Language:
https://alas.aws.amazon.com//AL2023/ALAS2023-2025-864.html
https://alas.aws.amazon.com/faqs.html
https://explore.alas.aws.amazon.com/CVE-2024-39472.html
https://explore.alas.aws.amazon.com/CVE-2024-41042.html
https://explore.alas.aws.amazon.com/CVE-2024-42159.html
https://explore.alas.aws.amazon.com/CVE-2024-42258.html
https://explore.alas.aws.amazon.com/CVE-2024-42259.html
https://explore.alas.aws.amazon.com/CVE-2024-42268.html
https://explore.alas.aws.amazon.com/CVE-2024-42269.html
https://explore.alas.aws.amazon.com/CVE-2024-42270.html
https://explore.alas.aws.amazon.com/CVE-2024-42276.html
https://explore.alas.aws.amazon.com/CVE-2024-42281.html
https://explore.alas.aws.amazon.com/CVE-2024-42283.html
https://explore.alas.aws.amazon.com/CVE-2024-42285.html
https://explore.alas.aws.amazon.com/CVE-2024-42292.html
https://explore.alas.aws.amazon.com/CVE-2024-42299.html
https://explore.alas.aws.amazon.com/CVE-2024-42302.html
https://explore.alas.aws.amazon.com/CVE-2024-42304.html
https://explore.alas.aws.amazon.com/CVE-2024-42305.html
https://explore.alas.aws.amazon.com/CVE-2024-42306.html
https://explore.alas.aws.amazon.com/CVE-2024-42307.html
https://explore.alas.aws.amazon.com/CVE-2024-42312.html
https://explore.alas.aws.amazon.com/CVE-2024-42316.html
https://explore.alas.aws.amazon.com/CVE-2024-42321.html
https://explore.alas.aws.amazon.com/CVE-2024-43817.html
https://explore.alas.aws.amazon.com/CVE-2024-43823.html
https://explore.alas.aws.amazon.com/CVE-2024-43828.html
https://explore.alas.aws.amazon.com/CVE-2024-43830.html
https://explore.alas.aws.amazon.com/CVE-2024-43834.html
https://explore.alas.aws.amazon.com/CVE-2024-43837.html
https://explore.alas.aws.amazon.com/CVE-2024-43853.html
https://explore.alas.aws.amazon.com/CVE-2024-43854.html
https://explore.alas.aws.amazon.com/CVE-2024-43855.html
https://explore.alas.aws.amazon.com/CVE-2024-43856.html
https://explore.alas.aws.amazon.com/CVE-2024-43869.html
https://explore.alas.aws.amazon.com/CVE-2024-43870.html
https://explore.alas.aws.amazon.com/CVE-2024-43871.html
https://explore.alas.aws.amazon.com/CVE-2024-43873.html
https://explore.alas.aws.amazon.com/CVE-2024-43882.html
https://explore.alas.aws.amazon.com/CVE-2024-43883.html
https://explore.alas.aws.amazon.com/CVE-2024-43889.html
https://explore.alas.aws.amazon.com/CVE-2024-43893.html
https://explore.alas.aws.amazon.com/CVE-2024-43894.html
https://explore.alas.aws.amazon.com/CVE-2024-43914.html
https://explore.alas.aws.amazon.com/CVE-2024-44934.html
https://explore.alas.aws.amazon.com/CVE-2024-44935.html
https://explore.alas.aws.amazon.com/CVE-2024-44944.html
https://explore.alas.aws.amazon.com/CVE-2024-44948.html
https://explore.alas.aws.amazon.com/CVE-2024-44958.html
https://explore.alas.aws.amazon.com/CVE-2024-44965.html
深刻度: High
ID: 232713
ファイル名: al2023_ALAS2023-2025-864.nasl
バージョン: 1.5
タイプ: local
エージェント: unix
公開日: 2025/3/14
更新日: 2025/10/6
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Medium
スコア: 6.7
リスクファクター: Medium
基本値: 6.8
現状値: 5.3
ベクトル: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS スコアのソース: CVE-2024-44934
リスクファクター: High
基本値: 7.8
現状値: 7
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel-libbpf, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.106-116.188, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: No known exploits are available
パッチ公開日: 2025/2/26
脆弱性公開日: 2024/7/29
CVE: CVE-2024-39472, CVE-2024-41042, CVE-2024-42159, CVE-2024-42258, CVE-2024-42259, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42276, CVE-2024-42281, CVE-2024-42283, CVE-2024-42285, CVE-2024-42292, CVE-2024-42299, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-42307, CVE-2024-42312, CVE-2024-42316, CVE-2024-42321, CVE-2024-43817, CVE-2024-43823, CVE-2024-43828, CVE-2024-43830, CVE-2024-43834, CVE-2024-43837, CVE-2024-43853, CVE-2024-43854, CVE-2024-43855, CVE-2024-43856, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43882, CVE-2024-43883, CVE-2024-43889, CVE-2024-43893, CVE-2024-43894, CVE-2024-43914, CVE-2024-44934, CVE-2024-44935, CVE-2024-44944, CVE-2024-44948, CVE-2024-44958, CVE-2024-44965, CVE-2024-44970, CVE-2024-57947