語系:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-018.html
https://alas.aws.amazon.com/cve/html/CVE-2021-33655.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2318.html
https://alas.aws.amazon.com/cve/html/CVE-2022-26365.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33740.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33741.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33743.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33744.html
嚴重性: High
ID: 163382
檔案名稱: al2_ALASKERNEL-5_10-2022-018.nasl
版本: 1.7
類型: local
代理程式: unix
已發布: 2022/7/22
已更新: 2023/9/6
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
風險因素: Critical
分數: 9.7
風險因素: High
基本分數: 7.2
時間分數: 6.3
媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2022-34918
風險因素: High
基本分數: 7.8
時間分數: 7.5
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.130-118.517, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/7/19
弱點發布日期: 2022/7/4
Core Impact
Metasploit (Netfilter nft_set_elem_init Heap Overflow Privilege Escalation)
CVE: CVE-2021-33655, CVE-2022-2318, CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742, CVE-2022-33743, CVE-2022-33744, CVE-2022-34918