Language:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-015.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47659.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1012.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1184.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1789.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1852.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1966.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1972.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2078.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21123.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21125.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21166.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21499.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32250.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32296.html
https://alas.aws.amazon.com/cve/html/CVE-2022-32981.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48710.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49297.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49300.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49307.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49308.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49316.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49319.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49321.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49322.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49323.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49327.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49330.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49339.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49340.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49341.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49343.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49344.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49345.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49347.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49348.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49349.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49350.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49352.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49358.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49370.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49371.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49372.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49374.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49376.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49379.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49385.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49388.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49389.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49402.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49407.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49409.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49410.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49411.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49413.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49434.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49441.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49442.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49446.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49450.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49468.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49472.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49492.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49497.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49498.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49508.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49520.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49521.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49526.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49532.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49540.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49548.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49549.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49554.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49556.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49560.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49561.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49706.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49707.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49708.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49710.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49715.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49716.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49720.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49721.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49723.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49725.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49726.html
深刻度: High
ID: 163313
ファイル名: al2_ALASKERNEL-5_10-2022-015.nasl
バージョン: 1.22
タイプ: local
エージェント: unix
公開日: 2022/7/21
更新日: 2025/5/23
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Critical
スコア: 9.4
リスクファクター: High
基本値: 7.2
現状値: 6.3
ベクトル: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2022-32250
リスクファクター: High
基本値: 8.2
現状値: 7.8
ベクトル: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CVSS スコアのソース: CVE-2022-1012
CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.126-117.518, p-cpe:/a:amazon:linux:kernel-debuginfo
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/6/30
脆弱性公開日: 2022/6/2
CVE: CVE-2021-47659, CVE-2022-1012, CVE-2022-1184, CVE-2022-1789, CVE-2022-1852, CVE-2022-1966, CVE-2022-1972, CVE-2022-2078, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166, CVE-2022-21499, CVE-2022-32250, CVE-2022-32296, CVE-2022-32981, CVE-2022-48710, CVE-2022-49297, CVE-2022-49300, CVE-2022-49307, CVE-2022-49308, CVE-2022-49316, CVE-2022-49319, CVE-2022-49321, CVE-2022-49322, CVE-2022-49323, CVE-2022-49327, CVE-2022-49330, CVE-2022-49339, CVE-2022-49340, CVE-2022-49341, CVE-2022-49343, CVE-2022-49344, CVE-2022-49345, CVE-2022-49347, CVE-2022-49348, CVE-2022-49349, CVE-2022-49350, CVE-2022-49352, CVE-2022-49358, CVE-2022-49370, CVE-2022-49371, CVE-2022-49372, CVE-2022-49374, CVE-2022-49376, CVE-2022-49379, CVE-2022-49385, CVE-2022-49388, CVE-2022-49389, CVE-2022-49402, CVE-2022-49407, CVE-2022-49409, CVE-2022-49410, CVE-2022-49411, CVE-2022-49413, CVE-2022-49434, CVE-2022-49441, CVE-2022-49442, CVE-2022-49446, CVE-2022-49450, CVE-2022-49468, CVE-2022-49472, CVE-2022-49492, CVE-2022-49497, CVE-2022-49498, CVE-2022-49508, CVE-2022-49520, CVE-2022-49521, CVE-2022-49526, CVE-2022-49532, CVE-2022-49540, CVE-2022-49548, CVE-2022-49549, CVE-2022-49554, CVE-2022-49556, CVE-2022-49560, CVE-2022-49561, CVE-2022-49706, CVE-2022-49707, CVE-2022-49708, CVE-2022-49710, CVE-2022-49715, CVE-2022-49716, CVE-2022-49720, CVE-2022-49721, CVE-2022-49723, CVE-2022-49725, CVE-2022-49726, CVE-2022-49727, CVE-2022-49731