Language:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-080.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2023-52803.html
https://alas.aws.amazon.com/cve/html/CVE-2024-36484.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41020.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41022.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41034.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41035.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41041.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41049.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41059.html
https://alas.aws.amazon.com/cve/html/CVE-2024-41090.html
Severity: High
ID: 205699
File Name: al2_ALASKERNEL-5_4-2024-080.nasl
Version: 1.9
Type: local
Agent: unix
Published: 8/17/2024
Updated: 12/12/2024
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2024-41049
Risk Factor: High
Base Score: 7.8
Temporal Score: 7
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 8/1/2024
Vulnerability Publication Date: 5/21/2024
CVE: CVE-2023-52803, CVE-2024-36484, CVE-2024-41020, CVE-2024-41022, CVE-2024-41034, CVE-2024-41035, CVE-2024-41041, CVE-2024-41049, CVE-2024-41059, CVE-2024-41090, CVE-2024-41091, CVE-2024-42154