語言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-009.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4135.html
https://alas.aws.amazon.com/cve/html/CVE-2021-4155.html
https://alas.aws.amazon.com/cve/html/CVE-2021-28711.html
https://alas.aws.amazon.com/cve/html/CVE-2021-28712.html
https://alas.aws.amazon.com/cve/html/CVE-2021-28713.html
https://alas.aws.amazon.com/cve/html/CVE-2021-28714.html
https://alas.aws.amazon.com/cve/html/CVE-2021-28715.html
https://alas.aws.amazon.com/cve/html/CVE-2021-3923.html
https://alas.aws.amazon.com/cve/html/CVE-2021-43975.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46929.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46931.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46934.html
https://alas.aws.amazon.com/cve/html/CVE-2021-46936.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47090.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47097.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47501.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47505.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47506.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47507.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47512.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47514.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47515.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47517.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47527.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47538.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47539.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47541.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47542.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47544.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47546.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47548.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47550.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47553.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47555.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47557.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47560.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47565.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47566.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47572.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47576.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47578.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47579.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47580.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47584.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47585.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47588.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47589.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47593.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47597.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47598.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47600.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47603.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47606.html
嚴重性: High
ID: 160451
檔案名稱: al2_ALASKERNEL-5_10-2022-009.nasl
版本: 1.22
類型: local
代理程式: unix
已發布: 2022/5/2
已更新: 2025/5/23
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: High
分數: 7.4
風險因素: High
基本分數: 7.2
時間性分數: 6
媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2022-0185
風險因素: High
基本分數: 8.4
時間性分數: 7.8
媒介: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.93-87.444, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/1/26
弱點發布日期: 2021/1/11
CISA 已知遭惡意利用弱點到期日: 2024/9/11
Core Impact
CVE: CVE-2021-28711, CVE-2021-28712, CVE-2021-28713, CVE-2021-28714, CVE-2021-28715, CVE-2021-3923, CVE-2021-4135, CVE-2021-4155, CVE-2021-43975, CVE-2021-46929, CVE-2021-46931, CVE-2021-46934, CVE-2021-46936, CVE-2021-47090, CVE-2021-47097, CVE-2021-47501, CVE-2021-47505, CVE-2021-47506, CVE-2021-47507, CVE-2021-47512, CVE-2021-47514, CVE-2021-47515, CVE-2021-47517, CVE-2021-47527, CVE-2021-47538, CVE-2021-47539, CVE-2021-47541, CVE-2021-47542, CVE-2021-47544, CVE-2021-47546, CVE-2021-47548, CVE-2021-47550, CVE-2021-47553, CVE-2021-47555, CVE-2021-47557, CVE-2021-47560, CVE-2021-47565, CVE-2021-47566, CVE-2021-47572, CVE-2021-47576, CVE-2021-47578, CVE-2021-47579, CVE-2021-47580, CVE-2021-47584, CVE-2021-47585, CVE-2021-47588, CVE-2021-47589, CVE-2021-47593, CVE-2021-47597, CVE-2021-47598, CVE-2021-47600, CVE-2021-47603, CVE-2021-47606, CVE-2021-47609, CVE-2022-0185