語言:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-023.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-3759.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47103.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3524.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3542.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3564.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3594.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48657.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49834.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49845.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49846.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49850.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49853.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49865.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49869.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49870.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49871.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49873.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49874.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49875.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49879.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49880.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49885.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49890.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49892.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49899.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49903.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49907.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49912.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49913.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49914.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49915.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49917.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49918.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49919.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49925.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49927.html
嚴重性: High
ID: 168520
檔案名稱: al2_ALASKERNEL-5_10-2022-023.nasl
版本: 1.10
類型: local
代理程式: unix
已發布: 2022/12/8
已更新: 2025/6/23
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: High
分數: 7.4
風險因素: Medium
基本分數: 6.8
時間性分數: 5.3
媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2023-3812
風險因素: High
基本分數: 7.8
時間性分數: 7
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.155-138.670, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2022/12/1
弱點發布日期: 2022/2/11
CVE: CVE-2021-3759, CVE-2021-47103, CVE-2022-3524, CVE-2022-3542, CVE-2022-3564, CVE-2022-3594, CVE-2022-48657, CVE-2022-49834, CVE-2022-49845, CVE-2022-49846, CVE-2022-49850, CVE-2022-49853, CVE-2022-49865, CVE-2022-49869, CVE-2022-49870, CVE-2022-49871, CVE-2022-49873, CVE-2022-49874, CVE-2022-49875, CVE-2022-49879, CVE-2022-49880, CVE-2022-49885, CVE-2022-49890, CVE-2022-49892, CVE-2022-49899, CVE-2022-49903, CVE-2022-49907, CVE-2022-49912, CVE-2022-49913, CVE-2022-49914, CVE-2022-49915, CVE-2022-49917, CVE-2022-49918, CVE-2022-49919, CVE-2022-49925, CVE-2022-49927, CVE-2023-0590, CVE-2023-3812