語言:
https://alas.aws.amazon.com/cve/html/CVE-2022-49257.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49259.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49261.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49264.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49271.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49272.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49279.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49280.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49287.html
https://alas.aws.amazon.com/cve/html/CVE-2023-1249.html
https://alas.aws.amazon.com/cve/html/CVE-2023-1637.html
https://alas.aws.amazon.com/cve/html/CVE-2023-28410.html
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-036.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47634.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47646.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47650.html
https://alas.aws.amazon.com/cve/html/CVE-2022-0168.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1158.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1353.html
https://alas.aws.amazon.com/cve/html/CVE-2022-29582.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2977.html
https://alas.aws.amazon.com/cve/html/CVE-2022-41858.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48853.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49044.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49048.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49052.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49053.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49058.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49065.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49066.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49072.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49073.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49074.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49075.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49077.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49078.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49080.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49084.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49085.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49086.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49087.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49092.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49094.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49097.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49098.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49100.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49103.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49107.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49114.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49122.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49144.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49145.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49148.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49149.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49153.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49154.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49155.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49156.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49171.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49174.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49175.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49176.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49179.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49180.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49197.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49204.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49205.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49206.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49209.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49210.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49220.html
嚴重性: High
ID: 180564
檔案名稱: al2_ALASKERNEL-5_10-2023-036.nasl
版本: 1.16
類型: local
代理程式: unix
已發布: 2023/9/6
已更新: 2025/5/23
支援的感應器: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
風險因素: High
分數: 7.3
風險因素: Medium
基本分數: 6.9
時間性分數: 5.4
媒介: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2022-29582
風險因素: High
基本分數: 7.8
時間性分數: 7
媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
時間媒介: CVSS:3.0/E:P/RL:O/RC:C
CVSS 評分資料來源: CVE-2023-28410
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.112-108.499, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要的 KB 項目: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2023/6/29
弱點發布日期: 2022/4/22
CVE: CVE-2021-47634, CVE-2021-47646, CVE-2021-47650, CVE-2022-0168, CVE-2022-1158, CVE-2022-1353, CVE-2022-29582, CVE-2022-2977, CVE-2022-41858, CVE-2022-48853, CVE-2022-49044, CVE-2022-49048, CVE-2022-49052, CVE-2022-49053, CVE-2022-49058, CVE-2022-49065, CVE-2022-49066, CVE-2022-49072, CVE-2022-49073, CVE-2022-49074, CVE-2022-49075, CVE-2022-49077, CVE-2022-49078, CVE-2022-49080, CVE-2022-49084, CVE-2022-49085, CVE-2022-49086, CVE-2022-49087, CVE-2022-49092, CVE-2022-49094, CVE-2022-49097, CVE-2022-49098, CVE-2022-49100, CVE-2022-49103, CVE-2022-49107, CVE-2022-49114, CVE-2022-49122, CVE-2022-49144, CVE-2022-49145, CVE-2022-49148, CVE-2022-49149, CVE-2022-49153, CVE-2022-49154, CVE-2022-49155, CVE-2022-49156, CVE-2022-49171, CVE-2022-49174, CVE-2022-49175, CVE-2022-49176, CVE-2022-49179, CVE-2022-49180, CVE-2022-49197, CVE-2022-49204, CVE-2022-49205, CVE-2022-49206, CVE-2022-49209, CVE-2022-49210, CVE-2022-49220, CVE-2022-49224, CVE-2022-49256, CVE-2022-49257, CVE-2022-49259, CVE-2022-49261, CVE-2022-49264, CVE-2022-49271, CVE-2022-49272, CVE-2022-49279, CVE-2022-49280, CVE-2022-49287, CVE-2023-1249, CVE-2023-1637, CVE-2023-28410