binfmt, p-cpe:/a:canonical:ubuntu_linux:qemu-user, p-cpe:/a:canonical:ubuntu_linux:qemu-guest-agent, p-cpe:/a:canonical:ubuntu_linux:qemu-system-arm, p-cpe:/a:canonical:ubuntu_linux:qemu-system-data, p-cpe:/a:canonical:ubuntu_linux:qemu-system-modules-spice, p-cpe:/a:canonical:ubuntu_linux:qemu-system-x86-microvm, p-cpe:/a:canonical:ubuntu_linux:qemu-system-gui, cpe:/o:canonical:ubuntu_linux:25.10, p-cpe:/a:canonical:ubuntu_linux:qemu-user-static, p-cpe:/a:canonical:ubuntu_linux:qemu-system-s390x, p-cpe:/a:canonical:ubuntu_linux:qemu-system-x86, p-cpe:/a:canonical:ubuntu_linux:qemu-system-misc, p-cpe:/a:canonical:ubuntu_linux:qemu-block-supplemental, p-cpe:/a:canonical:ubuntu_linux:qemu-utils, p-cpe:/a:canonical:ubuntu_linux:qemu-block-extra, p-cpe:/a:canonical:ubuntu_linux:qemu-system-x86-xen, p-cpe:/a:canonical:ubuntu_linux:qemu, p-cpe:/a:canonical:ubuntu_linux:qemu-system-ppc, p-cpe:/a:canonical:ubuntu_linux:qemu-system-xen, p-cpe:/a:canonical:ubuntu_linux:qemu-system, p-cpe:/a:canonical:ubuntu_linux:qemu-system-sparc
必需的 KB 项: Host/cpu, Host/Debian/dpkg-l, Host/Ubuntu, Host/Ubuntu/release
易利用性: No known exploits are available
补丁发布日期: 2026/4/9
漏洞发布日期: 2024/9/26
CVE: CVE-2024-6519, CVE-2026-2243, CVE-2026-3195, CVE-2026-3196, CVE-2026-3842
IAVB: 2024-B-0141-S
USN: 8161-1