語言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-002.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47659.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47660.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1184.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1789.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1852.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1966.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1972.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1973.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2078.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21123.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21125.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21166.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32250.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32981.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34494.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34495.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49297.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49300.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49316.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49319.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49322.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49323.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49325.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49327.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49330.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49339.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49340.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49341.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49343.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49344.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49345.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49347.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49348.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49349.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49350.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49352.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49358.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49370.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49371.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49372.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49374.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49376.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49377.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49379.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49384.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49385.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49389.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49400.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49402.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49407.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49409.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49410.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49411.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49412.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49413.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49414.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49426.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49434.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49441.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49442.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49443.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49446.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49450.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49468.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49492.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49497.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49508.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49520.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49526.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49540.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49541.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49546.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49548.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49549.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49553.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49554.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49556.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49558.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49559.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49560.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49561.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49706.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49707.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49708.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49709.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49710.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49715.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49716.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49720.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49721.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49723.html
嚴重性: High
ID: 163372
檔案名稱: al2_ALASKERNEL-5_15-2022-002.nasl
版本: 1.20
類型: local
代理程式: unix
已發布: 2022/7/21
已更新: 2025/5/23
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: Critical
分數: 9.4
風險因素: High
基本分數: 7.2
時間性分數: 6.3
媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2022-32250
風險因素: High
基本分數: 7.8
時間性分數: 7.5
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:H/RL:O/RC:C
CVSS 評分資料來源: CVE-2022-49720
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.50-23.125, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/6/30
弱點發布日期: 2022/6/2
CVE: CVE-2021-47659, CVE-2021-47660, CVE-2022-1184, CVE-2022-1789, CVE-2022-1852, CVE-2022-1966, CVE-2022-1972, CVE-2022-1973, CVE-2022-2078, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-32250, CVE-2022-32981, CVE-2022-34494, CVE-2022-34495, CVE-2022-49297, CVE-2022-49300, CVE-2022-49316, CVE-2022-49319, CVE-2022-49322, CVE-2022-49323, CVE-2022-49325, CVE-2022-49327, CVE-2022-49330, CVE-2022-49339, CVE-2022-49340, CVE-2022-49341, CVE-2022-49343, CVE-2022-49344, CVE-2022-49345, CVE-2022-49347, CVE-2022-49348, CVE-2022-49349, CVE-2022-49350, CVE-2022-49352, CVE-2022-49358, CVE-2022-49370, CVE-2022-49371, CVE-2022-49372, CVE-2022-49374, CVE-2022-49376, CVE-2022-49377, CVE-2022-49379, CVE-2022-49384, CVE-2022-49385, CVE-2022-49389, CVE-2022-49400, CVE-2022-49402, CVE-2022-49407, CVE-2022-49409, CVE-2022-49410, CVE-2022-49411, CVE-2022-49412, CVE-2022-49413, CVE-2022-49414, CVE-2022-49426, CVE-2022-49434, CVE-2022-49441, CVE-2022-49442, CVE-2022-49443, CVE-2022-49446, CVE-2022-49450, CVE-2022-49468, CVE-2022-49492, CVE-2022-49497, CVE-2022-49508, CVE-2022-49520, CVE-2022-49526, CVE-2022-49540, CVE-2022-49541, CVE-2022-49546, CVE-2022-49548, CVE-2022-49549, CVE-2022-49553, CVE-2022-49554, CVE-2022-49556, CVE-2022-49558, CVE-2022-49559, CVE-2022-49560, CVE-2022-49561, CVE-2022-49706, CVE-2022-49707, CVE-2022-49708, CVE-2022-49709, CVE-2022-49710, CVE-2022-49715, CVE-2022-49716, CVE-2022-49720, CVE-2022-49721, CVE-2022-49723, CVE-2022-49726, CVE-2022-49731