Language:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-007.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1462.html
https://alas.aws.amazon.com/cve/html/CVE-2022-21505.html
https://alas.aws.amazon.com/cve/html/CVE-2022-36879.html
https://alas.aws.amazon.com/cve/html/CVE-2022-36946.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49567.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49568.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49571.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49572.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49573.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49574.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49575.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49576.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49577.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49578.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49579.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49580.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49585.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49586.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49587.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49588.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49589.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49590.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49593.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49594.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49595.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49596.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49597.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49598.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49599.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49600.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49601.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49602.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49603.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49604.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49607.html
深刻度: Medium
ID: 165100
ファイル名: al2_ALASKERNEL-5_15-2022-007.nasl
バージョン: 1.11
タイプ: local
エージェント: unix
公開日: 2022/9/15
更新日: 2025/5/23
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Medium
スコア: 6.7
リスクファクター: Low
基本値: 3.3
現状値: 2.6
ベクトル: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:P
CVSS スコアのソース: CVE-2022-1462
リスクファクター: Medium
基本値: 6.3
現状値: 5.7
ベクトル: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:amazon:linux:kernel-livepatch-5.15.59-33.133, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/9/8
脆弱性公開日: 2022/6/2
CVE: CVE-2022-1462, CVE-2022-21505, CVE-2022-36879, CVE-2022-36946, CVE-2022-49567, CVE-2022-49568, CVE-2022-49571, CVE-2022-49572, CVE-2022-49573, CVE-2022-49574, CVE-2022-49575, CVE-2022-49576, CVE-2022-49577, CVE-2022-49578, CVE-2022-49579, CVE-2022-49580, CVE-2022-49585, CVE-2022-49586, CVE-2022-49587, CVE-2022-49588, CVE-2022-49589, CVE-2022-49590, CVE-2022-49593, CVE-2022-49594, CVE-2022-49595, CVE-2022-49596, CVE-2022-49597, CVE-2022-49598, CVE-2022-49599, CVE-2022-49600, CVE-2022-49601, CVE-2022-49602, CVE-2022-49603, CVE-2022-49604, CVE-2022-49607, CVE-2022-49608, CVE-2023-2177