語言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-028.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47659.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1012.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1184.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1966.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21123.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21125.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21166.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21499.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32250.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32296.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32981.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48710.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49086.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49264.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49297.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49300.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49307.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49308.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49316.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49321.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49322.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49330.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49339.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49340.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49341.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49343.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49344.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49345.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49347.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49349.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49350.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49352.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49358.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49370.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49371.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49372.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49374.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49385.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49388.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49389.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49407.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49410.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49411.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49413.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49421.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49434.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49441.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49442.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49450.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49472.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49492.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49508.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49520.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49526.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49532.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49554.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49561.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49707.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49708.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49710.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49715.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49716.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49725.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49726.html
嚴重性: High
ID: 163316
檔案名稱: al2_ALASKERNEL-5_4-2022-028.nasl
版本: 1.18
類型: local
代理程式: unix
已發布: 2022/7/21
已更新: 2025/5/23
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: Critical
分數: 9.4
風險因素: High
基本分數: 7.2
時間性分數: 6.3
媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2022-32250
風險因素: High
基本分數: 8.2
時間性分數: 7.8
媒介: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
時間媒介: CVSS:3.0/E:H/RL:O/RC:C
CVSS 評分資料來源: CVE-2022-1012
CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-debuginfo
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/6/30
弱點發布日期: 2022/6/2
CVE: CVE-2021-47659, CVE-2022-1012, CVE-2022-1184, CVE-2022-1966, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-21499, CVE-2022-32250, CVE-2022-32296, CVE-2022-32981, CVE-2022-48710, CVE-2022-49086, CVE-2022-49264, CVE-2022-49297, CVE-2022-49300, CVE-2022-49307, CVE-2022-49308, CVE-2022-49316, CVE-2022-49321, CVE-2022-49322, CVE-2022-49330, CVE-2022-49339, CVE-2022-49340, CVE-2022-49341, CVE-2022-49343, CVE-2022-49344, CVE-2022-49345, CVE-2022-49347, CVE-2022-49349, CVE-2022-49350, CVE-2022-49352, CVE-2022-49358, CVE-2022-49370, CVE-2022-49371, CVE-2022-49372, CVE-2022-49374, CVE-2022-49385, CVE-2022-49388, CVE-2022-49389, CVE-2022-49407, CVE-2022-49410, CVE-2022-49411, CVE-2022-49413, CVE-2022-49421, CVE-2022-49434, CVE-2022-49441, CVE-2022-49442, CVE-2022-49450, CVE-2022-49472, CVE-2022-49492, CVE-2022-49508, CVE-2022-49520, CVE-2022-49526, CVE-2022-49532, CVE-2022-49554, CVE-2022-49561, CVE-2022-49707, CVE-2022-49708, CVE-2022-49710, CVE-2022-49715, CVE-2022-49716, CVE-2022-49725, CVE-2022-49726, CVE-2022-49727, CVE-2022-49731