Language:
https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-025.html
https://alas.aws.amazon.com/faqs.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3435.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3623.html
https://alas.aws.amazon.com/cve/html/CVE-2022-3643.html
https://alas.aws.amazon.com/cve/html/CVE-2022-4378.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48946.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48949.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48956.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48969.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48970.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48972.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48977.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48978.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48981.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48986.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48987.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48988.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48991.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48997.html
https://alas.aws.amazon.com/cve/html/CVE-2022-48999.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49000.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49002.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49006.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49007.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49013.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49014.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49015.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49017.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49021.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49025.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49027.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49028.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49030.html
https://alas.aws.amazon.com/cve/html/CVE-2022-49033.html
https://alas.aws.amazon.com/cve/html/CVE-2022-42328.html
https://alas.aws.amazon.com/cve/html/CVE-2022-42329.html
深刻度: High
ID: 170472
ファイル名: al2_ALASKERNEL-5_10-2023-025.nasl
バージョン: 1.11
タイプ: local
エージェント: unix
公開日: 2023/1/24
更新日: 2025/3/17
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Medium
スコア: 6.7
リスクファクター: High
基本値: 7.1
現状値: 5.6
ベクトル: CVSS2#AV:N/AC:H/Au:S/C:C/I:C/A:C
CVSS スコアのソース: CVE-2022-3623
リスクファクター: High
基本値: 7.8
現状値: 7
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CVSS スコアのソース: CVE-2022-49030
CPE: p-cpe:/a:amazon:linux:kernel-livepatch-5.10.162-141.675, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2023/1/18
脆弱性公開日: 2022/10/20
CVE: CVE-2022-3435, CVE-2022-3623, CVE-2022-3643, CVE-2022-42328, CVE-2022-42329, CVE-2022-4378, CVE-2022-48946, CVE-2022-48949, CVE-2022-48956, CVE-2022-48969, CVE-2022-48970, CVE-2022-48972, CVE-2022-48977, CVE-2022-48978, CVE-2022-48981, CVE-2022-48986, CVE-2022-48987, CVE-2022-48988, CVE-2022-48991, CVE-2022-48997, CVE-2022-48999, CVE-2022-49000, CVE-2022-49002, CVE-2022-49006, CVE-2022-49007, CVE-2022-49013, CVE-2022-49014, CVE-2022-49015, CVE-2022-49017, CVE-2022-49021, CVE-2022-49025, CVE-2022-49027, CVE-2022-49028, CVE-2022-49030, CVE-2022-49033, CVE-2023-1295, CVE-2023-2166