Language:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-005.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2022-26365.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33740.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33741.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33742.html
https://alas.aws.amazon.com/cve/html/CVE-2022-33743.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49160.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49266.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49444.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49658.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49662.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49663.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49664.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49667.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49670.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49671.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49672.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49673.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49674.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49675.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49687.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49688.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49691.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49695.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49696.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49697.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49698.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49700.html
深刻度: High
ID: 163352
ファイル名: al2_ALASKERNEL-5_15-2022-005.nasl
バージョン: 1.13
タイプ: local
エージェント: unix
公開日: 2022/7/21
更新日: 2025/5/23
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Critical
スコア: 9.6
リスクファクター: High
基本値: 7.2
現状値: 6.3
ベクトル: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2022-34918
リスクファクター: High
基本値: 7.8
現状値: 7.5
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.54-25.126, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/7/19
脆弱性公開日: 2022/7/4
Core Impact
Metasploit (Netfilter nft_set_elem_init Heap Overflow Privilege Escalation)
CVE: CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742, CVE-2022-33743, CVE-2022-34918, CVE-2022-49160, CVE-2022-49266, CVE-2022-49444, CVE-2022-49658, CVE-2022-49662, CVE-2022-49663, CVE-2022-49664, CVE-2022-49667, CVE-2022-49670, CVE-2022-49671, CVE-2022-49672, CVE-2022-49673, CVE-2022-49674, CVE-2022-49675, CVE-2022-49687, CVE-2022-49688, CVE-2022-49691, CVE-2022-49695, CVE-2022-49696, CVE-2022-49697, CVE-2022-49698, CVE-2022-49700, CVE-2022-49702, CVE-2022-49732