Language:
https://alas.aws.amazon.com//AL2/ALAS2KERNEL-5.15-2023-013.html
https://alas.aws.amazon.com/faqs.html
https://explore.alas.aws.amazon.com/CVE-2022-4842.html
https://explore.alas.aws.amazon.com/CVE-2022-47929.html
https://explore.alas.aws.amazon.com/CVE-2022-48424.html
https://explore.alas.aws.amazon.com/CVE-2022-48879.html
https://explore.alas.aws.amazon.com/CVE-2022-48892.html
https://explore.alas.aws.amazon.com/CVE-2022-50262.html
https://explore.alas.aws.amazon.com/CVE-2022-50280.html
https://explore.alas.aws.amazon.com/CVE-2022-50286.html
https://explore.alas.aws.amazon.com/CVE-2022-50300.html
https://explore.alas.aws.amazon.com/CVE-2022-50306.html
https://explore.alas.aws.amazon.com/CVE-2022-50329.html
https://explore.alas.aws.amazon.com/CVE-2022-50336.html
https://explore.alas.aws.amazon.com/CVE-2022-50341.html
https://explore.alas.aws.amazon.com/CVE-2022-50346.html
https://explore.alas.aws.amazon.com/CVE-2022-50381.html
https://explore.alas.aws.amazon.com/CVE-2022-50388.html
https://explore.alas.aws.amazon.com/CVE-2022-50389.html
https://explore.alas.aws.amazon.com/CVE-2022-50396.html
https://explore.alas.aws.amazon.com/CVE-2022-50428.html
https://explore.alas.aws.amazon.com/CVE-2022-50436.html
https://explore.alas.aws.amazon.com/CVE-2022-50442.html
https://explore.alas.aws.amazon.com/CVE-2022-50451.html
https://explore.alas.aws.amazon.com/CVE-2022-50456.html
https://explore.alas.aws.amazon.com/CVE-2022-50465.html
https://explore.alas.aws.amazon.com/CVE-2022-50473.html
https://explore.alas.aws.amazon.com/CVE-2022-50485.html
https://explore.alas.aws.amazon.com/CVE-2022-50496.html
https://explore.alas.aws.amazon.com/CVE-2022-50507.html
https://explore.alas.aws.amazon.com/CVE-2022-50534.html
https://explore.alas.aws.amazon.com/CVE-2022-50546.html
https://explore.alas.aws.amazon.com/CVE-2022-50549.html
https://explore.alas.aws.amazon.com/CVE-2022-50562.html
https://explore.alas.aws.amazon.com/CVE-2022-50563.html
https://explore.alas.aws.amazon.com/CVE-2023-0045.html
https://explore.alas.aws.amazon.com/CVE-2023-0179.html
https://explore.alas.aws.amazon.com/CVE-2023-0394.html
https://explore.alas.aws.amazon.com/CVE-2023-0459.html
https://explore.alas.aws.amazon.com/CVE-2023-0461.html
https://explore.alas.aws.amazon.com/CVE-2023-23454.html
https://explore.alas.aws.amazon.com/CVE-2023-23455.html
https://explore.alas.aws.amazon.com/CVE-2023-26544.html
https://explore.alas.aws.amazon.com/CVE-2023-52896.html
https://explore.alas.aws.amazon.com/CVE-2023-52898.html
https://explore.alas.aws.amazon.com/CVE-2023-52901.html
https://explore.alas.aws.amazon.com/CVE-2023-52903.html
https://explore.alas.aws.amazon.com/CVE-2023-52906.html
https://explore.alas.aws.amazon.com/CVE-2023-52910.html
https://explore.alas.aws.amazon.com/CVE-2023-53032.html
https://explore.alas.aws.amazon.com/CVE-2023-53033.html
深刻度: High
ID: 171227
ファイル名: al2_ALASKERNEL-5_15-2023-013.nasl
バージョン: 1.21
タイプ: local
エージェント: unix
公開日: 2023/2/8
更新日: 2025/11/6
サポートされているセンサー: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
リスクファクター: Medium
スコア: 6.7
リスクファクター: High
基本値: 7.8
現状値: 6.1
ベクトル: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N
CVSS スコアのソース: CVE-2023-0045
リスクファクター: High
基本値: 7.8
現状値: 7
ベクトル: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
現状ベクトル: CVSS:3.0/E:P/RL:O/RC:C
CVSS スコアのソース: CVE-2023-52906
CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.90-54.138, p-cpe:/a:amazon:linux:python-perf, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-tools
必要な KB アイテム: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
エクスプロイトが利用可能: true
エクスプロイトの容易さ: Exploits are available
パッチ公開日: 2023/1/31
脆弱性公開日: 2023/1/12
CVE: CVE-2022-47929, CVE-2022-4842, CVE-2022-48424, CVE-2022-48879, CVE-2022-48892, CVE-2022-50262, CVE-2022-50280, CVE-2022-50286, CVE-2022-50300, CVE-2022-50306, CVE-2022-50329, CVE-2022-50336, CVE-2022-50341, CVE-2022-50346, CVE-2022-50381, CVE-2022-50388, CVE-2022-50389, CVE-2022-50396, CVE-2022-50428, CVE-2022-50436, CVE-2022-50442, CVE-2022-50451, CVE-2022-50456, CVE-2022-50465, CVE-2022-50473, CVE-2022-50485, CVE-2022-50496, CVE-2022-50507, CVE-2022-50534, CVE-2022-50546, CVE-2022-50549, CVE-2022-50562, CVE-2022-50563, CVE-2023-0045, CVE-2023-0179, CVE-2023-0394, CVE-2023-0459, CVE-2023-0461, CVE-2023-23454, CVE-2023-23455, CVE-2023-26544, CVE-2023-52896, CVE-2023-52898, CVE-2023-52901, CVE-2023-52903, CVE-2023-52906, CVE-2023-52910, CVE-2023-53032, CVE-2023-53033, CVE-2023-53163, CVE-2023-53549