Language:
https://alas.aws.amazon.com//AL2/ALAS2KERNEL-5.10-2022-020.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2019-25162.html
https://alas.aws.amazon.com/cve/html/CVE-2021-47082.html
https://alas.aws.amazon.com/cve/html/CVE-2022-1679.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2153.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2585.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2586.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2588.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2663.html
https://alas.aws.amazon.com/cve/html/CVE-2022-2905.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3028.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3176.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3625.html
https://alas.aws.amazon.com/cve/html/CVE-2022-26373.html
https://alas.aws.amazon.com/cve/html/CVE-2022-39188.html
https://alas.aws.amazon.com/cve/html/CVE-2022-39190.html
https://alas.aws.amazon.com/cve/html/CVE-2022-40307.html
https://alas.aws.amazon.com/cve/html/CVE-2022-41222.html
https://alas.aws.amazon.com/cve/html/CVE-2022-4744.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48675.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48686.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48687.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48688.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48691.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48695.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48697.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48704.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49599.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49964.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49977.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49984.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49986.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49987.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49993.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49998.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50004.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50008.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50030.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50072.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50083.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50092.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50095.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50097.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50103.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50126.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50127.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50149.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50181.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50185.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50200.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50202.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50205.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50211.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50212.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50220.html
https://alas.aws.amazon.com/cve/html/CVE-2022-50228.html
深刻度: High
ID: 166124
ファイル名: al2_ALASKERNEL-5_10-2022-020.nasl
バージョン: 1.26
タイプ: local
エージェント: unix
公開日: 2022/10/14
更新日: 2025/7/8
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Critical
スコア: 9.5
リスクファクター: High
基本値: 7.2
現状値: 6.3
ベクトル: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS スコアのソース: CVE-2022-1679
リスクファクター: High
基本値: 7.8
現状値: 7.5
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:H/RL:O/RC:C
CVSS スコアのソース: CVE-2022-48695
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.144-127.601, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2022/9/30
脆弱性公開日: 2022/5/16
CISA の既知の悪用された脆弱性の期限日: 2024/7/17
Core Impact
CVE: CVE-2019-25162, CVE-2021-47082, CVE-2022-1679, CVE-2022-2153, CVE-2022-2585, CVE-2022-2586, CVE-2022-2588, CVE-2022-26373, CVE-2022-2663, CVE-2022-2905, CVE-2022-3028, CVE-2022-3176, CVE-2022-3625, CVE-2022-39188, CVE-2022-39190, CVE-2022-40307, CVE-2022-41222, CVE-2022-4744, CVE-2022-48675, CVE-2022-48686, CVE-2022-48687, CVE-2022-48688, CVE-2022-48691, CVE-2022-48695, CVE-2022-48697, CVE-2022-48704, CVE-2022-49599, CVE-2022-49964, CVE-2022-49977, CVE-2022-49984, CVE-2022-49986, CVE-2022-49987, CVE-2022-49993, CVE-2022-49998, CVE-2022-50004, CVE-2022-50008, CVE-2022-50030, CVE-2022-50072, CVE-2022-50083, CVE-2022-50092, CVE-2022-50095, CVE-2022-50097, CVE-2022-50103, CVE-2022-50126, CVE-2022-50127, CVE-2022-50149, CVE-2022-50181, CVE-2022-50185, CVE-2022-50200, CVE-2022-50202, CVE-2022-50205, CVE-2022-50211, CVE-2022-50212, CVE-2022-50220, CVE-2022-50228, CVE-2023-1095, CVE-2023-2860