Language:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-034.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2021-33655.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21505.html
https://alas.aws.amazon.com/cve/html/CVE-2022-34918.html
https://alas.aws.amazon.com/cve/html/CVE-2022-36879.html
https://alas.aws.amazon.com/cve/html/CVE-2022-36946.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49414.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49567.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49571.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49572.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49573.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49574.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49575.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49577.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49580.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49583.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49584.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49586.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49587.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49589.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49590.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49593.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49594.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49595.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49596.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49597.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49598.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49601.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49602.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49604.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49607.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49608.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49620.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49631.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49637.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49638.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49639.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49643.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49647.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49649.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49657.html
深刻度: High
ID: 164357
ファイル名: al2_ALASKERNEL-5_4-2022-034.nasl
バージョン: 1.11
タイプ: local
エージェント: unix
公開日: 2022/8/23
更新日: 2025/5/23
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Critical
スコア: 9.6
リスクファクター: High
基本値: 7.2
現状値: 6.3
ベクトル: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2022-34918
リスクファクター: High
基本値: 7.8
現状値: 7.5
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/8/15
脆弱性公開日: 2022/7/4
Core Impact
Metasploit (Netfilter nft_set_elem_init Heap Overflow Privilege Escalation)
CVE: CVE-2021-33655, CVE-2022-21505, CVE-2022-34918, CVE-2022-36879, CVE-2022-36946, CVE-2022-49414, CVE-2022-49567, CVE-2022-49571, CVE-2022-49572, CVE-2022-49573, CVE-2022-49574, CVE-2022-49575, CVE-2022-49577, CVE-2022-49580, CVE-2022-49583, CVE-2022-49584, CVE-2022-49586, CVE-2022-49587, CVE-2022-49589, CVE-2022-49590, CVE-2022-49593, CVE-2022-49594, CVE-2022-49595, CVE-2022-49596, CVE-2022-49597, CVE-2022-49598, CVE-2022-49601, CVE-2022-49602, CVE-2022-49604, CVE-2022-49607, CVE-2022-49608, CVE-2022-49620, CVE-2022-49631, CVE-2022-49637, CVE-2022-49638, CVE-2022-49639, CVE-2022-49643, CVE-2022-49647, CVE-2022-49649, CVE-2022-49657, CVE-2022-49700, CVE-2023-2177