Language:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-007.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-3744.html
https://alas.aws.amazon.com/cve/html/CVE-2021-3764.html
https://alas.aws.amazon.com/cve/html/CVE-2021-20321.html
https://alas.aws.amazon.com/cve/html/CVE-2021-34866.html
https://alas.aws.amazon.com/cve/html/CVE-2021-41864.html
https://alas.aws.amazon.com/cve/html/CVE-2021-43267.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47360.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47373.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47375.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47376.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47378.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47379.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47383.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47384.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47385.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47386.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47387.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47390.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47392.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47397.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47399.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47404.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47405.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47406.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47407.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47408.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47416.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47418.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47424.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47425.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47430.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47433.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47434.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47438.html
深刻度: Critical
ID: 160447
ファイル名: al2_ALASKERNEL-5_10-2022-007.nasl
バージョン: 1.14
タイプ: local
エージェント: unix
公開日: 2022/5/2
更新日: 2025/5/23
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: High
スコア: 8.9
リスクファクター: High
基本値: 7.5
現状値: 6.5
ベクトル: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS スコアのソース: CVE-2021-43267
リスクファクター: Critical
基本値: 9.8
現状値: 9.4
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.75-79.358, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/1/20
脆弱性公開日: 2019/11/7
CVE: CVE-2021-20321, CVE-2021-34866, CVE-2021-3744, CVE-2021-3764, CVE-2021-41864, CVE-2021-43267, CVE-2021-47360, CVE-2021-47373, CVE-2021-47375, CVE-2021-47376, CVE-2021-47378, CVE-2021-47379, CVE-2021-47383, CVE-2021-47384, CVE-2021-47385, CVE-2021-47386, CVE-2021-47387, CVE-2021-47390, CVE-2021-47392, CVE-2021-47397, CVE-2021-47399, CVE-2021-47404, CVE-2021-47405, CVE-2021-47406, CVE-2021-47407, CVE-2021-47408, CVE-2021-47416, CVE-2021-47418, CVE-2021-47424, CVE-2021-47425, CVE-2021-47430, CVE-2021-47433, CVE-2021-47434, CVE-2021-47438, CVE-2021-47444, CVE-2021-47497